Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
What is the difference between a Change and a Conflict?
What are the benefits of SCM?
What dependencies does eSvn have?
What is impersonation?
What Problem Management tools are available?
Do you agree addressing the versioning issue is something GPO clearly needs to do, in conjunction with authentication and permanent public access ?
Tell me is version control more for software development or software maintenance?
How does Subversion handle binary files?
How many separate files do you have under QVCS control for managing the QVCS product itself?
How to move a project created by another version-control tool to CS-CVS?
Is there a separate QVCS API library available for embedding version control into a non-QVCS application?
Which versions of Merge are Year 2000 (Y2K) compliant?
What are the system requirements for Merge?
What is the difference between the Standard and Professional Editions of Merge?
What is subversion?