This article details the configuration of user credentials and security permissions, the reader of this article should have read the Pulse Security and Pulse Group Security articles.