How to Access Security Rules in PEGA?
- January 4, 2021
- Posted by: AtoZ Trainings
- Category: PEGA Technology

The below are rules related to access security.
- Access Group -> Access Roles -> Access Role to Object, Privileges
Additionally, we have
Access When, Access Deny.
Total Access Security Rule
- Access Group
- Access Role Name
- Access Role to object
- Access When
- Access Deny
- Privileges.
Each Operator will be given some access roles.
Access Roles defines the Level Access to an application and it’s rules.
Developer by default will have below access roles

Similarly manager

For any business we have below application environments.
- Experimental or Case Study Environment.
- Development Server.
- Test Servers or QA servers
- UAT Servers (User Acceptance Server)
- Live Server (Production Server)
System Rule
This rule under sys admin category defines the server type like Anyone of the Above.

This rule defines production level by integer number.
If Production Level is:
- Means the Process commander treats this server as Case Study server
- Means Development server
- QA server
- UAT Server
- Production
Access Role to Object
To understand the above, we need to know environments or Servers in Enterprise application development.

This rule defines access control by integer number or when rules.
Access role to object defines access level to environment and class level.
The number given here role to object will be compared against the production level on the server, that is defined in system rule.
If the Number mentioned is 4, meaning that this operator has access to Environment 4 and Below.
For example, Rule reports access level is 3, when this operator login to Servers 1 TO 5.
He can run reports on server 3 and below i.e, servers 3,2, and 1.
He will not be able to run reports when he login to servers 4 and 5.
Done.
Access Control value ‘0’ or ‘blank’ means do not have access to any environment. DONE.
Author:Yoktha
Leave a Reply Cancel reply
You must be logged in to post a comment.