The Pulse Security Rules are designed to be simple to apply for most situations – with flexibility to provide added security options when you need it.
There are two parts to the Pulse Security Model:
- What Project Access will a User have? (eg: ‘What Projects will they see?’)
- What Permission will a User have to use Tools & Features? (eg: ‘What can they DO in Pulse?’)
In this Chapter, you will learn about these Two parts of the Security Model.