Pulse Security Model

The Pulse Security Rules are designed to be simple to apply for most situations – with flexibility to provide added security options when you need it.

There are two parts to the Pulse Security Model:

  1. What Project Access will a User have? (eg: ‘What Projects will they see?’)
  2. What Permission will a User have to use Tools & Features? (eg: ‘What can they DO in Pulse?’)

In this Chapter, you will learn about these Two parts of the Security Model.