
Security in Pega is not just about authentication ā itās about defining who can do what inside an application. Pega uses a layered access control model that determines what users can see, which actions they can perform, and which rules or cases they can access.
Three key building blocks form the foundation of Pega security:
ā”ļø Access Groups
ā”ļø Access Roles
ā”ļø Privileges
Letās break them down.
Access Groups ā What application and capabilities does a user have?
An Access Group associates a user with:
- The application they are working onĀ
- The version of the applicationĀ
- The portal/UI they will see (App Studio, User Portal, Manager Portal, etc.)Ā

Think of an Access Group as a container that selects:
āWhich app + which UI + what roles should this user have?ā
Example:
SalesManager:01.01.01 ā allows a user to work in the Sales application and open Manager Portal.
Users can have multiple access groups, but only one active at a time.
Access Roles ā What level of access should a user have?
Access Roles define the actions a user can perform on cases, data, and rules.
A Role can define permissions such as:
- Whether a user can read a caseĀ
- Whether they can update a specific data classĀ
- Whether they can run a reportĀ

Roles are mapped to an Access Group, and multiple roles can be combined to give the user the correct permissions.
Examples:
- PegaRULES:UserĀ
- PegaRULES:SysAdm4Ā

Roles rely on underlying security rules such as:
- Access of Role to Object (ARO) ā defines access level to classesĀ
- Access When rules ā allow conditional access decisionsĀ
Privileges ā Access to specific rules or actions
Privileges provide granular, rule-level security.
You attach a privilege to a rule to control who can execute that specific rule.
Example:
- A Flow Action can require privilege ApproveLoanĀ
- Only users with a Role that contains that privilege can execute that stepĀ
Privileges help when:
- Certain actions should only be allowed for managersĀ
- Sensitive rules require restricted access (e.g., updating customer data)Ā
A single role can contain multiple privileges.Ā

How They Work Together (Simple Breakdown)
- A user is assigned an Access Group.Ā
This defines which application and portal the user can open.Ā
- The Access Group contains one or more Access Roles.Ā
These roles determine what the user is allowed to do inside the application. Each Access Role includes specific permissions and optional privileges. These permissions define access to classes, rules, and operations like read, write, or delete.Ā
- Privileges give control at the most granular level.Ā
If a rule (like a flow action or section) requires a privilege, only users with a role containing that privilege can execute it.Ā
Summary
Securing applications correctly is critical ā not only for compliance and audit readiness, but for ensuring that users have access only to what they need to get their job done.
Design access thoughtfully.
Grant roles intentionally.
Control privileges wisely.