Advanced Search
Search Results
28 total results found
Se2
The spiritual successor to 2002's SendTo 1.6 (Trogsoft)
Plotwise Writer
Network Fandango
Plotwise Platform
Se2 Design
Plotwise Writer Design
Design
Plotwise Platform Design Docs
05 Components
The nf command
01 Vision
Product Vision Problem Statement Goals & Non‑Goals Success Metrics Stakeholders & Personas
02 Requirements
Requirements Functional Requirements Non‑Functional Constraints & Assumptions
03 Solution Overview
Solution Overview System‑context Diagram Key User Journeys High‑level Risks
04 Architecture
Architecture Container Diagram Tech Stack & Rationale Cross‑cutting Concerns Open Questions
06 Data Model
Data Model Plotwise Writer Projects are self-contained SQLite3 databases. ER Diagram / Schemas Here's the schema definition which is stored as a resource in the Plotwise Writer executable. CREATE TABLE metadata ( id INTEGER PRIMARY KEY AUTOINCREMENT, ...
07 User Interface
Main Window
01 Overview
Se2 is intended to be the spiritual successor to SendTo 1.6, which was originally a Trogsoft product from 2002. The scope has been extended so that the tool can be used as a file explorer replacement for a good portion of functions, but there is still a large ...
02 Project Scope
What it is What it is not
04 User Interface
03 User Stories
Overview
Network Fandango (NF) is a combination of traditional network management suite and Infrastructure-as-Code system. The main components are: nfsvc - the main service. nf - command line tool which connects to the main service. nfweb - web front end. nfagent - a ...
Network Discovery
Network discovery occurs in a number of different ways. For administrators with control over their own DNS infrastructure, we recommend using either of the following records. For these examples, we are using example.com as your domain. _nfsvc.example.com IN ...
Authentication
The authentication flow is modeled on that of SSH, specifically using keyfiles. The steps involved in authentication are as follows: Install Network Fandango Set up your Network Discovery The first time the Network Fandango service (nfsvc) is started, it will...
01 The Basics
Common Parameters All Commands These parameters work with all commands. --json Outputs the result in JSON. Item Lists For commands which return lists of items (users, computers, etc), you can use the following parameters: -p <int> Retrieve the specified page...
02 Authentication
Logging in as the first user on a new installation To log in under these circumstances, all you have to do is run nf auth. It will create a key file which the server will automatically accept as there are no configured users. Logging in as a previously created...
03 User Management
Create a user nf user add <username> Creates a user with a randomised initial login token. The token will be provided in the command output, and you can pass this on to the user for use on their first login. nf user add <username> --initial-token <token> Cre...
Database Schema
Computers
Certificates and their Uses
Network Fandango Service The following certificates are generated by the Network Fandango Service: Root CA X509 Certificate Trust anchor for all service issued TLS certs and JWT tokens. You can optionally use your own organisation's certificate infrastructure...