Rationale
If you intend to use shadowing (viewing or controlling a user’s desktop remotely) on IGEL OS 12, several configuration options can improve both security and privacy.
Instructions
By default, Shadowing in IGEL OS 12 uses TLS and certificate-based authentication. These mechanisms provide encryption and verification of the shadowing connection.
You can disable Deny shadowing via external VNC tool to allow the use of third-party VNC clients, however, this is not recommended, as doing so may result in unencrypted VNC traffic.
To configure secure shadowing:
-
In IGEL Setup, go to System > Remote Access > Shadow.
-
Activate Allow Remote Shadowing.
-
Configure as many of the following options as applicable to your use case. Each additional setting improves security and, in most cases, enhances user privacy:
-
Enable Use Password and set a strong password (not required in default TLS mode).
-
Maximum length for this password: 8 characters.
-
-
Enable Prompt User to allow Remote Session.
-
Enable Allow User to disconnect Remote Shadowing.
-
Disable Allow Input from Remote.
-
-
Click Save.
In the UMS Console, you can also enable shadowing session logging under:
UMS Administration > Global Configuration > Remote Access
This records which users have performed shadowing, providing an audit trail for security reviews.