NoMachine Support

Your questions answered

Knowledge Base

Searching in: Feature Requests
Filter the search results
Target version:
Products:
Status:
Last update:
Searching in: Feature Requests
ID: FR10P03729
Added on:  2018-10-30
Last update: 2018-12-07
Priority: High
Products: NoMachine Server
Target: 6
Status:  Implemented
Adding the possibility to require connection's authorization also for administrators

A new option in the server configuration keys to manage the authorization for connecting to the desktop will allow to define if privileged users can connect without the desktop owner's approval or not.

This applies only when the connecting user is not the desktop owner.

Privileged users are administrators on Windows and users with id 0 (root by default) on Linux and Mac.

 

#
# Enable, disable or restrict NX Server requesting authorization to
# the owner of the physical desktop to allow a different user to
# connect.
#
# 0: Disabled. All users can connect to the physical desktop
#    without the need for the desktop's owner authorization.
#
# 1: Enabled. Only system administrators, NoMachine administrators
#    and trusted users can connect without the explicit authorization
#    of the desktop owner. This is the default.
#
# 2: Restricted: Only NoMachine trusted users can connect without
#    explicit authorization. All the other users require the approval
#    of the desktop owner. This applies also to administrators.
#
#PhysicalDesktopAuthorization 1

 

#
# Enable, disable or restrict NX Server requesting authorization to
# the owner of the virtual desktop to allow a different user to
# connect.
#
# 0: Disabled. All users can connect to the virtual desktop
#    without the need for the desktop's owner authorization.
#
# 1: Enabled. Only system administrators, NoMachine administrators
#    and trusted users can connect without the explicit authorization
#    of the desktop owner. This is the default.
#
# 2: Restricted: Only NoMachine trusted users can connect without
#    explicit authorization. All the other users require the approval
#    of the desktop owner. This applies also to administrators.
#
#VirtualDesktopAuthorization 1

 

 

Note that when setting 2 (Restricted) is applied, system administrators are managed as unprivileged users from a NoMachine point of view. They can be therefore made trusted for connections to physical and/or virtual desktops.