Zabbix 5.2 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, 3rd party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured with a collection of shell scripts, JAR and configuration files under $PREFIX/sbin/zabbix_java. The role of these files is summarized below. bin/zabbix-java-gateway-$VERSION.jar Java gateway JAR file itself0 码力 | 1738 页 | 18.98 MB | 1 年前3Zabbix 6.2 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, third-party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured only. A new subsection Template groups has been added to the Configuration menu. User role and user group permissions are now defined separately for host groups and template groups. AWS EC2 monitoring A0 码力 | 1689 页 | 22.82 MB | 1 年前3CloudBeaver User Guide v.23.3
new user for logging into the system. Assigning a Team to the New User: A team will define the permissions the user has within the system. For additional information regarding teams and their definitions created user can now be authenticated to CloudBeaver using local authentication. The user's permissions are defined according to their assigned profile. CloudBeaver Enterprise Edition also allows you users are only granted access and permissions necessary for their tasks. CloudBeaver User Guide 23.3. Page 28 of 252. You can use teams to manage connection permissions in CloudBeaver. As a team is added0 码力 | 252 页 | 21.86 MB | 1 年前3Zabbix 5.4 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, third-party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured opportunity to allow/deny management of API tokens has been added to user role permissions. Super admins with sufficient permissions can create and manage API tokens in the Administration→General frontend0 码力 | 1825 页 | 20.03 MB | 1 年前3Zabbix 6.4 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, third-party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured frontend sections. Note that access to the new menu depends on the user type and defined user role (see Permissions for more details). Cause and symptom problems The new version comes with an option to mark0 码力 | 1885 页 | 29.12 MB | 1 年前3Zabbix 7.0 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, third-party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured history.push API method is also available in the Allow/Deny list of API methods when configuring a user role. Faster permission checks Permission checks have been made much faster by introducing several intermediary0 码力 | 1949 页 | 31.91 MB | 1 年前3Zabbix 6.0 Manual
your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers interface to Zabbix for mass manipulations, third-party software integration and other purposes. Permissions system • secure user authentication • certain users can be limited to certain views Full featured rules for propagating a service status to parent services. Permissions Flexible permissions to services have been implemented on user role level. Read-write or read-only access can be granted to all0 码力 | 1681 页 | 23.19 MB | 1 年前3Spring Security Shiro Plugin - Reference Documentation
2.1. User Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2. Role Permissions. . . . . Shiro credentials when you explicitly logout. 1.1. History • Version 3.2 ◦ Added optional role-based permissions capability • Version 3.1.1 ◦ released April 19, 2018 ◦ Update Spring Security Shiro version script. 2.1. User Permissions To use the Shiro annotations and methods you need a way to associate roles and permissions with users. The Spring Security Core plugin already handles the role part for you,0 码力 | 8 页 | 122.93 KB | 10 月前3Learning Laravel
Pagination 140 Examples 140 Pagination in Laravel 140 Changing pagination views 141 Chapter 46: Permissions for storage 142 Introduction 142 Examples 142 Example 142 Chapter 47: Policies 143 Examples anywhere by anyone, the rest of the app code is invisible or inaccessible to anyone without proper permissions. After developing the application on your development machine, it needs to be pushed to a production Such shared hosting packages, however do have limitations in terms of terminal access and file permissions. By default one has to upload their app/code to the public_html folder on their shared hosting0 码力 | 216 页 | 1.58 MB | 1 年前3CloudBeaver User Guide v.23.2
new user for logging into the system. Assigning a Team to the New User: A team will define the permissions the user has within the system. For additional information regarding teams and their definitions created user can now be authenticated to CloudBeaver using local authentication. The user's permissions are defined according to their assigned profile. CloudBeaver Enterprise Edition also allows you users are only granted access and permissions necessary for their tasks. CloudBeaver User Guide 23.2. Page 25 of 182. You can use teams to manage connection permissions in CloudBeaver. As a team is added0 码力 | 182 页 | 15.64 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100