Articles

Temporary cases in Pega

Introduction In this post, we will see how we can create temporary cases in Pega and how to maximize the usage of such configuration Now think of a scenario – A reputed banking company uses Pega application to hire for Job openings. The hiring process involves a complete life cycle from the initial screening till

Read More »

Single Sign On – Part 3: Configure SP

Introduction: This is the continuation of the previous post. In the last post we saw how we can configure an IdP entity using OpenAM. For beter understanding, please go through the below posts before proceeding further. In this post we will see how we can configure a Service provider entity details in Pega authentication service

Read More »

Single Sign On – Part 2: Configure IdP

Introduction Finally, its time to document my SSO implementation in Pega personal edition 8.2 using OpenAM. In this post we will see about setting up the Identity provider using OpenAM. To know basics about the SAML, IDP, SP (theory 😉) visit my previous post! I am splitting this post into two main areas Hosting the

Read More »

Single Sign on – Part 1: basics

Introduction In this post we will see the basics about single sign-on (SSO) mechanism and the common configuration for single sign on. Warning!! Only thoery! Detailed explanation on SSO within 10 minutes What is single sign-on? It is an authentication process, where one set of login credential provides access to multiple applications.It helps in 2

Read More »

LDAP authentication in Pega – LDAP 2

Introduction Hope you enjoyed my previous post on configuring the Apache directory server. It is a must visit post before proceeding here. Please follow the below link and set up your apache directory server. In this post, we will see how we can authenticate the application user credentials against the attributes stored in the apache

Read More »

Configure Apache Directory services – LDAP 1

Introduction Finally, I got some time to work on LDAP authentication. In this post we will see more in detail about directory services and LDAP protocols. We will also setup our own directory service. Let’s start with directory. What is a directory? Directory is a collection or list of data and they saves the information

Read More »

Customizing basic authentication

Introduction In the last post, we saw how the default basic authentication works in Pega. In this post, we will see how we can customize and have our own basic authentication. Now the first question is why do we need to customize the basic authentication? When the user credentials are not saved in Pega DB

Read More »

Basic authentication in Pega

Introduction Welcome to the series of posts on authentication topic. I hope many will be happy to see this topic in my blog (many people have requested the same). In this first post of the series, I am going to start with the introduction and detailed explanation on basic authentication in Pega. YouTube Video  What

Read More »

Flow action rule in Pega

Introduction In this post, we will see about the configuration points in a flow action rule. What is flow action rule? Flow action rule contains all the configuration points that describe how a user interacts with an assignment using work forms. We know that every business process follows a certain flow. The flow starts at

Read More »

Service email – handle DSN

Introduction In this post, we will see how we can handle delivery status notification messages. Recap on the use cases. I recommend you to visit the posts in the following order to be on the same line. Create a case with the data from the incoming email 2.Use approval actions in the assignment notification, to

Read More »

Service email – manage conversations

Introduction In this post, we will see how we can manage the email conversations within Pega. Recap on the use cases. I recommend you to visit the posts in the following order to be on the same line. Create a case with the data from the incoming email 2. Use approval actions in the assignment

Read More »

Service email – approval flow

Introduction In this post, we will see, how we can notify the approval process through email and how to process the action through incoming email. This will be our second use case. I always take some time to create an introduction picture and always MS Paint 🙂 As a recap, below are the four use

Read More »

Service email – case creation

Introduction In the last posts, we saw, how to create a file listener, email account, service email using email wizard. The processing of all listeners in Pega is basic. The listener listens at a location for a message/file or email and invokes a service rule to process. Similarly, in email processing, the listener listens for

Read More »

Email wizard in Pega

Introduction I hope you liked my previous posts on file processing series. It is time to explore email processing. In this post, we will see more in detail about the email wizard. What is email processing? I will explain this with my favourite CRM application. Say an insurance company provides email servicing to their customers.

Read More »

Email listener in Pega

Introduction This post will be the continuation of my previous post on email wizard. We will see in detail about all the configuration points in the email listener. Please visit the below post to understand the email wizard What is email listener? The email listener monitors the email account on the configured folder and routes the email

Read More »

Parse structured rule in Pega

Introduction In this post, we will see more in detail about the parse structured rule and the four specific methods. This is the continuation of my previous post on Map structured rule. I recommend you to visit my previous post, before proceeding this post! What is Parse structured rule? Used to parse the structured data into clipboard

Read More »

Map structured rule in Pega

Introduction In this post, we will more in detail about Map structured rule. Let me start with a scenario, Our Pega application needs to talk with another application. Talk refers to the transfer of data between systems. Data can be in any format.  Now, the external system sends us input data in a file (customer

Read More »
error: Content is protected !!
Scroll to Top