...
Info | ||
---|---|---|
| ||
Periscope utilizes usernames, passwords, and corresponding permissions, roles, and read and write capabilities that may have been configured in the host software for requisite end user access privileges, so best . Best practices should be followed in regards to assigning these access rights and sharing of any accounts and/or passwords. |
Network Details
Periscope sends information from Niagara