HP ThinPro 5.0 - Administrator Guide

8. Double-click the desired configuration file on the USB key.
9. Click Finish.
VNC Shadowing
Virtual Network Computing (VNC) is a remote desktop program that allows you to see the desktop of
a remote computer and control it with your local mouse and keyboard.
To access the VNC Shadow utility:
Select Management > VNC Shadow in the Control Panel.
NOTE: You must restart the client before any changes to the VNC Shadowing options will take
effect.
The following table describes the options available in the VNC Shadow utility.
Option Description
Enable VNC Shadow Enables VNC Shadowing.
VNC Read Only Makes the VNC session read-only.
VNC Use Password Makes a password required when accessing the client using VNC.
Click Set Password to set the password.
VNC Notify User to Allow Refuse Enables a notification dialog on the remote system that informs the
remote user when someone is attempting to connect using VNC.
The user can refuse either allow or refuse access.
VNC Show Timeout for Notification Sets the length of time in seconds that the remote notification
dialog is displayed.
User Notification Message Allows you to display a message in the notification dialog to the
remote user.
Refuse connections in default If enabled, the VNC connection will be refused by default when the
timer expires.
Re-set VNC server right now Resets the VNC server after applying the new settings.
Certificates
NOTE: For more information about using certificates in Linux, go to http://www.openssl.org/docs/
apps/x509.html.
Certificate Manager
To open the Certificate Manager:
Select Advanced > Certificates in the Control Panel.
Use the Certificate Manager to manually install a certificate from a certificate authority (CA). This
action copies the certificate to the user’s local certificate store (/usr/local/share/ca-certificates) and
configures OpenSSL to use the certificate for connection verification.
If desired, use the Profile Editor to attach the certificate to a profile, as described in
Adding certificates
to a client profile on page 59.
22 Chapter 4 Control Panel configurations