Help on Session Manager and FileView
←Previous Next→ Contents Close Help
  Configuring X Server Access Control

  Authorizing access to the X server enables yourself or other
  users to log in from another system and use DECwindows
  applications on your workstation.

  You can choose to apply a traditional user-based scheme, a
  token-based scheme (such as Magic Cookie or Kerberos),
  or a combination of schemes depending upon your network
  environment.  For example, you may choose to use Kerberos
  to authorize all remote server connections over TCP/IP and
  Magic Cookie to authorize LAN network connections.

  When used in combination, the most restrictive access control
  scheme presented by the client always takes precedence.
  For example, if the server has all three schemes enabled,
  and the requesting client is using Magic Cookie, the server
  will attempt to authorize the connection via Magic Cookie.

  Note that user-based access is available by default.  If the
  client attempts and fails to connect to the server using Magic
  Cookie, and the user is also a member of the Authorized

  Users list, access will be granted.

  For information on how to enable user-based, Kerberos, or
  Magic Cookie authorization, double click on an item from the
  list of additional topics below.

  Additional topics:

  *   User-Based Access Control

  *   Token-Based Access Control

  *   Enabling User-Based Access Control

  *   Enabling Kerberos Access Control

  *   Enabling Magic Cookie Access Control
←Previous Next→ Contents Close Help