Bypassing the RemotelyAnywhere Login Screen

You can force an NTLM login - and thus bypass the login screen entirely - by appending /ntlm/ to the URL with which you access RemotelyAnywhere. For example, the URL http://MAILSERVER:2000 would become http://MAILSERVER:2000/ntlm/. Ensure you include the trailing slash.

You can also use this method to bypass the menu system and access certain parts of RemotelyAnywhere directly:

  • Remote Control: http://your.machine.here:2000/ntlm/remctrl.html
  • Command Prompt: http://your.machine.here:2000/ntlm/telnet.html
  • Chat: http://your.machine.here:2000/ntlm/chat.html

Similarly, you can specify your username and password in the URL - thus forcing a normal login - by appending the credentials in a /login:username:password:domain/ form to the URL with which you access RemotelyAnywhere.

For example, the URL http://MAILSERVER:2000 would become http://MAILSERVER:2000/login:username:password:domain/. Ensure you include the trailing slash.

The Windows NT domain you are logging into is optional. If omitted, RemotelyAnywhere will try to authenticate you to the computer on which it is running, then in the domain to which it belongs. The following URLs are examples:

  • Remote Control: http://your.machine.here:2000/login?username=x&password=y&domain=z&go=r
  • Command Prompt: http://your.machine.here:2000/login:yourloginname:yourpassword/telnet.html
  • Chat: http://your.machine.here:2000/login:yourloginname:yourpassword/chat.html