Configuration
This article contains the basic model of the reference data of the section General.
The Access Management Solution provides a frame of rules and principles that lead to sound management of accesses to informational assets. It helps to formalize, in Octopus, the accesses granted or revoked, either as part of the arrival of a new employee, a departure, or simply in a request to add...
Related Articles
Conversion to custom fields
The notion of roles that will facilitate and improve the access management of Octopus and ensure the security level. Each role contains its own permissions and the Octopus users have one or more roles that automatically inherit the sum of the permissions from each role.
During the configuration of the Web portal, some incident templates and SR types can be made visible so that users can generate their request using a web form. The forms created with Octopus can be customized in many ways: the objective is to gather the required information to...
The use of activity types helps minimize data entry for messages sent regularly to users or to help Octopus users enter information in certain situations.
From the point where the advanced configuration of tasks is used in service requests, it will become mandatory that users submit their requests from the Web portal. Once this technique is used, requests created from an Octopus user, cannot generate the information required as it will...
The information contained in a CI record is very important for the Configuration Management and to control the inventory of a business.
In Octopus each CI type allows adding attributes, that represent additional information important to manage this type of equipment.
In...
When creating a new Octopus database, it comes with pre-established configurations to facilitate the integration experience of a request management tool based on ITIL key concepts. This article describes the content of these configurations.
