FishEye 1.4 : Understanding security
This page last changed on Dec 06, 2007 by rosie@atlassian.com.
The following flowchart shows how to determine whether a user is allowed to access a FishEye repository: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() |
Document generated by Confluence on Dec 09, 2007 17:50 |