Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)
A . Leverage the standard authentication service IACAuthentication and update the authentication activities.
B . Add an access group for the application rules that need to be accessed from the external system.
C . Configure a node-level data page to hold security access information about the external system.
D . Configure the application permissions by specifying a list of trusted domains in the application rule.
Answer: A, D
Explanation:
A: When using a Pega Web Mashup, leveraging the standard authentication service IACAuthentication and updating the authentication activities to match the external system’s requirements is a common practice.
D: Configuring application permissions by specifying a list of trusted domains in the application rule is important for security purposes and to control which external domains are allowed to embed the mashup.
Reference: Pega official documentation on Pega Web Mashup configuration.
Latest PEGACPSSA23V1 Dumps Valid Version with 141 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund