3.2. User Administration .....................................................................................................................................40
3.2.1. Creating the Default User ................................................................................................................40
3.2.2. Managing Other Users.....................................................................................................................40
3.2.2.1. Searching for existing users ................................................................................................41
3.2.2.2. Creating new users ..............................................................................................................41
3.2.2.3. Modifying Users .................................................................................................................41
3.2.2.4. Deleting Users.....................................................................................................................43
3.2.2.5. Impersonating Users ...........................................................................................................43
3.3. Classifications...............................................................................................................................................43
3.4. Products........................................................................................................................................................44
3.4.1. Creating New Products ....................................................................................................................45
3.4.2. Editing Products...............................................................................................................................45
3.4.3. Adding or Editing Components, Versions and Target Milestones...................................................45
3.4.4. Assigning Group Controls to Products............................................................................................45
3.4.4.1. Common Applications of Group Controls ..........................................................................46
3.5. Components..................................................................................................................................................48
3.6. Versions ........................................................................................................................................................49
3.7. Milestones ....................................................................................................................................................49
3.8. Flags ...................................................................................................................... .......................................49
3.8.1. A Simple Example...........................................................................................................................50
3.8.2. About Flags......................................................................................................................................50
3.8.2.1. Values ..................................................................................................................................50
3.8.3. Using flag requests...........................................................................................................................51
3.8.4. Two Types of Flags..........................................................................................................................51
3.8.4.1. Attachment Flags ................................................................................................................51
3.8.4.2. Bug Flags ............................................................................................................................51
3.8.5. Administering Flags.........................................................................................................................51
3.8.5.1. Editing a Flag ......................................................................................................................52
3.8.5.2. Creating a Flag ....................................................................................................................52
3.8.5.3. Deleting a Flag ....................................................................................................................54
3.9. Keywords......................................................................................................................................................54
3.10. Custom Fields.............................................................................................................................................54
3.10.1. Adding Custom Fields ............................................................................ .......................................55
3.10.2. Editing Custom Fields ...................................................................................................................55
3.10.3. Deleting Custom Fields .................................................................................................................56
3.11. Legal Values ...............................................................................................................................................56
3.11.1. Viewing/Editing legal values .........................................................................................................56
3.11.2. Deleting legal values......................................................................................................................56
3.12. Bug Status Workflow..................................................................................................................................56
3.13. Voting .........................................................................................................................................................57
3.14. Quips ..........................................................................................................................................................57
3.15. Groups and Group Security........................................................................................................................57
3.15.1. Creating Groups.............................................................................................................................58
3.15.2. Editing Groups and Assigning Group Permissions .......................................................................59
3.15.3. Assigning Users to Groups ............................................................................................................60
3.15.4. Assigning Group Controls to Products..........................................................................................60
3.16. Checking and Maintaining Database Integrity...........................................................................................60
v
评论1