This manual is aimed at the person who will be the administrator for FlowTracer. This person will be responsible for configuring the network resources, setting up the licensing, and establishing
security and access rules for the system.
When using FlowTracer in large deployments, three main roles emerge: Administrator, Developer and User. In smaller organizations, a given
person may have multiple roles, but the duties of each role still exist.
This section explains how to set up a UNIX user's shell environment to have a proper context for the user to run installed Altair Accelerator programs from the command line. The programs that are run from the command line are called the CLI commands.
This section explains how to set up a Window user's command prompt environment to have the proper context for the
user to run installed Altair Accelerator programs from the command line. The programs that are run from the command line are called the CLI commands.
VOV issues an "alert" when an event requires attention. An alert can range from information that does not require
action to an urgent fault that requires immediate action.
The VOV security model consists of assigning a Security Code to each client or client group (VovUser Group) and granting the permission to execute critical tasks only
to clients with the appropriate security level.
If a server crashes suddenly, VOV has the capability to start a replacement server on a pre-selected host. This capability
requires that the pre-selected host is configured as a failover server.
FlowTracer now supports a "multi-user" mode of operation, as a Beta feature. In the multi-user mode, many different
users can share the same project, in terms of modifying a flow as well as running different compoments of the flow.
The browser interface requires the user to authenticate using matching login and password. The authentication remains
valid until you either terminate the browser or logout.
This manual is aimed at the person who will be the administrator for FlowTracer. This person will be responsible for configuring the network resources, setting up the licensing, and establishing
security and access rules for the system.
Browser Security
The browser interface requires the user to authenticate using matching login and password. The authentication remains valid until you either terminate the browser or logout.