Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info
titlePeriscope User Access
Periscope utilizes usernames, passwords, and corresponding permissions, roles, and read and write capabilities that may have been configured in the host software for requisite end user access privileges, so best . Best practices should be followed in regards to assigning these access rights and sharing of any accounts and/or passwords


Network Details

Periscope sends information from Niagara