Restricting Access with the User Access Control List

User-level security is controlled by an .Xauthority file, which is read each time the X server is started or reset. You can create an .Xauthority file using the host-based Xauth utility.

To make this binary file available to Exceed onDemand, you must download it from the host on which it was created and copy it to the Exceed Connection Server or data store machine in either the global or user-specific Xconfig\Common directory depending on whether the Xconfig file you are modifying is global or user-specific.

To enable user access control:

  1. Select the Xconfig file in which you want to enable user access control and open the Exceed onDemand Xconfig dialog box.
  2. On the Security page, select Use User ACL File in the User Access Control List area.
    Note: 
      For optimal security when enabling this setting, disable the Allow X Clients To Modify Host ACL setting and enable the Use Host ACL setting on the Security page.
  3. If necessary, specify the name of the authorization file you want to use.
  4. Click OK to save changes and return to the previous dialog box or click Apply and select another tab to continue modifying the Xconfig file.

Related Topics

About X Session Security

Restricting Access with the Host Access Control List

Editing the Host Access Control List