Skip to main content
Skip table of contents

Running the Terminal with Secondary User Authentication Enabled


The process of running the terminal on a Linux Client computer with secondary user authentication enabled is performed as follows:

1. The user opens the terminal.

2. The Client requests the user to enter their secondary user authentication credentials.

3. The user enters the credentials of a Syteca user that has the Access to Endpoint via Secondary Auth. permission for Clients.

4. These credentials are sent to the Application Server and the Application Server returns a response on whether access to the terminal is allowed. If the user has the required permission for the Client computer and the credentials they entered are correct, then the user is allowed to log in to the terminal (otherwise, a message is displayed to the user informing them that access is denied).

5. As soon as the user logs in to the terminal, the Client starts recording their activity, and the secondary user name is displayed in the Client Sessions list in the User name column in brackets: <Linux user> (<secondary authentication user>).


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.