Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)
A: When using a Pega Web Mashup, leveraging the standard authentication service IACAuthentication and updating the authentication activities to match the external system's requirements is a common practice.
D: Configuring application permissions by specifying a list of trusted domains in the application rule is important for security purposes and to control which external domains are allowed to embed the mashup. Reference: Pega official documentation on Pega Web Mashup configuration.
Currently there are no comments in this discussion, be the first to comment!