NoMachine Support

Your questions answered

Knowledge Base

Searching in: Feature Requests
Filter the search results
Target version:
Last update:
Searching in: Feature Requests
ID: FR09R04018
Added on:  2020-09-08
Last update: 2020-09-08
Priority: Configuration
Products: NoMachine Server
Target: 7
Status:  Approved
Extending the 'nxserver --useredit' command to accept list of users

The 'nxserver --useredit USERNAME' command should be extended to accept also a comma-separated list of users. It should be possible to specify a list of users for each of the available options of the --useredit command.

Some examples:

1) Add users user1,user2, and user3 to an already existent group of users, lab1
nxserver --useredit user1,user2,user3 --group lab1

2) Redirect users user1,user2,user3  and user4 to another NoMachine server, --useredit user1,user2,user3,user4 --redirect

3) Make users user1 and user2 trusted for connections to the remote physical desktop:
nxserver --useredit user1,user2 --trusted physical

4) Make users teacher1 and teacher2 trusted for connections to the remote physical desktop owned by user3,user4 and user5nxserver --useredit teacher1,teacher2 --trusted physical --per-user user4,user5


Server usage

 --useredit <username> --redirect <server:port> | --group <groupname> |
                      --trusted [virtual|physical|none][[--node <node:port>]|
                     [--per-user <username>]]|
                      --administrator [yes | no] |
                      --screensharing yes|no
                      --forward-connection <server:port>|<UUID>

  Accept the name of a valid user or a comma-separated list of users.
  Use --redirect to modify IP or hostname and port for the NoMachine
  server where connections run by the user are redirected. Specify
  '--redirect none' to disable redirection for this user. Use --group
  to add the user to a group of users and '--group none' to remove the
  user from that group. Use --trusted to allow the user to connect to
  another user's desktop without the need for the owner's approval.
  Specify 'virtual' or 'physical' to limit the --trusted authorization
  to connections to physical desktops or to virtual desktops only.
  Provide 'none' instead to remove this ability. By default trusted
  permissions apply to all nodes of a multi-node environment and all
  users in system. Assign them for a given node or a comma-separated
  list of nodes by means of the additional --node parameter. Assign
  trusted permission for a specified user or a comma-separated list
  of users by using the --per-user option. Remove trusted permissions
  for a node or a list of nodes, by using '--trusted none' with the
  --node option. Similar in case of users use option --per-user with
  username or comma-separated user list. Provide --administrator to
  grant NoMachine administrative rights to the user, or specify 'no'
  to remove them. When sharing the physical desktop is enabled in the
  server configuration, use screensharing to configure personal user's
  settings and allow or forbid connections to physical desktop of the
  user. The user will be still able to change this setting from the
  NoMachine Monitor menu. Use --forward-connection to forward the
  user's connection to a federated server identified by its name
  (<server:port>) or id(<uuid>) as it appears in the output of the
  'nxserver --serverlist --extended' command. In order to disable
  auto-forwarding for this user, use '--forward-connection none'.

Notify me when the FR is implemented.