User-level security is controlled by an .Xauthority file, which is read each time the X server is started or reset. You can create an .Xauthority file using the host-based Xauth utility.
To make this binary file available to Exceed onDemand, you must download it from the host on which it was created and copy it to the Exceed Connection Server or data store machine in either the global or user-specific Xconfig\Common directory depending on whether the Xconfig file you are modifying is global or user-specific.
To enable user access control:
Note: |
For optimal security when enabling this setting, disable the Allow X Clients To Modify Host ACL setting and enable the Use Host ACL setting on the Security page. |