Skip to main content

Implementing your authentication scheme

Suggest edit Updated on March 18, 2021

Centralize and automatically maintain operator data instead of maintaining it manually in your application.

  1. Discuss Authentication schemes with your site's security and application server teams.

  2. Determine the appropriate authentication type.

    For more information on authentication scheme planning, see Authentication in Pega Platform.

Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us