Software Distribution Methods for Attended Remote Access
The term “attended access” describes a system in which networked computers are granted shared access to a resource that is not secured. In other words, all computers on the network act as if they are “attached” to the same physical device. The apparent consequence of this type of sharing is data security. However, with a standard client-server computing model, unattended access can also lead to privacy concerns. That is why many large companies choose to use private label technologies for their network hardware and software instead of going with the more traditional open-source offerings.
Private Label Products (PLP) is a new development that allows a company to develop an operating system, database, and even applications and then sell it to other businesses. In this case, the company would develop unattended remote access devices and then license them to other firms. All of the machines would have the duplicate pre-installed copy of the PLP as each other so that no knowledge of what each machine did was necessary. All that is needed is to log onto the private label network, and each machine would do its own thing.
The second type of method requires a server with internet access. With this setup, each unattended access computer can connect to a private network of computers on the internet. This method requires login to access and internet connectivity. Each computer does, however, need to have its own Windows login ID and password. Because this is an unattended access method, no one logons to the server are required.
An alternative to private label systems is the remote computer access software bundle. This package allows users to go about installing their unattended access program. The package will provide internet and Windows authentication and allow the user to log on to the remote computer using their Windows credentials. It also does not require sharing Windows files or programs between the remote computer and the local computer.
When a user logs onto the remote computer, they are prompted for a username and password. If a user has forgotten their username and password, a list of common mistakes can be printed out, and then all users can be asked to enter them again. A list of common mistakes, which happen regularly, is shown to all users before the login process begins.
There are three components to unattended access systems. They are the client, the server, and the control panel. There are two types of the control panel: the web-based client and the physical client. The physical client is configured using the standard Windows features and can be accessed through a web browser. The web-based client requires a client-side programming interface (CBI), which connects it to the database servers.
The main benefits of unattended access are efficiency and cost savings. There is no need to share the computers between multiple staff members, as it only needs one person to maintain it. One staff member only has to log in instead of eight people who would have to log in, log off, manage their workstations, and reboot. Using the software distribution methods, the time required to get all the machines online and back online is significantly reduced.
The unattended access solution consists of three parts. The first part allows a business to access its computers at any time of the day or night. The second part is responsible for the configuration and maintenance of the unattended access servers. The last part is deployed to the remote computer to enable the customer to use their computers remotely.