Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
| Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
What role do you see for the use of authentication processes such as digital signatures in helping to maintain version control?
Explain impersonation?
Hi can any one help me what are the prerequisites to billed before forecasting in SAP APO DP.............like blue sheet kindly help me the steps............
What are the benefits of SCM?
What operating systems does Subversion run on?
Is there a version of Merge for Mac OS X?
How to submit a patch for Subversion?
What's the best way to find out more about the capabilities of QVCS?
How would you use Version Control on an entire sub-system? And why would this be useful?
What is eSvn?
What's a 'bikeshed'?
Can you uninstall an older version of Merge before installing a newer version or build?
What is the difference between configuration management tool and version control tool?
Can we use Merge to compare and synchronize local files with those on a web or FTP site?
How to move a project created by another version-control tool to CS-CVS?