Monitoring, Version 6.2
Complete the following steps to define which users can make requests to a hub and assign access privileges to those users, using a graphical user interface:
The values for that hub are displayed in the section above the tree.
If the Security: Validate User option is enabled on the hub, the user ID must be a valid user ID on the hub system.
See Table 69 for a list of the method each type of access includes.
The user ID appears under the appropriate subnode of the Access node of the selected hub.
[ Top of Page | Previous Page | Next Page | Contents | Index ]