FAQ : IDEAL Remote

Schnelle und sichere Fernsteuerung für Windows, Mac OS X und Linux

Suche Hilfe  

FAQ

By using this search engine, you can search one or more terms in the complete Pointdev FAQ.

  • In order to look for one or more keywords, type them in the search field using space to separate them.

    ex : remote control

    This search will show you every FAQ containing the word "remote" OR "control".

  • In order to look for a full sentence, use the quotes " " around your keywords
  • ex : "remote control"

    This search will show you every FAQ containing the whole word "remote control".


 Titel und Inhalt
 Nur titel

How to configure the TightVNC remote control tool (screen sharing)?

Can I request for the remote user to authorize the connection?

When launching TightVNC remote control, is it possible to display on the remote host an authorization request?

If it is, which authentication information can be sent to the remote computer?

Is it also possible to define a blacklist of IPs addresses, or to authorize some IPS?


Try IDEAL Administration during 30 days on your network for free!

Simplify your VNC Installation and Remote Control with IDEAL Administration

Yes, it is possible to manage IPs addresses of computers allowed to connect to a computer, and also to ask the user to authorize or not the remote control.

From our software, right click the remote computer, then "Taking remote control", "Configure", "Authorization" tab. You may also directly access to the desired configuration through the "Tools" menu, "TightVNC Settings".

- Version 2.X of the remote control tool

You can create as many configurations as you wish (eg a configuration "Station Config" requiring the acceptance of the connection by the remote user and a configuration "Server Config" which does not require an authorization).

  • Add a TightVNC 2.X configuration then in the "General" tab specify the computers for which this configuration will be automatically used.
  • In the "Authorization" tab, just enable the option Always Prompt the user to accept the connection. On the same window click on the "Advanced" button to customize the information that will be sent on the target computer when requesting authorization (eg personalized message, ...).

  • Finally, you can also set the maximum response delay (in seconds) to allow the user to accept or reject your connection request. After this period, if the user has not responded (or is not in front of the screen), the connection is accepted or rejected, depending on your configuration (default action on timeout).

You can also "force" the use of a specific TightVNC configuration when taking remote control (right click on the computer then "Remote control with the configuration").

 

- Version 1.X of the remote control tool:

  • Authorization management (AuthHosts)

This setting is used to specify the action to execute on the remote host, for each IP address (or address template) , regarding incoming connections. By default, this list is empty and all connections from all computers will be accepted. Here are the available types :

(+) : Accept

(?) : Query

(-) : Reject

In the above example, one must understand:

- Incoming connections from computers which IP address is 192.168.1.10192.168.1.11 or 192.168.1.21are accepted.

- Incoming connections from computer which IP address is 192.168.1.20 are submitted to validation from remote computer side (the user can accept ou reject the connection).

- All remote control requests will be rejected for computers which IP address is 192.168.2.1192.168.2.2...192.168.2.9.

  • Degree of paranoia (QuerySetting)

This setting allows to define the security policy to apply on the remote host, regarding incoming connections. A "paranoia  degree" is a value ranging from (maximum availability) to (maximum security). This option goes together with the "AuthHosts" setting. The following tables indicates how "QuerySetting" values affect the "AuthHosts" behaviour.

0 - +:Accept, ?:Accept, -:Query

1 - +:Accept, ?:Accept, -:Reject

2 - +:Accept, ?:Query, -:Reject [Default]

3 - +:Query, ?:Query, -:Reject

4 - +:Query, ?:Reject, -:Reject

By default, the degree of paranoia is defined on value (that means obey "AuthHosts" will be assumed).

By supposing we define the degree of paranoia on value 3 (+:Query, ?:Query, -:Reject).

Taking our previous example, behaviour regarding incoming connections on the remote host is going to change. Indeed, all the IPs addresses which were previously accepted (defined with "+" in AuthHosts) will be now submitted to validation from remote side (and therefore considered as a "?").

One must understand :

-  Incoming connections from computers which IP address is 192.168.1.10192.168.1.11 and 192.168.1.21are submitted to validation from remote computer side (the user can accept ou reject the connection).

- Incoming connections from computers which IP address is 192.168.1.20 are submitted to validation from remote computer side (the user can accept ou reject the connection).

- All remote control requests will be rejected for computers which IP address is 192.168.2.1192.168.2.2...192.168.2.9.

Another case, if we define the degree of paranoia on the value or 4, and the AuthHosts list is empty. All the incoming connections on the remote computer, from whatever computer which has launched the remote control, will be submitted to validation from remote computer side (the user can accept ou reject the connection).

  • Advanced: Informations to display

It is possible to define which information will be sent on the remote screen, when authorization is requested.

  • Delay before rejecting the connection (QueryTimeout)

Finally, you may also define the maximum delay (in seconds) to let the user accept or reject your connection request. Once this delay has been exceeded and if the user has still not  answered (or is not in front of the screen), connection is rejected..

Betrifft auch folgende Software: IDEAL Administration
Letzte Änderung: 27/08/2020

Previous
   
Next

Zurück zur Liste

 



FAQ : IDEAL Administration | IDEAL Dispatch | IDEAL Remote | IDEAL Migration



IDEAL Remote 23.5
KOSTENFREIER DOWNLOAD
Zurück zum Anfang