Configure security policies

After you determined your security strategy, you configure and create the appropriate security policies and roles and then specify to which users the people with those roles can assign project roles and access levels.