Access Profiles Tab
Last updated
Was this helpful?
Last updated
Was this helpful?
An access profile is a custom configuration created by an administrator, that determines how users connect to and interact with remote resources, such as applications, virtual machines, remote desktops, and files by specifying different parameters such as connection protocols and access credentials.
Access Profiles tab in the Thinfinity Configuration Manager allows the admin to define and configure access profiles so that users can safely and seamlessly connect to their desktops or applications via RDC, ThinVNC, VNC/RFB, Telnet/SSH, VirtualUI App, Web Link, WAG, Web Folder, or zScope Classic connections using the current company's security policy.
Access profiles can be grouped and labeled for easier management.
Profile List
Shows the available profiles and their details.
Enabled
Enables or disables the selected profile.
Visible
Controls the visibility of the selected profile.
Add
Adds a new profile.
Edit
Offers access to the settings of the selected profile.
Duplicate
Duplicates the selected profile.
Remove
Removes the selected profile.
Import
Imports a .CSV or .JSON file with an Access Profiles list.
Export
Exports the current Access Profiles list to a .CSV or .JSON file.
Allowed users and groups for the selected profile
Shows users or group(s) allowed to access the selected profile. To edit this list, change the settings in the Permissions tab of the selected profile.
Anonymous Access
This option is only visible if Allow Anonymous Access has been selected from the Permissions tab of the selected profile. It indicates that the selected profile can be accessed without the need for credentials. It is shown as selected but grayed out.
Allow anonymous Access Profiles
Enables the Anonymous Access feature for the selected profile.
Allow OTURL
Enables the OTURL (One-Time URL) feature for the selected profile.
Show Log
Shows logs details related to network communication, system status, and system connectivity. To troubleshoot, access the standard logs.
You should use the Access Profiles tab if you need to:
Restrict the application access with Active Directory Authentication.
Specify different access levels for different users and groups of users.
Make the users' experience faster by configuring predetermined preferences for each profile.
Unify authentications in a Single Sign-On scheme.
Allow external applications to manage the pl users and machine permissions through the use of a Web Service.