This article details the Group security, the reader of this article should have read the Pulse Security article.