After you determined your security strategy, you configure
and create the appropriate security policies and roles and then specify
to which users the people with those roles can assign project roles
and access levels.
Have feedback?
Google Analytics is used to store comments and ratings. To provide a comment or rating for a topic, click Accept All Cookies or Allow All in Cookie Preferences in the footer of this page.