Talk:GLPi
This article was nominated for deletion on 3 June 2014 (UTC). The result of the discussion was no consensus. |
This article was nominated for deletion on 29 October 2010 (UTC). The result of the discussion was no consensus. |
This page was proposed for deletion by ErikHaugen (talk · contribs) on 22 October 2010 with the comment: The subject does not appear to meet the general notability guidelines required for inclusion as a stand-alone article. It was contested by 88.175.134.34 (talk · contribs) on 2010-10-29 |
This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||
|
Bug tracking?
[edit]It has a link from the Comparison of issue-tracking systems page, but hardly says something about issue (or bug) tracking. And then the screenshot is of what appears to be bug tracking... 69.23.109.100 (talk) 23:32, 6 June 2011 (UTC)
Neutrality
[edit]I reviewed the content and the history of GLPi solution. The purpose of the article is to describe GLPi and its functionalities: GLPi is open source and can be downloaded on the community's website directly for free. Some modifications have been made to be neutral. But How to fix the buzzwords problem ? — Preceding unsigned comment added by 185.10.252.128 (talk) 13:16, 6 October 2016 (UTC)
- I made an attempt at fixing the buzzwords issues. Phedrence (talk) 22:09, 4 April 2018 (UTC)
Privacy and security matters
[edit]GLPI requires the installation of a client software with root privileges on every computer to be managed. The root privilege triggers all kinds of questions related to privacy and security, which, in my opinion, ought to be addressed here.
- On privacy:
How invasive is this client? What information is collected? Is the user's privacy respected, and to what extent? And if so, what proof can be put forward to support the related claim?
- On security:
Since the client has root privileges, how secure is the server side? In other words, how likely is it that a malicious user or software getting access to one of the hosts of the GLPI server side could subsequently also get access, with root privileges, to all the computers equipped with the client, and what is the risk involved?
My questions are not meant to undermine GLPI, but rather to improve its credentials. It is rather difficult to find answers to those questions elsewhere on the web, and I think they ought to be addressed in a neutral place such as wikipedia.
JPP 82.216.43.203 (talk) 20:18, 5 December 2016 (UTC)
No : GLPI does not require any client, and does not require root privileges
[edit]There are many plugins for GLPI, and 2 of them (FusionInventory and OCS) need a client with root privileges to provide their main features. If privacy and security matters, you may read the sources, or choose to not use these plugins. A basic installation of GLPI (I mean without any plugin) does not need any client on computers and runs with the commonly used www-data user on the HTTP server.
DeTheGeek (talk) 12:34, 9 January 2017 (UTC)DeTheGeek — Preceding unsigned comment added by DeTheGeek (talk • contribs) 10:55, 9 January 2017 (UTC)
- All unassessed articles
- Unassessed Computing articles
- Unknown-importance Computing articles
- Unassessed software articles
- Unknown-importance software articles
- Unassessed software articles of Unknown-importance
- All Software articles
- Unassessed Free and open-source software articles
- Unknown-importance Free and open-source software articles
- Unassessed Free and open-source software articles of Unknown-importance
- All Free and open-source software articles
- All Computing articles