Your browser does not allow storing cookies. We recommend enabling them.


Domain Policy

On the Domain Policy page you can define how Tectia Server handles the user name when a client user tries to log in without specifying the prefix (indicating a local or domain user account). This setting defines where the server will look for the user account, and how it will fill in the missing prefix part.

Tectia Server Configuration - Domain Policy page

Figure 4.7. Tectia Server Configuration - Domain Policy page

Tectia Server automatically lists all domains the local machine is part of, and places them into the Locations not checked field.

Move the relevant domains to the Locations checked field and arrange them to an order of preference. When a user logs in without a prefix, the user name is searched under the listed domains from top down. When a match is found, the rest of the domains are discarded. If no matching user accounts are found, authentication fails.

Option Default domain means that a user without a specified prefix will be treated as a domain user, and the default domain name of the local machine is added to the user name (usernamedefaultdomain_name\username).

Option Local machine means that a user without a specified prefix will be treated as a local user (usernamelocalmachine_name\username).

You can move unwanted domains to the Locations not checked list. These domains are not checked when searching for the user account.

If nothing is defined in the Locations checked list, Tectia Server first checks if the user name is valid in the default domain, and if no match is found, the user will be treated as a local user with the local machine name as the prefix.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now