-
Will PM support a connector for MDX?
-
Will PM support a connector for REST APIs including OAUTH2 support?
-
How do PM file connectors manage decryption using asymmetric keys where Pegas PM admin operators do not have access to customer data
@Jon Gupta
Thank you for your questions.
Because of the sensitive nature of these inquiries, we recommend that you collaborate with your Pega account team assigned to your company. Pega account team can submit an internal request to Pega’s client inquiry team, which specializes in providing assistance with security and compliance-related issues. Please note that, according to our internal policy, these requests must be documented and audited through our client inquiry process.
Thank you once again. We appreciate it.
@Jon Gupta Pega Process Mining does not currently provide native support for MDX (Multidimensional Expressions) connectors, as MDX is typically used with OLAP cubes and Pega PM focuses more on structured data sources like CSVs, databases, and REST APIs. However, Pega PM does support REST API integration and can be configured to use OAuth2 authentication, enabling secure access to modern data services. For file connectors involving encryption, Pega PM supports decryption using asymmetric keys by allowing public key-based decryption mechanisms. In such cases, the customer encrypts data using a public key, and only the private key (held securely by PM’s backend system) can decrypt it. This ensures that PM admin operators never directly access unencrypted customer data, maintaining data privacy and security throughout the integration process.
@Sairohith thx. Could you clarify the encryption / decryption process because what we ultimately want to achieve is that Pega PM Cloud Admin Operators (your employees) cannot access the data we upload to the PM VPC thereby securing that only our PM users have access to the data we upload. This is really important and a potential show stopper in using PM due to the sensitive nature of the data.
@Jon Gupta To ensure that only your Pega process mining users can access your uploaded data and not Pega Cloud Admin Operators, you can use client-side encryption with asymmetric keys. In this approach, you encrypt your files before uploading using your organization’s private key or a public key provided by the PM system. Once uploaded, only users within your organization who have the correct private key or decryption capability can access and view the data. Pega PM will process the encrypted files but won’t be able to decrypt or read the data unless explicitly permitted. Additionally, Pega PM can be deployed in a dedicated Virtual Private Cloud (VPC) with strict access controls and audit logs, ensuring no unauthorized admin access. This setup helps meet high-security standards for sensitive data and supports compliance with internal and regulatory privacy requirements.