
- Antroid wol wake on lan data file location verification#
- Antroid wol wake on lan data file location password#
A computer name and a hostname or IP address must be specified for each computer. The individual cells in the table can be edited by double-clicking them. The two buttons below the list can be used to add or remove computers. The list on the right contains all computers stored for the currently selected location. Existing locations can be edited and renamed by double-clicking. Using the two buttons below the list, locations may be added or removed. The left list contains all configured locations. The configuration page consists of two lists. Unlike backends such as LDAP this information is stored in the local configuration and must therefore be transferred to all computers. On the configuration page Locations & computers you can create the locations and computers displayed in the Veyon Master application when the Network object directory backend Builtin is used. The respective authentication method can be chosen and configured as described in section Authentication in the configuration reference.
Antroid wol wake on lan data file location password#
login with username and password necessary.identity of counterpart can be assured,.

system-wide exchange of key files necessary.user identity can not be assured even after.access to computers can be handled centrally.no login with username and password required.Therefore, the use of this method only makes sense in conjunction with a central (user) directory service such as ActiveDirectory or LDAP.īoth methods have advantages and disadvantages so the choice of the right method depends on the environment, security requirements and desire for user comfort. This method requires identical user accounts to exist on all computers. If the login fails, the connection is closed. If successful, the username and password are correct and the authenticity of the counterpart is ensured. The Veyon Service then initiates an internal user login on the local system using the decrypted credentials. teacher) and sends this data to the Veyon Service on the remote computer. With logon authentication Veyon Master encrypts the username and password of the accessing user (e.g.
Antroid wol wake on lan data file location verification#
If the signature verification fails, the connection is closed. The authenticity of the counterpart is then guaranteed. This verification only succeeds if the signature was generated with the appropriate private key. The signature is sent back to the Veyon Service and verified with the corresponding public key. On each connection request the Veyon Service sends a random character sequence to Veyon Master, which Veyon Master has to sign cryptographically using the private key. Only certain users may have access to the private key. Key file authentication is based on Public-Key-Cryptography, meaning that a public key and a associated private key are used. Basically Veyon offers two different authentication methods: key file authentication and logon authentication.
