• Mon - Sat 10.00 - 18.00
  • AED Hospital 5th Floor, K P H B Phase 1, Kukatpally, Hyderabad
  • +91 96525 32753
REQUEST FOR A FREE DEMO
Blog
Cart
Upcoming Batches
  • Home
  • About Us
  • Checkout
  • Downloads
HARSHA TRAININGS
Category
Advanced JAVA
BPM
Cloud and DevOps Technologies
AWS+Azure+Google Cloud Infrastructure with DevOps
Fast Track Batch AWS+Gcp+Azure+DevOps
Fast Track Batch DevOps+Aws+Gcp+Azure
CRM
Data Science
Data Science
Digital Marketing
Digital Marketing
ETL Tool
Talend DI (Data Integration)
Hacking
HCM Functional
Integrations
PEGA
PEGA CPDC
PEGA PRPC
PEGA PRPC Fastrack
Reporting Tools
Power BI
Tableau
Software Testing
Web Technologies
Full Stack Development
MEAN Stack Development
UI Development
UI/UX Designing
{{ search }}
Become Instructor
LogIn/SignUp

Login/Sign Up

Courses Favorites 0

Search

Category
Advanced JAVA
BPM
Cloud and DevOps Technologies
AWS+Azure+Google Cloud Infrastructure with DevOps
Fast Track Batch AWS+Gcp+Azure+DevOps
Fast Track Batch DevOps+Aws+Gcp+Azure
CRM
Data Science
Data Science
Digital Marketing
Digital Marketing
ETL Tool
Talend DI (Data Integration)
Hacking
HCM Functional
Integrations
PEGA
PEGA CPDC
PEGA PRPC
PEGA PRPC Fastrack
Reporting Tools
Power BI
Tableau
Software Testing
Web Technologies
Full Stack Development
MEAN Stack Development
UI Development
UI/UX Designing
{{ search }}
Become Instructor

Menu

  • Home
  • About Us
  • Checkout
  • Downloads

How to Access Security Rules in PEGA?

  • January 4, 2021
  • Posted by: AtoZ Trainings
  • Category: PEGA Technology
No Comments
PEGA Tutorials

The below are rules related to access security.

  1. Access Group -> Access Roles -> Access Role to Object, Privileges

Additionally, we have

Access When, Access Deny.

Total Access Security Rule

  1. Access Group
  2. Access Role Name
  3. Access Role to object
  4. Access When
  5. Access Deny
  6. Privileges.

Each Operator will be given some access roles.

Access Roles defines the Level Access to an application and it’s rules.

Developer by default will have below access roles

Similarly manager

For any business we have below application environments.

  1. Experimental or Case Study Environment.
  2. Development Server.
  3. Test Servers or QA servers
  4. UAT Servers (User Acceptance Server)
  5. Live Server (Production Server)

System Rule

This rule under sys admin category defines the server type like Anyone of the Above.

This rule defines production level by integer number.

If Production Level is:

  1. Means the Process commander treats this server as Case Study server
  2. Means Development server
  3. QA server
  4. UAT Server
  5. Production

Access Role to Object

To understand the above, we need to know environments or Servers in Enterprise application development.

This rule defines access control by integer number or when rules.

Access role to object defines access level to environment and class level.

The number given here role to object will be compared against the production level on the server, that is defined in system rule.

If the Number mentioned is 4, meaning that this operator has access to Environment 4 and Below.

For example, Rule reports access level is 3, when this operator login to Servers 1 TO 5.

He can run reports on server 3 and below i.e, servers 3,2, and 1.

He will not be able to run reports when he login to servers 4 and 5.

Done.

Access Control value ‘0’ or ‘blank’ means do not have access to any environment. DONE.

Harsha Trainings PEGA Certification Training in Bangalore PEGA Certification Training in Chennai PEGA Certification Training in Hyderabad PEGA CPDC PEGA CPDC Certification PEGA CPDC Certification Training PEGA CPDC Training PEGA CSA PEGA CSA Certification PEGA CSA Certification Training PEGA CSA Training PEGA CSSA PEGA CSSA Certification PEGA CSSA Certification Training PEGA CSSA Training PEGA Development PEGA Development Certification Training in Bangalore PEGA Development Certification Training in Chennai PEGA Development Certification Training in Hyderabad PEGA Development Training PEGA Interview Assistance PEGA Job Support PEGA LSA PEGA LSA Certification PEGA LSA Certification Training PEGA LSA Training PEGA PRPC PEGA PRPC Certification PEGA PRPC Certification Training PEGA PRPC Training PEGA Support PEGA Training PEGA Training in Hyderabad PEGA Trainings PEGA Trainings in Bangalore PEGA Trainings in Chennai

Author:Yoktha

A to Z Trainings

Leave a Reply Cancel reply

You must be logged in to post a comment.

About Us

Harha Trainings is providing complete software trainings on PEGA, Data Science, Python, Amazon Web Services (AWS), DevOps, Microsoft Azure, Big data Analytics, UI/UX Designing, Full Stack Development, MEAN Stack Development, UI Development & Digital Marketing. We are passionate about bridging the gap between learning and real-time implementation, so empowering individuals to be industry ready and help firms in reaping huge benefits is our primary goal.

Popular Courses

  • Selenium with JAVA C# Course Content
    INR. 18,000
    By Harsha Pega
  • Workday HCM Techno-Functional Cour...
    INR. 33,000
    By Harsha Pega
  • DEVOPS & CLOUD Technologies (...
    INR. 28,000
    By Harsha Pega
  • APPIAN TECHNOLOGY
    INR. 22,000
    By Harsha Pega

Quick Links

  • Cancellation & Refund Policy
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Contact Us

  • AED Hospital 5th Floor, K P H B Phase 1, Kukatpally, Hyderabad
  • Tel.: +91 96525 32753
  • info@harshatrainings.com

We are accepting and SAFE Checkout Pyament Methods:

© All Copyrights Reserved 2020. HARSHA TRAININGS by YOKTHA Technologies
  • Home
  • About Us
  • Checkout
  • Downloads
Search