The following basic steps need to be completed to enable users to start using Pulse Connect Secure.
Create a test scenario to familiarize yourself with the process (see Creating a Test Scenario to Learn Concepts and Best Practices).
Create the user roles that enable access mechanisms, session options, and UI options for user groups.
Create a user authentication realm that specifies the conditions that users must meet to sign into the device.
Define a sign-in policy that specifies the URL that users must access to sign into the device and the page that they see when they sign in.
Create resource profiles that control access to resources, specify which user roles can access them, and include bookmarks that link to the resources.
After completing the basic steps, your system is ready for use. You can start using it as it is, or configure additional advanced features such as endpoint defense and clustering.