Access Control Settings

The table below provides an overview of server settings you can use to control client access to the server.

By default, all client users with an account on the server host (or an account in a common domain) can connect to the server using password authentication, open a terminal session, and access all local files and directories allowed by their credentials.

To

From the Configuration tab, click

Specify which client host computers can connect to the server

  • Access Control >
  • Client Host Access Control

Specify which user groups can connect to the server.

  • Access Control >
  • Group Access Control

Specify which individual users can connect to the server.

  • Access Control >
  • User Access Control

Deny all logins

Permissions

Deny access to terminal sessions (support file transfer only)

Permissions

Deny access to non-interactive users (as configured in the local computer Security Policy)

Permissions

Configure port forwarding permissions

Permissions

Specify which file transfer protocols are supported (SCP1, SFTP/SCP2)

Permissions

Limit the number of connections a user can make to the server.

General

Customize access to file transfer directories

SFTP Directories

Grant access rights for file transfers based on the rights associated with an alternate user

SFTP Directories >Add > Use a specified account to connect to this directory (UNC paths only)

Specify whether customized access to file transfer directories applies to SCP1 An early implementation of the SCP protocol used by OpenSSH. This protocol does not use the SFTP subsystem; it executes an rcp command through the secure channel. transfers

Permissions

Configure mapped drives (provide access to remote network locations during client terminal sessions)

Mapped Drives

Grant access rights for terminal sessions based on rights associated with an alternate user

Mapped Drives >Add > Use a specified account to connect to this mapped drive

Provide access to remote domain resources for users who authenticate with public keys

Authentication > Credential Cache

Block IP addresses after multiple failed authentications

Authentication