Defining role-based security

To create a secure project environment, you can define a security policy that is based on user authentication and role identification. Users derive authority from the combination of their individual and group roles. You can grant users greater responsibility by assigning multiple roles.

First you create a user and specify which product that user can access. Then, you specify which project that user can work in and what role the user has within the project. You can set this last level of security to secure sensitive information, such as identification numbers, and ensure that only the appropriate users have access to that data.