Discussion
PEGA
Pegasystems Inc.
US
PEGA
Posted: Feb 7, 2020
Last activity: Feb 7, 2020
Last activity: 7 Feb 2020 9:53 EST
Security Model Examples: How to Secure your Application
Attached is a document detailing how to use:
- Access Groups
- Access Role Names
- Access Role To Objects
- Privileges
To control access to:
- Objects
- Cases
- Flows
- Flow Actions
And some other design thoughts on security.