Discussion

2
Replies
433
Views
PRPC_7_1 Member since 2009 3 posts
Virtusa
Posted: 5 years ago
Last activity: 5 years 3 months ago
Closed

Unathenticated rule set inheritance

What should be the rule set hierarchy while creating unauthenticated rule set?

Should it be depend on only pega base rule set?

 

Security
Moderation Team has archived post
Share this page LinkedIn