Configuring X Server Access Control Authorizing access to the X server enables yourself or other users to log in from another system and use DECwindows applications on your workstation. You can choose to apply a traditional user-based scheme, a token-based scheme (such as Magic Cookie or Kerberos), or a combination of schemes depending upon your network environment. For example, you may choose to use Kerberos to authorize all remote server connections over TCP/IP and Magic Cookie to authorize LAN network connections. When used in combination, the most restrictive access control scheme presented by the client always takes precedence. For example, if the server has all three schemes enabled, and the requesting client is using Magic Cookie, the server will attempt to authorize the connection via Magic Cookie. Note that user-based access is available by default. If the client attempts and fails to connect to the server using Magic Cookie, and the user is also a member of the Authorized Users list, access will be granted. For information on how to enable user-based, Kerberos, or Magic Cookie authorization, double click on an item from the list of additional topics below. Additional topics: * User-Based Access Control * Token-Based Access Control * Enabling User-Based Access Control * Enabling Kerberos Access Control * Enabling Magic Cookie Access Control