Controlling Who can Access your Host Computers (User Access Control)
An attempt to log in without proper User Access Control permissions may result in error 4320 ("Operator or Administrator has refused the request"). security
What type of user can access host computers?
- Users with Administrator credentials on the host computer (at the operating system level)
- Non-administrator users who have been granted permission to access the host via the User Access Control feature in Central
What happens if a user without proper permission attempts to connect?
An attempt to log in without proper User Access Control permissions may result in error 4320 ("Operator or Administrator has refused the request").
How does this relate to my account?
User Access Controls apply to a Windows or Mac account, not a Central account. A user may be able to see a computer listed in his account, but still may not have permission at the operating system level to actually access the host.
Example: How does User Access Control work?
User Access Controls give you extra control over the actions members of your organization can take on specific host computers.
- Assume you have a server called "Server One"
- "Server One" is accessible through your Central account
- "Technician1" and "Technician2" are Users of your Central account.
- "Server One" has three Windows user accounts: (1) Administrator (2) Technician1 and (3) Technician2
- "Technician1" and "Technician2" are set as Standard or Restricted Users of "Server One"
- You, as an Administrator, log in to Central and access "Server One"; you authenticate to "Server One" using your Administrator Windows credentials
- "Technician1" or "Technician2" will only be able to log on to "Server One" using their "Technician1" or "Technician2" credentials once you, the Administrator, have logged on to "Server One" and set the proper User Access Controls in Central
Article last updated: 27 September, 2022