Security model

Contact records created in Fusion Service and users created in IDCS, map to a few proxy users that are created during initial setup.

The proxy users define the functional privileges that are accessible to the users.

A graphic of the proxy user security model.