In this episode, John and Pedro answer questions about renaming collections, how we detect vulnerabilities, and our access control settings.
Speaker 0: Hey everyone. Welcome to another episode of From the Field Q and A with P&J. I'm Pedro.
Speaker 1: And I'm John. Let's dive into some questions we've received this week from the community. Pedro, how about you start with the first one this week?
Speaker 0: All right. So first question, is there a way to rename a collection?
Speaker 1: There is a way to rename a collection. There's going to be some other things you need to update, some tables here shown on the screen. But you could also try exporting the collection, renaming it, and then reimporting it. That might be a little bit easier if you're technical like that. So there are a couple of ways to do it.
Yes. All right. So the next question is, are network vulnerability scans performed against the network and systems?
Speaker 0: Yeah. All communication happens over HTTPS currently using TLS 1.3 and all communication between internal services within Directus cloud infrastructure, happens in a private subnetwork, with a need to know access control policy.
Speaker 1: Yeah. So we're constantly monitoring for vulnerability scans and making sure that it's a very secure network. We're definitely security first here at, Directus.
Speaker 0: Huge priority. Yep. Okay. Next question. Is there a way to have a user friendly display name for specific content type?
Speaker 1: Yes. Actually, in the back end controls, as you can see here in this screen recording that I did earlier today, if you navigate to the table and item, just click in field, and then you can add a field name translation, which will display it how you would like to display it so it looks the way that you want it to look and not a
Speaker 0: technical name.
Speaker 1: Right. But very good question. Hopefully, that screen share helped. And then on to, I think, the last question this week, Pedro, how much control do I have over roles and permissions? Can I configure what certain users see versus what the public sees?
Speaker 0: Yeah, actually, there's a big reason. A lot of people come to direct us. We have a lot of really great and granular control. We actually just released a great YouTube video with a really high level explanation, on this. But you can create as many users as you want, and they start off as default deny, and then you can enable what you want them to have access to essentially all the way down to the current, you know, field and row level with the ability to do user variables like dollar sign, current underscore user.
Speaker 1: Yeah. Very granular. You can, you can obviously allow full controls for certain users and roles. But you can get very granular, which people do. So great question.
Speaker 0: Yeah. Thanks for watching. Please like and subscribe the video, and don't forget to hop into one of our communities, whether it's Discord or GitHub, to follow along and ask questions. We'll see you next time.
Speaker 1: Bye all.