Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
| Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
What's a 'baton'?
What is impersonation?
How do Merge subscriptions work?
What are the system requirements for Merge?
What operating systems does Subversion run on?
How to move a CS-RCS project to CS-CVS?
What is the default vob size?
How does the Hide Empty Folders command in the folder comparison window work?
What is subversion?
Tell me what configuration management tools are available?
Which versions of Merge are Year 2000 (Y2K) compliant?
What is the "best" CM tool to use?
Is there a version of Merge for Mac OS X?
What are the benefits of SCM?
What dependencies does eSvn have?