Topology
  • 1 Minute to read
  • Dark
    Light
  • PDF

Topology

  • Dark
    Light
  • PDF

Article summary

The Deployment Topology feature in Splashtop Secure Workspace provides administrators with a comprehensive overview of their infrastructure's private application deployment. This feature offers a bird's-eye view that allows administrators to explore the graph structures of all objects related to the private access deployment, including networks, connectors, discovered and managed applications, groups, users, policies, dynamic access accounts, shared applications, and the workspace clients.

The deployment topology offers three distinct views to visualize the deployment topology. The default view is the Tree View, which presents entities in a hierarchical structure, allowing for easy navigation and understanding. Administrators can also utilize the Force View, which visually connects the entities to illustrate their relationships, or the Circular View, which arranges entities in a circular format for a unique perspective.

To enhance the user experience, the topology diagram includes various tools such as object filtering, object search, and object detail inspection. Administrators have the flexibility to filter and customize which type of object they want to display in the diagram, enabling a focused and tailored view of the deployment topology. The search tool enables quick and efficient locating of specific objects within complex topology graphs. Additionally, the object inspector provides detailed information about each object, allowing administrators to access important details by simply clicking on the object node in the graph.

By utilizing the Deployment Topology feature, administrators gain valuable insights into the overall private application deployment within their infrastructure. This visual representation enhances their understanding, facilitates effective management, and supports the optimization of the Splashtop Secure Workspace environment. Ultimately, this feature ensures efficient and secure access to resources for users across the organization.


Was this article helpful?

What's Next