-
**NOTE: THIS ISSUE SHOULD NOT BE CLOSED BY THE ORIGINATOR IF ACCESS IS GRANTED**.
When the access is no longer needed please add a comment and a member
of the infrastructure team will revoke it and …
-
- [ ] Come up with a formal description of what is allowed and what is not
- [ ] Create protocols and procedures for requesting VPN access
- Make sure they understand what is allowed and what is not…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…