FishEye 2.1 : Understanding security
This page last changed on Nov 10, 2009 by edawson.
The following flowchart shows how to determine whether a user is allowed to access a FishEye repository: Screenshot: FishEye Security Flowchart |
![]() |
Document generated by Confluence on Nov 11, 2009 21:21 |