Forum Discussion
What_Lies_Bene1
Nov 19, 2013Cirrostratus
If you ensure you only allocate tmsh access and the most appropriate user role based on your requirements, perhaps this will suffice? There's no way to restrict accesss down to the command level really.