To protect your Projects, Pulse has a robust & flexible Security Model, which can control Who can access your Projects and What they can do with the Data in the Project.
Most aspects of the Pulse Security Model are managed via the Address Book.
There are two parts to the Pulse Security Model:
- What Project Access will a User have? (eg: ‘What Projects will they see?’)
- What Permission will a User have to use Tools & Features? (eg: ‘What can they DO in Pulse?’)
In this Chapter, you will learn about these Two parts of the Security Model.