A service is created to run activity, service package is enabled with Basic authentication. In this service activity Security tab, ‘Require authentication to run’ should be checked or not because service package is already taking care of authentication.
What will the service activity authentication if in case service package is not using any authentication.
Please share your thoughts and best practice in this scenario.
I created another service to run a flow by using Service Wizard. svcAddWorkObject activity is service activity and it is calling multiple activities from it. All these activities authentication check box is unchecked. Does this mean Security check box of service activities can be unchecked always?
1. If Require authentication to run checkbox is un-checked and you run the service with or without authentication it doesn't differ as activity is not looking for authentication check.
2. If Require authentication to run checkbox is checked and you run the service without authentication let's say basic authentication, you will get "You lack access required to run the activity" error as in order to run the activity authentication is required.
Require authentication to run
Select to require that only authenticated requestors can start this activity.
Clear to allow guest users to run this activity, if they meet other security and access criteria. Guest users — unauthenticated requestors — typically have access to rules in the RuleSets provided in the PRPC:Unauthenticated access group, as referenced in the Requestor type instance named pega.BROWSER.
If you update the BROWSER requestor type to reference a different access group, or update the PegaRULES:Unauthenticated access group to make additional RuleSets available to unauthenticated users, review carefully this check box for each activity in the RuleSets. Select this check box for all but those specific activities that guests need to run.
In most cases, clear this check box if the activity is for an agent. Agents are not true authenticated users and by default cannot run activities that are restricted to authenticated users. However, this check box is ignored by agents for which the Bypass activity authentication check box (on the Security tab is checked; they can run activities regardless of the Authenticate? value.
Identify privileges in this array to restrict which users and other requestors can execute this activity. At runtime, if the user does not possess an access role that — through an Access of Role to Object rule — provides access to one of the identified privileges, the execution of the activity fails.