FAQ : IDEAL Remote

Prise de contrôle à distance rapide et sécurisée pour Windows, Mac OS X et Linux

Rechercher Aide  

FAQ : Aide

En utilisant ce moteur de recherche, vous pouvez rechercher un ou plusieurs termes dans l'ensemble de la FAQ Pointdev.

  • Pour rechercher un ou plusieurs mots clés, saisissez ces mots clés dans le champ de recherche, séparés par des espaces.

    ex : adresse ip

    Cette recherche vous affichera tous les résultats contenant les termes "adresse"
    OU "ip".

  • Pour rechercher une phrase complète, utilisez des guillemets " " autour de vos mots clés.

    ex : "adresse ip"

    Cette recherche vous affichera tous les résultats contenant le terme "adresse ip".

 

 

 Dans le titre et le contenu
 Uniquement dans le titre

How to configure the TightVNC remote control tool (screen sharing)?

Can I request for the remote user to authorize the connection?

When launching TightVNC remote control, is it possible to display on the remote host an authorization request?

If it is, which authentication information can be sent to the remote computer?

Is it also possible to define a blacklist of IPs addresses, or to authorize some IPS?


Try IDEAL Administration during 30 days on your network for free!

Simplify your VNC Installation and Remote Control with IDEAL Administration

Yes, it is possible to manage IPs addresses of computers allowed to connect to a computer, and also to ask the user to authorize or not the remote control.

From our software, right click the remote computer, then "Taking remote control", "Configure", "Authorization" tab. You may also directly access to the desired configuration through the "Tools" menu, "TightVNC Settings".

- Version 2.X of the remote control tool

You can create as many configurations as you wish (eg a configuration "Station Config" requiring the acceptance of the connection by the remote user and a configuration "Server Config" which does not require an authorization).

  • Add a TightVNC 2.X configuration then in the "General" tab specify the computers for which this configuration will be automatically used.
  • In the "Authorization" tab, just enable the option Always Prompt the user to accept the connection. On the same window click on the "Advanced" button to customize the information that will be sent on the target computer when requesting authorization (eg personalized message, ...).

  • Finally, you can also set the maximum response delay (in seconds) to allow the user to accept or reject your connection request. After this period, if the user has not responded (or is not in front of the screen), the connection is accepted or rejected, depending on your configuration (default action on timeout).

You can also "force" the use of a specific TightVNC configuration when taking remote control (right click on the computer then "Remote control with the configuration").

 

- Version 1.X of the remote control tool:

  • Authorization management (AuthHosts)

This setting is used to specify the action to execute on the remote host, for each IP address (or address template) , regarding incoming connections. By default, this list is empty and all connections from all computers will be accepted. Here are the available types :

(+) : Accept

(?) : Query

(-) : Reject

In the above example, one must understand:

- Incoming connections from computers which IP address is 192.168.1.10192.168.1.11 or 192.168.1.21are accepted.

- Incoming connections from computer which IP address is 192.168.1.20 are submitted to validation from remote computer side (the user can accept ou reject the connection).

- All remote control requests will be rejected for computers which IP address is 192.168.2.1192.168.2.2...192.168.2.9.

  • Degree of paranoia (QuerySetting)

This setting allows to define the security policy to apply on the remote host, regarding incoming connections. A "paranoia  degree" is a value ranging from (maximum availability) to (maximum security). This option goes together with the "AuthHosts" setting. The following tables indicates how "QuerySetting" values affect the "AuthHosts" behaviour.

0 - +:Accept, ?:Accept, -:Query

1 - +:Accept, ?:Accept, -:Reject

2 - +:Accept, ?:Query, -:Reject [Default]

3 - +:Query, ?:Query, -:Reject

4 - +:Query, ?:Reject, -:Reject

By default, the degree of paranoia is defined on value (that means obey "AuthHosts" will be assumed).

By supposing we define the degree of paranoia on value 3 (+:Query, ?:Query, -:Reject).

Taking our previous example, behaviour regarding incoming connections on the remote host is going to change. Indeed, all the IPs addresses which were previously accepted (defined with "+" in AuthHosts) will be now submitted to validation from remote side (and therefore considered as a "?").

One must understand :

-  Incoming connections from computers which IP address is 192.168.1.10192.168.1.11 and 192.168.1.21are submitted to validation from remote computer side (the user can accept ou reject the connection).

- Incoming connections from computers which IP address is 192.168.1.20 are submitted to validation from remote computer side (the user can accept ou reject the connection).

- All remote control requests will be rejected for computers which IP address is 192.168.2.1192.168.2.2...192.168.2.9.

Another case, if we define the degree of paranoia on the value or 4, and the AuthHosts list is empty. All the incoming connections on the remote computer, from whatever computer which has launched the remote control, will be submitted to validation from remote computer side (the user can accept ou reject the connection).

  • Advanced: Informations to display

It is possible to define which information will be sent on the remote screen, when authorization is requested.

  • Delay before rejecting the connection (QueryTimeout)

Finally, you may also define the maximum delay (in seconds) to let the user accept or reject your connection request. Once this delay has been exceeded and if the user has still not  answered (or is not in front of the screen), connection is rejected..

Concerne également les logiciels suivants : IDEAL Administration
Dernière modification : 27/08/2020

Précédente
   
Suivante

Retour à la liste

 



FAQ : IDEAL Administration | IDEAL Dispatch | IDEAL Remote | IDEAL Migration



IDEAL Remote 23.5
TÉLÉCHARGER LA
VERSION GRATUITE
Retour haut de page