Help on Session Manager and FileView
←Previous Next→ Contents Close Help
  User-Based Access Control

  User-based access control       authorizes access to the X
  server based on the triplet of host, transport, and user name
  (such as, DECNET ZEPHYR JONES). The user name, node
  name, and transport information you provide act as filters to
  screen out all except a selected class of users, which together
  form the Authorized Users list.

  For example, you can give access to your workstation to user

  WINKEN on node BLINKN, which is a node on a system
  that is running DECnet software.  By giving access only to
  WINKEN on node BLINKN, you deny access to another user

  WINKEN on node NOD.

  User-based access control is always available, as long as
  there are entries in the Authorized Users list.  Due to lack
  of encryption and the inability to specify usernames in the

  TCP/IP environment, this form of access control is the least
  secure and is recommended for authorizing access in the
  local or DECnet environment only.

  Additional topics:

  *   Token-Based Access Control

  *   Configuring X Server Access Control

  *   Configuring Client Access Control
←Previous Next→ Contents Close Help