User-Based Access Control User-based access control authorizes access to the X server based on the triplet of host, transport, and user name (such as, DECNET ZEPHYR JONES). The user name, node name, and transport information you provide act as filters to screen out all except a selected class of users, which together form the Authorized Users list. For example, you can give access to your workstation to user WINKEN on node BLINKN, which is a node on a system that is running DECnet software. By giving access only to WINKEN on node BLINKN, you deny access to another user WINKEN on node NOD. User-based access control is always available, as long as there are entries in the Authorized Users list. Due to lack of encryption and the inability to specify usernames in the TCP/IP environment, this form of access control is the least secure and is recommended for authorizing access in the local or DECnet environment only. Additional topics: * Token-Based Access Control * Configuring X Server Access Control * Configuring Client Access Control