Installation manual
5 Select a listed user whose access privileges you want to set, and then make the
changes you want to the access privileges. Your changes take eect immediately.
You can hold down the Option key while clicking the user’s checkbox to automatically
select all the following checkboxes for access.
For more information, see “Apple Remote Desktop Administrator Access” on page 66.
6 Repeat for additional users whose access privileges you want to set.
7 If desired, enter information in any or all of the four Computer Information elds.
This information appears in Apple Remote Desktop System Overview reports and
optionally in the computer list views. For example, you can enter an inventory number
for the computer, a serial number, or a user’s name and telephone number.
8 Click OK.
9 To activate the Apple Remote Desktop client, make sure to select the Apple Remote
Desktop checkbox, or select Apple Remote Desktop and click Start.
Apple Remote Desktop Administrator Access Using Directory
Services
You can also grant Apple Remote Desktop administrator access without enabling
any local users at all by enabling group-based authorization if the client computers
are bound to a directory service. When you use specially named groups from your
Directory Services master domain, you don’t have to add users and passwords to the
client computers for Apple Remote Desktop access and privileges.
When Directory Services authorization is enabled on a client, the user name and
password you supply when you authenticate to the computer are checked in the
directory. If the name belongs to one of the Apple Remote Desktop access groups,
you’re granted the access privileges assigned to the group.
Creating Administrator Access Groups
In order to use Directory Services authorization to determine access privileges, you
need to create groups and assign them privileges. There are two ways of doing this:
Method #1 You can create groups and assign them privileges through the
MCXSettings attribute on any of the following records: any computer record, any
computer group record, or the guest computer record.
70 Chapter 5 Understanding and Controlling Access Privileges