Skip to main content

         This documentation site is for previous versions. Visit our new documentation site for current releases.      

Adding custom security rules

Updated on May 14, 2021

Protect sensitive data and adhere to your organization's security efforts to mask Personally Identifiable Information (PII) by creating custom security rules.

For example, you can mask the Taxpayer Identification Number (TIN) by creating a rule that finds the TIN pattern in screens and replaces the number with xx-xxxxxxx.
  1. In the header of Pega Workforce Intelligence, click AdministrationClient Configuration.
  2. On the Client Configuration page, scroll down to Security Rules and then click +Add Rule.
  3. In the Add Security Rule window, enter a name for the security rule.

    This name appears on the Client Configuration page.

  4. In the Description field, enter a description of the security rule.

    This description appears on the Client Configuration page.

  5. In the Pattern field, enter the pattern that you want the system to search for.
    Note: To replace a single character, enter a question mark (?). To replace multiple characters, enter an asterisk (*).
  6. In the Replacement field, enter the characters that you want the system to use when replacing the sensitive information that the system locates.
  7. In the Field names field, enter the names of the fields affected by this rule.
  8. In the Event names field, enter the names of the events affected by this rule.
  9. Click the Turn on for existing configurations toggle to indicate whether you want this rule turned on or off for existing configurations.
    For example, if you are creating a custom security rule to mask the TIN, your security rule looks similar to the following image:
    Custom security rule to mask TIN
    Custom security rule to mask tax identifier number
    Tip: For examples of common security rules and values, see Masking sensitive data.
  10. Click Submit.
What to do next: Assign the new rules you created. For details on assigning custom security rules, see Adding custom client configurations.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best. is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us