๐๏ธ Roles and Permissions
Deploy includes a fine-grained access control scheme to ensure the security of your middleware and deployments. The security scheme is based on the concepts of principals, roles, and permissions.
๐๏ธ Set up Roles and Permissions
Deploy provides fine-grained security settings based on roles and permissions that you can configure in the GUI and through the command-line interface (CLI).
๐๏ธ Manage Internal Users
Deploy supports role-based access control (RBAC) with two types of users:
๐๏ธ View Active User Sessions
As a System Administrator, you can view information about active user sessions, enabling you to proactively mitigate the impact of a system maintenance outage or similar event for active users. You can also use the Active Sessions page to drill down into deployment tasks and control tasks associated with a user.