HP ProLiant xw2x220c Remote Graphics Software 5.3.0 User Guide - Page 25

Establishing an RGS connection using Standard Login, Step 1: Authenticating, the RGS connection

Page 25 highlights

The one-to-many configuration is ideal for collaboration because each user can interact with the applications running on the Remote Computer (subject to RGS policies which arbitrate which user is able to provide keyboard and mouse inputs to the Remote Computer at any particular time). As one user interacts with the applications on the Remote Computer, all other users can view these interactions. See Section 5-5, "Collaborating," for details. In the previous example, it was assumed that the primary user and the local users were all physically separate from the Remote Computer. This, however, doesn't have to be the case. RGS works equally well sharing between workstations (see Figure 2-9). Figure 2-9 Sharing between workstations Remote Computer Local User 1 (viewing primary user's desktop session) Primary User is logged into the computer using its attached keyboard, mouse and monitor. Local User 2 (viewing primary user's desktop session) In Figure 2-9, the primary user is directly logged into the Remote Computer using its attached keyboard, mouse and monitor. In other words, the primary user is physically present at the Remote Computer, while local user 1 and local user 2 are physically separate from the Remote Computer. RGS can be used by local users 1 and 2 to connect to the primary user's desktop 2-9 Establishing an RGS connection using Standard Login In normal operation, users are required to authenticate twice when establishing an RGS connection from a Local Computer to a Remote Computer. This is the Standard Login process-the two steps are: 1. The first authentication step is from the RGS Receiver to the RGS Sender-this is called authenticating the RGS connection. The dialog for this authentication step is generated and displayed by the RGS Receiver on the Local Computer. 2. The second authentication step is when logging into or unlocking the Remote Computer desktop session-this is called logging into the Remote Computer. The login or unlock dialog is generated by the Remote Computer, and is displayed in the Remote Display Window on the Local Computer. Figure 2-10 shows the two-step Standard Login RGS connection process. Figure 2-10 Standard Login process Step 1: Authenticating the RGS connection Step 2: Logging into the Remote Computer RGS Connection RGS overview 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196

RGS overview 25
The one-to-many configuration is ideal for collaboration because each user can interact with the applications
running on the Remote Computer (subject to RGS policies which arbitrate which user is able to provide keyboard
and mouse inputs to the Remote Computer at any particular time). As one user interacts with the applications on
the Remote Computer, all other users can view these interactions.
See Section 5-5, “
Collaborating
,” for details.
In the previous example, it was assumed that the primary user and the local users were all physically separate
from the Remote Computer. This, however, doesn’t have to be the case. RGS works equally well sharing between
workstations (see Figure 2-9).
Figure 2-9
Sharing between workstations
In Figure 2-9, the primary user is directly logged into the Remote Computer using its attached keyboard, mouse
and monitor. In other words, the primary user is physically present at the Remote Computer, while local user 1
and local user 2 are physically separate from the Remote Computer. RGS can be used by local users 1 and 2 to
connect to the primary user’s desktop
2-9 Establishing an RGS connection using Standard Login
In normal operation, users are required to authenticate twice when establishing an RGS connection from a Local
Computer to a Remote Computer. This is the
Standard Login
process—the two steps are:
1.
The first authentication step is from the RGS Receiver to the RGS Sender—this is called
authenticating the
RGS connection
. The dialog for this authentication step is generated and displayed by the RGS Receiver on
the Local Computer.
2.
The second authentication step is when logging into or unlocking the Remote Computer desktop session—this
is called
logging into the Remote Computer
. The login or unlock dialog is generated by the Remote
Computer, and is displayed in the Remote Display Window on the Local Computer.
Figure 2-10 shows the two-step
Standard Login
RGS connection process.
Figure 2-10
Standard Login process
Remote Computer
Primary User is
logged into the
computer using
its attached
keyboard, mouse
and monitor.
Local User 1
(viewing primary
user’s desktop
session)
Local User 2
(viewing primary
user’s desktop
session)
Step 1: Authenticating
the RGS connection
Step 2: Logging into
the Remote Computer
RGS Connection