Skip to main content

Securing your application running in Pega Cloud

Suggest edit Updated on June 2, 2022

Secure your application by creating the organization and user structures to limit access to your application. Configure groups and roles and create operator IDs for users who can perform tasks by using your application, based on their access, group, and role.

For more information about security at the infrastructure level of Pega Cloud, see Security and data protection.

See Security Checklist when deploying on Pega Cloud, which summarizes the different features that you use to configure user access and secure your application.
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us