This topic section explains how to configure and work with user access controls that govern what actions each user can perform on the Virtualize Servers connected to his or her Virtualize Desktop installation. Sections include:
Table of Contents | ||
---|---|---|
|
Note that this topic does not cover security access controls in the virtual assets or message proxies that are accessed by the application under test (AUT). That is addressed in Working with Message Proxies and Configuring for Services Deployed Over HTTPS.
...