FishEye 2.4 : Understanding security
This page last changed on Nov 10, 2009 by edawson.
The following flowchart shows how to determine whether a user is allowed to access a FishEye repository: Screenshot: FishEye Security Flowchart |
![]() |
Document generated by Confluence on Oct 21, 2010 00:41 |