/a+ 命令
使用 /a+ 將使用者或群組的使用權限加入至伺服器層級、集合層級或專案層級群組。若要將使用者介面中的使用者新增至群組中,請參閱設定使用者、群組和使用權限。
必要的使用權限
若要使用 /a+ 命令,您必須分別將 [檢視集合層級資訊] 或 [檢視執行個體層級資訊] 權限設為 [允許],視您使用的是 /collection 或 /server 參數而定。如果您要變更 Team 專案的權限,則必須也具備 [編輯專案層級資訊] 權限可將 Team 專案設定為 [允許]。如需詳細資訊,請參閱 Team Foundation Server 使用權限。
TFSSecurity /a+ Namespace Token Action Identity (ALLOW | DENY) [/collection:CollectionURL] [/server:ServerURL]
參數
引數 |
描述 |
---|---|
Namespace |
命名空間,其中包含您要加入使用者或群組權限的群組。您也可以使用 TFSSecurity /a 命令來檢視伺服器、集合和專案層級的命名空間清單。 |
Token |
您要加入權限的物件其名稱或 GUID。
注意事項
語彙基元 (Token) 會視您指定的命名空間而有所不同。某些命名空間並沒有要為此命令套用的語彙基元。
|
Action |
您正在授與或拒絕存取權限的權限名稱。如需有效 ID 清單,請參閱 Team Foundation Server 使用權限,或使用 TFSSecurity /a 命令檢視您所指定命名空間的有效動作清單。 |
Identity |
使用者或群組的識別。如需識別規範的詳細資訊,請參閱 TFSSecurity 識別和輸出規範。
|
/collection:CollectionURL |
如果不使用 /server 則為必要項。依下列格式指定 Team 專案集合的 URL:http://ServerName:Port/VirtualDirectoryName/CollectionName |
/server:ServerURL |
如果不使用 /collection,則為必要項。依下列格式指定應用程式層伺服器的 URL:http://ServerName:Port/VirtualDirectoryName |
備註
在 Team Foundation 的應用程式層伺服器上執行此命令。
存取控制項目是一些安全性機制,可判斷使用者、群組、服務或電腦獲得授權執行的作業。
範例
下列範例會顯示伺服器層級上有哪些命名空間可供名為 ADatumCorporation 的應用程式層伺服器使用。
注意事項 |
---|
範例僅供解說之用,皆為虛構。沒有影射任何真實存在的人事物,也不應推斷為與其有所關聯。 |
>tfssecurity /a /server:ServerURL
範例輸出:
TFSSecurity - Team Foundation Server Security Tool
Copyright (c) Microsoft Corporation. All rights reserved.
The target Team Foundation Server is http://ADatumCorporation:8080/.
The following security namespaces are available to have permissions set on them:
Registry
Identity
Job
Server
CollectionManagement
Warehouse
Catalog
EventSubscription
Lab
Done.
下列範例會顯示何種動作可供空間層級中伺服器命名空間使用。
>tfssecurity /a Server /collection:CollectionURL
範例輸出:
TFSSecurity - Team Foundation Server Security Tool
Copyright (c) Microsoft Corporation. All rights reserved.
The target Team Foundation Server is http://ADatumCorporation:8080/.
The following actions are available in the security namespace Server:
GenericRead
GenericWrite
Impersonate
TriggerEvent
Done.
下列範例會將「檢視執行個體層級資訊」伺服器層級權限授與 Datum1 網域使用者 John Peoples (Datum1\jpeoples) 的 ADatumCorporation 部署。
>tfssecurity /a+ Server FrameworkGlobalSecurity GenericRead n:Datum1\jpeoples ALLOW /server:http://ADatumCorporation:8080
範例輸出:
TFSSecurity - Team Foundation Server Security Tool
Copyright (c) Microsoft Corporation. All rights reserved.
The target Team Foundation Server is http://ADatumCorporation:8080/.
Resolving identity "n:Datum1\jpeoples"...
[U] Datum1\jpeoples (John Peoples)
Adding the access control entry...
Verifying...
Effective ACL on object "FrameworkGlobalSecurity":
[+] GenericRead [INSTANCE]\Team Foundation Valid Users
[+] GenericRead [INSTANCE]\SharePoint Web Application Services
[+] Impersonate [INSTANCE]\SharePoint Web Application Services
[+] GenericRead [INSTANCE]\Team Foundation Service Accounts
[+] GenericWrite [INSTANCE]\Team Foundation Service Accounts
[+] Impersonate [INSTANCE]\Team Foundation Service Accounts
[+] TriggerEvent [INSTANCE]\Team Foundation Service Accounts
[+] GenericRead [INSTANCE]\Team Foundation Administrators
[+] GenericWrite [INSTANCE]\Team Foundation Administrators
[+] TriggerEvent [INSTANCE]\Team Foundation Administrators
[+] GenericRead DATUM1\jpeoples
Done.
下列範例會將「檢視集合層級資訊」集合層級權限授與 Datum1 網域使用者 John Peoples (Datum1\jpeoples) 的 Collection0 Team 專案集合。
>tfssecurity /a+ Server FrameworkGlobalSecurity GenericRead n:Datum1\jpeoples ALLOW /collection:http://ADatumCorporation:8080/Collection0
範例輸出:
TFSSecurity - Team Foundation Server Security Tool
Copyright (c) Microsoft Corporation. All rights reserved.
The target Team Foundation Server is http://ADatumCorporation:8080/COLLECTION0.
Resolving identity "n:Datum1\jpeoples"...
[U] DATUM1\jpeoples (John Peoples)
Adding the access control entry...
Verifying...
Effective ACL on object "FrameworkGlobalSecurity":
[+] GenericRead [Collection0]\Project Collection ValidUsers
[+] GenericRead [Collection0]\Project Collection Service Accounts
[+] GenericWrite [Collection0]\Project Collection Service Accounts
[+] Impersonate [Collection0]\Project Collection Service Accounts
[+] TriggerEvent [Collection0]\Project Collection Service Accounts
[+] GenericRead [Collection0]\Project Collection Administrators
[+] GenericWrite [Collection0]\Project Collection Administrators
[+] TriggerEvent [Collection0]\Project Collection Administrators
[+] GenericRead [INSTANCE]\SharePoint Web Application Services
[+] Impersonate [INSTANCE]\SharePoint Web Application Services
[+] GenericRead [Collection0]\Project Collection Build Service Accounts
[+] GenericRead DATUM1\jpeoples
Done.