An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner
how do you implement this requirement?
A.
create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.
B.
create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.
C.
create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.
D.
create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access
Create a new Access When rule that checks if the current user is either the primary or secondary owner of the account. Use conditions like current user = primary owner or current user = secondary owner.
Configure the Access When Rule:
Open the Account case type.
Go to the Security tab and in the Case Type rules, apply the created Access When rule to ensure that only users who meet the conditions (primary or secondary owners) can view or update the case.
Apply Access Control:
In the Access Role configuration, apply the Access When rule for read and write instances of the Account class.
Ensure that the roles assigned to the users have the necessary permissions configured.
Testing and Validation:
Test the implementation by logging in with users who are primary or secondary owners and verifying access.
Try logging in with users who are not owners to ensure access is denied.
References:
Pega Academy: Security and Access Control.
Pega Documentation: Access Control Policies and Access When Rules.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit