Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)

Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)
A . Leverage the standard authentication service IACAuthentication and update the authentication activities.
B . Add an access group for the application rules that need to be accessed from the external system.
C . Configure a node-level data page to hold security access information about the external system.
D . Configure the application permissions by specifying a list of trusted domains in the application rule.

Answer: A, D

Explanation:

A: When using a Pega Web Mashup, leveraging the standard authentication service IACAuthentication and updating the authentication activities to match the external system’s requirements is a common practice.

D: Configuring application permissions by specifying a list of trusted domains in the application rule is important for security purposes and to control which external domains are allowed to embed the mashup.

Reference: Pega official documentation on Pega Web Mashup configuration.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments