Skip to main content

         This documentation site is for previous versions. Visit our new documentation site for current releases.      

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

What's new in V5.5 - System Operations, Security, and Performance

Updated on October 8, 2012

What's new in V5.5Available in March 2009, Process Commander V5.5 offers hundreds of new capabilities for developers, application users, and system administrators, and resolves issues found in earlier versions.

This topic describes enhancements in these areas:

To learn about V5.5 features in other areas, see What's New in Version 5.5.


Additional alerts

Alert CountVersion 5.5 introduces six new alerts that provide insight into system conditions that may hurt performance. Developers are notified immediately when the application rules they run produce an alert.

The new alerts are named PEGA0030 to PEG0035. See:

System Management Application

The System Management Application now provides detailed information about requestor clipboard sizes. See Use SMA to identify the largest requestor clipboards and clipboard pages.

Environment StatisticsScroll to top

System Operations

Easier specification of product rule contents

Product rules can be based on an application rule rather than an explicit list of RuleSet versions. See How to specify application RuleSets in a product rule.

Rule management tools are more consolidated and offer more flexibility in handling checked-out rules To start these tools select the Tools > Rule Management menu item See:

Scroll to top


Security for work object categories

New facilities simplify defining work object attachment categories, and controlling security for attachments. See How to control access to individual categorized attachments and How to enable attachment security using attachment categories.

Detailed logging of use of harness rules and flow action rules

When required by regulations or highly-sensitive data, your application can log each use of a work object form or flow action by user, date and time, and work object ID, even if the user was only reviewing, not updating, the work object. See How to log each use of harness and flow actions.

Control which work classes are indexed for full-text search

For security or performance reasons, you can exclude instances of specific classes (such as Work- or Data- classes) from the Advanced Search facility. How to limit text search to instances of specific classes.

Optionally, your application's SOAP connectors can be encrypted and reference a keystore, in compliance with WSS and X.509 standards for public key encryption of digital certificates. See How to create SOAP connectors that use WSS username tokens and timestamps.

Other enhancements:How to use JNDI to specify an LDAP server when using an authentication service.

Scroll to top

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best. is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us