For what it's worth, here's my two cents,
I think the manner in which MEDM deals with channel access security has
been done well. It seems to handle most of the concerns discussed here.
You can immediately discern which objects don't have read access. Instead
of adding another level of complexity to objects on already too busy screens,
I am willing to live with moving the mouse to see if I have write access.
Dave
/\
/\ /\/\/ \/\/\ /\ /\/\ /\ /\ /\
__/ \/\/ \/\/\/ \/ \/\/\/\/ \ /\/\/\/\/\/\/ \/\ /\/ \
David M. Wetherholt - [email protected] \/ (804) 249-5066 \/\/\/
/\ /\ Continuous Electron Beam Accelerator Facility
\/ \ /\/\/ \/\/\ /\ /\/\ /\ /\ /\ /\ /\
\/\/ \/\/\/ \/ \/\/\/\/\/\/\/\/\/ \/ \/ \/\/ \/\/\/ \
- References:
- Re: EPICS Access Security Andrew Johnson
- Navigate by Date:
- Prev:
Re: EPICS Access Security watson
- Next:
FW: EPICS Access Security Mark S. Engbretson
- Index:
1994
1995
<1996>
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
- Navigate by Thread:
- Prev:
Re: EPICS Access Security Thomas Birke
- Next:
FW: EPICS Access Security Mark S. Engbretson
- Index:
1994
1995
<1996>
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
|