Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Configuring custom or Kerberos login authentication

Updated on July 1, 2021

After you create a custom or Kerberos authentication service, configure it so that Pega Platform can connect to the repository and find the operator credentials. You can map attributes from the repository to properties in Pega Platform, and can also configure optional features such as authentication and time-out activities.

Before you begin: You must complete the following task before you can configure a custom or Kerberos authentication service: Creating an authentication service.
  1. Create a custom or Kerberos authentication service, or open an existing service from the navigation panel in Dev Studio by clicking RecordsSysAdminAuthentication Service and choosing a non-SAML authentication service from the instance list.
  2. If you have a custom authentication service, complete the following steps.
    1. Specify the binding for a custom service
    2. Map the operator for a custom service
  3. If you have a Kerberos authentication service, complete the following steps.
    1. Specify the binding for a Kerberos service
    2. Map the operator for a Kerberos service
  4. Optional: Configure the challenge behavior
  5. Optional: Configure the time-out behavior
  6. Optional: Map additional operator information
  • Previous topic Configuring an application to use an anonymous authentication service
  • Next topic Specifying the binding parameters for a custom authentication service

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us