Recently Updated Pages
Certificates and their Uses
Network Fandango Service The following certificates are generated by the Network Fandango Service...
Database Schema
Computers
Authentication
The authentication flow is modeled on that of SSH, specifically using keyfiles. The steps involve...
Network Discovery
Network discovery occurs in a number of different ways. For administrators with control over thei...
Overview
Network Fandango (NF) is a combination of traditional network management suite and Infrastructure...
02 Authentication
Logging in as the first user on a new installation To log in under these circumstances, all you h...
01 The Basics
Common Parameters All Commands These parameters work with all commands. --json Outputs the resul...
03 User Management
Create a user nf user add <username> Creates a user with a randomised initial login token. The t...
04 User Interface
03 User Stories
02 Project Scope
What it is What it is not
01 Overview
Se2 is intended to be the spiritual successor to SendTo 1.6, which was originally a Trogsoft prod...
06 Data Model
Data Model Plotwise Writer Projects are self-contained SQLite3 databases. ER Diagram / Schemas He...
04 Architecture
Architecture Container Diagram Tech Stack & Rationale Cross‑cutting Concerns Open Questions
07 User Interface
Main Window
03 Solution Overview
Solution Overview System‑context Diagram Key User Journeys High‑level Risks
02 Requirements
Requirements Functional Requirements Non‑Functional Constraints & Assumptions
01 Vision
Product Vision Problem Statement Goals & Non‑Goals Success Metrics Stakeholders & Personas