Answer Posted / technova
setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.
Is This Answer Correct ? | 9 Yes | 7 No |
Post New Answer View All Answers
Plz Let me the Difference Between Bea Weblogic IBM Websphere
How does the Hide Empty Folders command in the folder comparison window work?
How to move a CS-RCS project to CS-CVS?
What is the "best" CM tool to use?
When vob is created at first time?
How does Subversion handle binary files?
What are the benefits of SCM?
Can you uninstall an older version of Merge before installing a newer version or build?
What is eSvn?
What is "version control"?
What is the difference between QVCS-Enterprise, QVCS-Pro and QVCS?
Explain impersonation?
Is there a separate QVCS API library available for embedding version control into a non-QVCS application?
When CS-CVS should be used?
Hi can any one help me what are the prerequisites to billed before forecasting in SAP APO DP.............like blue sheet kindly help me the steps............