Skip to main content

Published Release Notes

Find release notes for the selected Pega Version and Capability

Browse resolved issues for Platform releases.

This documentation is for non-current versions of Pega Platform. For current release notes, go here.

Additional configuration options for File data sets

Valid from Pega Version 8.2

You can now create File data sets for more advanced scenarios by adding custom Java classes for data encryption and decryption, and by defining a file set in a manifest file.

Additionally, you can improve data management by viewing detailed information in the dedicated meta file for every file that is saved, or by automatically extending the filenames with the creation date and time.

For more information, see Creating a File data set for files on repositories and Requirements for custom stream processing in File data sets.

Pin enhancements in spaces

Valid from Pega Version 8.2

Improve discussions in spaces and stimulate effective communication by using enhanced capabilities of pins. For example, you can search, filter, and like pins, or pin content of a space to another space.

For more information, see Pinning content to a space.

All search data is encrypted

Valid from Pega Version 8.2

All search data in Pega Cloud deployments is now encrypted, both at rest and in transit. The encryption of search data makes search compliant with regulatory requirements.

For more information about search, see Full-text search.

Improve clipboard performance for Service REST

Valid from Pega Version 8.2

Improve clipboard performance in Service REST processing by using the new Lightweight clipboard mode option. This mode does not support all clipboard features.

For a list of supported and unsupported features, see Service REST form - Completing the Service tab.

Create and assign tasks in Pulse

Valid from Pega Version 8.2

You can now create and assign tasks in Pulse for case work that needs to be completed within a specific time frame. For example, you can assign a task to yourself as a reminder to upload proof of address documents to a Car Loans case by the end of the day.

For more information, see Creating a task in Pulse, Enabling users to post messages in the activity feed.

Authentication service for basic credentials

Valid from Pega Version 8.2

A new type of authentication service is available for authenticating operators by using basic credentials (user ID and password). The default Pega Platform™ login is now an instance of this type of authentication service. All basic credentials authentication services include mobile authentication with the OAuth 2.0 protocol and Proof Key for Code Exchange (PKCE). You no longer have to create a custom authentication service to support mobile applications.

For more information, see Configuring a basic authentication service.

Simplified testing of event strategies

Valid from Pega Version 8.2

Evaluate event strategies by creating test runs. During each run, you can enter a number of sample events with simulated property values, such as the event time, the event key, and so on. By testing a strategy against sample data, you can understand the strategy configuration better and troubleshoot potential issues.

For more information, see Evaluate event strategies through test runs.

Identify Pega unit test cases associated with inactive or deleted rules

Valid from Pega Version 8.2

From the Application: Unit testing landing page, you can view a list of all Pega unit test cases that are associated with inactive or deleted rules in the currently included applications. You cannot use these test cases because they will always fail.

Either remove such test cases, or reactivate the rules that they are associated with.

For more information, see Application: Unit testing landing page.

Unauthenticated sessions transition seamlessly to authenticated

Valid from Pega Version 8.2

A new authentication service type allows a guest user to use an application without logging in, and to be prompted to authenticate later in the session. This enhancement supports scenarios such as online shopping portals where a user can browse for items and load a shopping cart as a guest but be prompted for credentials at checkout.

For more information, see Configuring an anonymous authentication service.

Data flow life cycle monitoring

Valid from Pega Version 8.2

You can now generate a report from the Run details section of a Data Flow rule that provides information about run events. The report includes reasons for specific events which you can analyze to troubleshoot and debug issues more quickly. You can export the report and share it with others, such as Global Customer Support.

For more information about accessing event details, see Creating a real-time run for data flows and Creating a batch run for data flows.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us