Changes for page Dependency-Track
Last modified by Milad Afshar-Jahanshahi on 2025/09/03 14:31
From version 38.2
edited by Milad Afshar-Jahanshahi
on 2025/09/03 13:09
on 2025/09/03 13:09
Change comment:
There is no comment for this version
To version 38.1
edited by Milad Afshar-Jahanshahi
on 2025/09/03 13:06
on 2025/09/03 13:06
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -63,7 +63,7 @@ 63 63 64 64 == Collection Project == 65 65 66 -In Dependency-Track, these Maven builds are organized under a **Collection Project**. Subprojects (for example, individual modules of a Maven project) are created as children of the DevOps portal project. This makes it easier to see aggregated metrics, such as vulnerabilities and license compliance, without having to open each subproject individually.66 +In Dependency-Track, these Maven builds are organized under a **Collection Project**. Subprojects (for example, individual modules of a Maven project) are created as children of the portal project. This makes it easier to see aggregated metrics, such as vulnerabilities and license compliance, without having to open each subproject individually. 67 67 For more details, see the [[Collection Projects>>https://docs.dependencytrack.org/usage/collection-projects/]] section in the Dependency-Track documentation. 68 68 69 69 = Users and Roles = ... ... @@ -75,11 +75,11 @@ 75 75 76 76 * When Dependency-Track is added as a tool to an existing or new project, a corresponding subwiki is automatically created. Users assigned to the project in the DevOps Portal are then added to the subwiki with the roles defined in the configuration : 77 77 ** Role mapping: ((( 78 -|=Project Role in DevOps Portal|=Permissions in Dependency-Track79 -|Admin|POLICY_VIOLATION_ANALYSIS, VIEW_POLICY_VIOLATION,VIEW_PORTFOLIO,VIEW_VULNERABILITY,VULNERABILITY_ANALYSIS80 -|Master|(% colspan="1" %) POLICY_VIOLATION_ANALYSIS,VIEW_POLICY_VIOLATION,VIEW_PORTFOLIO,VIEW_VULNERABILITY,VULNERABILITY_ANALYSIS81 -|Developer|(% colspan="1" %) POLICY_VIOLATION_ANALYSIS,VIEW_POLICY_VIOLATION,VIEW_PORTFOLIO, VIEW_VULNERABILITY, VULNERABILITY_ANALYSIS82 -|Viewer| VIEW_POLICY_VIOLATION,VIEW_PORTFOLIO,VIEW_VULNERABILITY78 +|=Project Role in DevOps Portal|=Permissions in XWiki 79 +|Admin| POLICY_VIOLATION_ANALYSIS,''VIEW_POLICY_VIOLATION,''VIEW_PORTFOLIO,'VIEW_VULNERABILITY,''VULNERABILITY_ANALYSIS' 80 +|Master|(% colspan="1" %)Can view, comment, and edit pages, but cannot delete content 81 +|Developer|(% colspan="1" %)Similar to Master 82 +|Viewer|Read-only access. Can only view content, no edits or comments allowed 83 83 84 84 A detailed description of the XWiki role model can be found [[here>>https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/Permission%20types/]] 85 85 )))