Rigid contact TFS, There are too many functions to know how to configure , Today I want to know TFS Report function of , When logging in TFS after , Click on... In the project “ Check the report ”

As shown in the figure below :

after google It's a good turn , It finally solved the problem , Found where the permissions were set :

1、 Log in with an administrator account TFS, Click again “ Check the report ”, Go to the report manager page , Click on the “ Home folder ”:

Get into “ Home folder ” page , Click on “ Home folder settings ”:

Get into “ Home folder security ” Setup page , Click on “ New role assignment ”:

Enter the “ user name ”, Select the permissions you want to grant , Click on “ determine ”.

Then exit the administrator account , Log in with your own account TFS, You can view the report data .

TFS Report manager has no access to the configuration of more related articles

  1. For the first time to use windows Management interface access is installed in UNIX or linux Under the DP The solution to prompt unauthorized access to the server

    use windwos GUI When the management interface is connected, you will be prompted to have no permission to access : stay /etc/opt/omni/server/users/userlist  Add a row : "" "*" &q ...

  2. [ turn ]SQL Server 2008 How to configure Report Manager

    In this paper, from :https://docs.microsoft.com/zh-cn/previous-versions/sql/sql-server-2008/cc281384%28v%3dsql.100%2 ...

  3. SSRS Report Manager http://localhost/Reports HTTP500 Internal error handling

    Original address :http://www.cnblogs.com/zzry/p/5716056.html With a lot of machines installed sqlserverBI Components In the initial installation configuration Browse Report Manager  http://localh ...

  4. windows Post slot mailslot After being established in the service program, the client has no access right (GetLastError() == 5) The problem of

    The post slot is created in the service program , Can be created successfully , But when external clients connect m_hMailslot = CreateFile("\\\\.\\mailslot\\zdpMailslot",GENER ...

  5. VS IIS register as well as IIS No permission to access

    VS2008 IIS Re registration 2008-11-21 9:06 Unable to display XML page -- The name begins with an invalid character 2008-10-17 15:19 Unable to display XML page -- The name begins with an invalid character .iis Solutions to errors in processing resources 2 ...

  6. win7 Problem solving , Credential manager and cannot access , It is not allowed for a user to use more than one user name to make multiple connections with the server or shared resources .

    WIN7 Credential manager , If you log in remotely with an account, you will remember this information in your computer , If you want to use another account , So go to the control panel - Modify or delete in the credential manager . If you log in and prompt ,“ cannot access . A user is not allowed to use a ...

  7. yum Software Manager , And yum Source configuration

    Speaking of yum The source must say linux The unique dependency problem in the system ,yum It exists to solve the dependency relationship .yum The source is equivalent to a catalog item , When we use yum When the mechanism installs the software , If you need to install dependent software , be yum The mechanism will be based on yu ...

  8. attach :Struts2-CRM, Interceptor to achieve access rights

    Interceptor code : package mycrm.interceptor; import org.apache.struts2.ServletActionContext; import com.opensym ...

  9. Tomcat 8.5 There is no permission to access the version file after uploading

    Before that tomcat 7 After the next file upload, access has been no problem , Now? tomcat Version up to 8.5, In the test file http Upload time , It is found that the transferred file cannot pass nginx Visited . (Tomcat The specific version is 8.5.11) PS:tom ...

Random recommendation

  1. Arrangement sed How to modify multi line configuration in actual combat

    The old boy is related to the teacher sed Practical skills sharing , From the actual combat of classroom teaching content 1. Insert two lines before the specified line , Respectively oldboy and oldgirl. Tips : The content of the modified file must be greater than or equal to 2 That's ok 1 sed -i '2 ioldboy\ ...

  2. gist c code

    http://lear.inrialpes.fr/software Fisher kernel: http://vision.caltech.edu/~sbranson/code/index.html ...

  3. 13、 ... and .iptabled To configure

    Mid term cluster architecture - Chapter 13 -iptables Firewall network security practice configuration ========================================= 01:iptables Introduction to firewall network security Learn from good examples ip ...

  4. Django Introduction to the framework - Model system

    2.5 Model 2.5.1 ORM Introduce 2.5.1.1 ORM Concept Object relation mapping (Object Relational Mapping, abbreviation ORM) Schema is a kind of solution to the mismatch between object-oriented and relational database ...

  5. Machine learning interview -- In a word, it sums up the tradition ML Algorithm

    The process of machine learning mainly includes : Feature extraction of data . Data preprocessing . Training models . test model . Model evaluation and improvement Traditional machine learning algorithms mainly include the following five categories : Return to : Establish a regression equation to predict the target value , For continuous distribution prediction classification : Given a large number of bands ...

  6. Node Introductory tutorial (11) Chapter nine :Node Network module

    net Network module net The module is node Yes TCP perhaps IPC Encapsulation of development , Including the client and server related API. For reading this article , Please have a certain foundation of network programming . You need to know : ip agreement , Can configure ip Address understand dns Explain ...

  7. solve css Set background transparency , Words are opaque

    Set the transparency of the element :  -moz-opacity:0.8; /* stay Firefox Set element transparency in  filter: alpha(opacity=80); /*ie Use filters to set transparency   But when we look at a subject ...

  8. hihocoder1490 Tree Restoration simulation

    There is a tree of N nodes which are numbered from 1 to N. Unfortunately, its edges are missing so w ...

  9. 2018 Object oriented programming (Java) The first 1 Weekly learning guidance and requirements

    2018 Object oriented programming (Java) The first 1 Weekly learning guidance and requirements (2018.8.24-2018.9.2)   Learning goals Understand the teaching method of the course and the teaching requirements of the teacher , Master the necessary software tools for course learning : Simple understanding Java Characteristics and history ...

  10. HDU3605(KB11-M State compression + Maximum flow )

    Escape Time Limit: 4000/2000 MS (Java/Others)    Memory Limit: 65536/65536 K (Java/Others)Total Subm ...