I would be interested in that feature. Clearly as part of any security
model the visible attack surface provides useful clues to anyone
looking to breach that security, you wouldn't publish your complete
network topology to anyone who happened by.
OTOH, there can be a use case where you want to make groups of users
aware that resources exist even if they can't (at some point in time)
access them yet. This comes up when you are trying to reduce
duplication of APIs or other assets simply because some people didn't
know that asset is already maintained as a shared resource.
So maybe there is at least two roles here, one which is genuinely
anonymous, and another which is un-authenticated internal ?
No idea if that helps or if Nexus 3.x can be configured to support it,
but, maybe it serves as a potential requirement which the guys at
Sonatype can comment about ?
Regards
Fraser.
> --
> You received this message because you are subscribed to the Google Groups
> "Nexus Users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
nexus-users...@glists.sonatype.com.
> To post to this group, send email to
nexus...@glists.sonatype.com.
> To view this discussion on the web visit
>
https://groups.google.com/a/glists.sonatype.com/d/msgid/nexus-users/9c96a159-c509-4619-83d5-e1afe6a65cf9%40glists.sonatype.com.
> For more options, visit
>
https://groups.google.com/a/glists.sonatype.com/d/optout.
>