The Security subsection includes settings for Host authentication and other rights forMaster connections to this Host. The Account User can click on the Edit button to view and/or edit any of these configuration options.
Below is a table of the fields, values and actions available on the Security popup window:
Field
Description
Simple password configuration
Select Allow connection with a simple password to use simple password to authenticate Account Users before allowing a Master connection to this Host. Type in a password in the Password and Confirm password fields; if the field is blank, no password will be required.
Access to Host settings can be controlled separately:
Use same password to control access to Host settings
Allow Account User to view/edit Host settings with the same simple password provided to establish the Master connection
Use different password for Host settings
Allow Account User to view/edit Host settings with a different password than that provided to establish the Master connection. Type in a different password in the Settings Password and Confirm Password fields; if this option is selected and the field is blank, no password will be required
Allow remote administration (peer-to-peer)
Allow any Account User with Administrator privileges on your Host computer to view/edit the Host settings without logging in to the Gateway Server (i.e. use peer-to-peer Master connection to go directly to the Host)
Windows authentication configuration
Select Require Windows authentication to use network credentials to authenticate Account Users before allowing a Master connection to this Host. The Host will verify the credentials (username/password) of the Account User requesting access against those kept at the domain controller (usually in Active Directory). If the credentials match, a Master connection will be established; if not, the Master connection request will be refused
Set Permissions
View/edit Windows authentication configuration settings. One of the strongest features of the PROXY Pro solution is the availability of fine-grained permissions for Account Users and Groups of Account Users who want to access the Host remotely.
See the Host Operation > Security tab > Windows Authentication Configuration section in the PROXY Pro Host Guide for more detailed information about setting permissions for Account Users and Groups.