šŸ” Access Control in Pega – Roles, Privileges, and Access GroupsĀ 

Security in Pega is not just about authentication — it’s about defining who can do what inside an application. Pega uses a layered access control model that determines what users can see, which actions they can perform, and which rules or cases they can access. 

Three key building blocks form the foundation of Pega security: 

āž”ļø Access Groups 
āž”ļø Access Roles 
āž”ļø Privileges 

Let’s break them down. 

Access Groups — What application and capabilities does a user have? 

An Access Group associates a user with: 

  • The application they are working onĀ 
  • The version of the applicationĀ 
  • The portal/UI they will see (App Studio, User Portal, Manager Portal, etc.)Ā 

Think of an Access Group as a container that selects: 

ā€œWhich app + which UI + what roles should this user have?ā€ 

Example: 
SalesManager:01.01.01 → allows a user to work in the Sales application and open Manager Portal. 

Users can have multiple access groups, but only one active at a time

Access Roles — What level of access should a user have? 

Access Roles define the actions a user can perform on cases, data, and rules. 

A Role can define permissions such as: 

  • Whether a user can read a caseĀ 
  • Whether they can update a specific data classĀ 
  • Whether they can run a reportĀ 

Roles are mapped to an Access Group, and multiple roles can be combined to give the user the correct permissions. 

Examples: 

  • PegaRULES:UserĀ 
  • PegaRULES:SysAdm4Ā 

Roles rely on underlying security rules such as: 

  • Access of Role to Object (ARO) → defines access level to classesĀ 
  • Access When rules → allow conditional access decisionsĀ 

Privileges — Access to specific rules or actions 

Privileges provide granular, rule-level security

You attach a privilege to a rule to control who can execute that specific rule

Example: 

  • A Flow Action can require privilege ApproveLoanĀ 
  • Only users with a Role that contains that privilege can execute that stepĀ 

Privileges help when: 

  • Certain actions should only be allowed for managersĀ 
  • Sensitive rules require restricted access (e.g., updating customer data)Ā 

A single role can contain multiple privileges.Ā 

How They Work Together (Simple Breakdown) 

  1. A user is assigned an Access Group.Ā 
    This defines which application and portal the user can open.Ā 
  1. The Access Group contains one or more Access Roles.Ā 
    These roles determine what the user is allowed to do inside the application. Each Access Role includes specific permissions and optional privileges. These permissions define access to classes, rules, and operations like read, write, or delete.Ā 
  1. Privileges give control at the most granular level.Ā 
    If a rule (like a flow action or section) requires a privilege, only users with a role containing that privilege can execute it.Ā 

Summary 

Securing applications correctly is critical — not only for compliance and audit readiness, but for ensuring that users have access only to what they need to get their job done. 

Design access thoughtfully. 
Grant roles intentionally. 
Control privileges wisely.