Access Control Settings
The table below provides an overview of server settings you can use to control client access to the server.
By default, all client users with an account on the server host (or an account in a common domain) can connect to the server using password authentication, open a terminal session, and access all local files and directories allowed by their credentials.
To | From the Configuration tab, click |
---|---|
Specify which client host computers can connect to the server | Access Control > Client Host Access Control |
Specify which user groups can connect to the server. | Access Control > Group Access Control |
Specify which individual users can connect to the server. | Access Control >, User Access Control |
Deny all logins | Permissions |
Deny access to terminal sessions (support file transfer only) | Permissions |
Deny access to non-interactive users (as configured in the local computer Security Policy) | Permissions |
Configure port forwarding permissions | Permissions |
Specify which file transfer protocols are supported (SCP1, SFTP/SCP2) | Permissions |
Limit the number of connections a user can make to the server. | General |
Customize access to file transfer directories | SFTP Directories |
Grant access rights for file transfers based on the rights associated with an alternate user | SFTP Directories >Add > Use a specified account to connect to this directory (UNC paths only) |
Specify whether customized access to file transfer directories applies to SCP1 transfers | Permissions |
Configure mapped drives (provide access to remote network locations during client terminal sessions) | Mapped Drives |
Grant access rights for terminal sessions based on rights associated with an alternate user | Mapped Drives >Add > Use a specified account to connect to this mapped drive |
Provide access to remote domain resources for users who authenticate with public keys | Authentication > Credential Cache |
Block IP addresses after multiple failed authentications | Authentication |
Limit login to only those users who connect using the Reflection Identity Manager that is included with Reflection for Secure IT Gateway. | Disable authentication on all of the authentication tabs (Password, Public Key, RSA SecurID, and GSSAPI / Kerberos V5). |
More information