FishEye 2.3 : Understanding security
This page last changed on Nov 10, 2009 by edawson.
The following flowchart shows how to determine whether a user is allowed to access a FishEye repository: Screenshot: FishEye Security Flowchart |
![]() |
Document generated by Confluence on Jul 29, 2010 02:16 |