Access Control Settings - Web Manager
Access control is managed by means of two features: Labels and the Access Control tabs that are available for each Access Profile.
The following customization options are universally available across all Access Profiles, providing a consistent framework for managing how and when users can access remote resources.
This feature allows administrators to set specific access hours for an Access Profile thus limiting the time when users can log in to corporate resources.

Access Allowed
Click and drag to define a day and a time interval when the Access Profile will be available.
Access Denied
Click and drag to define a day and a time interval when the Access Profile will NOT be available.
Allow access only within a specific period
Define a specific time period during which the Access Profile will be available.
The Permissions tab allows managing the access permissions for the selected connection (Access Profile).

Inherit label access permissions
This option is selected by default, and it indicates that the profile inherits permissions from a parent label.
Allow anonymous access
If this option is enabled, the Access Profile will be available for anyone who accesses Thinfinity® Workspace.
User or Group
The Users area is only displayed if Allow anonymous access is disabled. It allows selecting the users and/or groups that will be able to access the Access Profile. + Add button allows adding the selected user or group to the User and Group list. Once a user/group is added, the associated Permissions field allows you to select the role you want to assign to them.
Inherited Permissions
This area shows inherited permissions for the current Access Profile. They can be application permissions (Permission Level column) or Label permissions (From column).
Note that this tab will only become available if Allow Anonymous Access option from the Permissions tab is disabled.
The Authentication Methods tab allows you to customize the authentication methods for the selected Access Profile.

No restrictions
No restriction on the authentication method used.
Only users authenticated with these methods
Only the users authenticated with the selected methods will be able to see and connect to the resource (desktop, app, folder, terminal).
Use the available options to define which IP Addresses are allowed to connect to the current Access Profile or which IP addresses are denied access.


Booking limit
Determines the maximum number of concurrent reservations for the resource.
Buffer
The minimum gap allowed between two subsequent bookings. For example, if the Buffer is set to 15 minutes, and a booking is made between 15:00 and 15:30, the next booking cannot start earlier than 15:45.
Last updated
Was this helpful?