Process Mining Data Source Configuration

Hi we need detailed I repeat detailed documentation on the following topics for Process Mining:

  1. Configuration of Web Services i.e. REST APIs to access an on-prem datasource from Process Mining

a) How to

b) Security protocols

  1. Configuration of File Exchange where an encrypted file is pushed to the Process Mining Cloud datastore

a) How to

b) Encryption and decryption procedure

c) Encryption key management

The existing documentation on both sites ie. Academy and Documentation have been thoroughly evaluated.

@Jon Gupta

Thank you for your questions.

Because of the sensitive nature of these inquiries, we recommend that you collaborate with your Pega account team assigned to your company. Pega account team can submit an internal request to Pega’s client inquiry team, which specializes in providing assistance with security and compliance-related issues. Please note that, according to our internal policy, these requests must be documented and audited through our client inquiry process.

Thank you once again. We appreciate it.

cc @holmj @dixoc

@Jon Gupta Currently, Pega Process Mining does not offer exhaustive public documentation specifically detailing REST API configuration for on-prem data access or the secure file exchange process with encryption. However, for REST API configuration, you typically set up a connector in the Process Mining UI, define the endpoint URL, and configure OAuth2 or Basic Authentication under security settings. You must ensure network access between the cloud and on-prem server via VPN or secure tunnel. For file exchange, encrypted files (AES or PGP encryption recommended) are usually pushed to a dedicated SFTP or cloud bucket linked to the Pega Process Mining workspace. Decryption is managed using asymmetric key pairs, where the private key remains securely configured in the Process Mining environment, and public keys are used by the sender. Key rotation and management should be handled through your enterprise key vault (e.g., Azure Key Vault or AWS KMS).