Skip to main content

Securing your application

Suggest edit Updated on January 24, 2022

Secure your application by setting up the organization and user structures to limit access to your application. You must configure groups and roles, and create operator IDs for who will be able to complete tasks using your application, based on their access, group, and role.

For more information about security at the infrastructure level of Pega Cloud, see Security and data protection.

See Security Checklist when deploying on Pega Cloud, which summarizes the different features that you use to set up user access and secure your application. The checklist includes the following tasks:
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us