Access Control
Overview
Access Control controls user access rights to drives, internal and external devices, communication ports and ports on a computer or network. The access to certain file types can be managed. Each user can have different permissions. The permissions may also depend on access rights of the used computer.
Available Tabs
Tab | Description |
User rights |
Next to the lock icon you can see, whether the active permissions apply to all users of the computer (computer rights) or they are your personal permissions (user rights). What is more, you can see whether you currently have a connection to the EgoSecure Server (online) or not (offline). In the Access rights column, you can see what access rights you have for the device of the Device type column. In the Time schema column, you can see if your access rights are limited to a specific time period. |
Connected devices |
In the Connected devices tab, you can see all devices currently connected to the computer and access rights to them. Comments If administrator assigns no individual permissions to certain device models, Computer’s rights (User’s rights) are displayed in the Comments column. If administrator assigns individual permissions to devices, the Administrative white list of unique devices note is shown in the Comments column. For example, if no access is assigned to the device class (device type) in User rights, certain device models can be permitted, and vice versa: if full access is assigned to the device class (device type) in User rights, certain device models can be forbidden. Encryption type In the Encryption type column, the encryption type enabled for this device is displayed. If administrator starts to control hard disks like external media, the Device encryption type applies and DE is displayed in the column. If hard disks are not controlled like external media or device encryption is not enabled for an Agent, then the Folder encryption takes effect and FE is displayed in the column |
File type filter |
In the File type filter tab, you can see which data filters are assigned to you.If the Blacklist mode is enabled for filters, you must not access files described in the File type column. If the Whitelist mode is enabled for filters, you can only access files described in the File type column. |
Access request |
In the Access request tab, you can contact your administrator and request access rights. For details, see Requesting access rights. |
Request access rights change
You can request access rights for one or more device types from the administrator. The administrator receives the access right request. As soon as he permits the rights, the corresponding permission is displayed in the Access rights column of the User rights tab. This can also be limited in time. In this case, you see the time restriction near the access right. If EgoSecure Agent has no connection to the EgoSecure Server (offline mode), the administrator can give you an unblocking code. As soon as the code is entered, you receive the required permissions. See also: Entering unblocking code
For individual devices
- In the User rights tab, right-click the entry for which you want to change access rights (e.g. no access).
- Select the access right which you want to ask for (e.g. Request full access).
- The Access request tab opens. In the Device menu, the selected device is listed and in the Access menu, the desired permission is listed.
- Alternatively, in the Connected Devices tab, right-click the entry for which you want to change access rights, and select Generate Access Request from the context menu that appears.
- The Access request tab opens. In the Device menu, the selected device is listed, and in the Instance menu, the selected instance is listed. Select the desired permission from the Access menu.
- In the Comments field, enter a message for the administrator.
- Click Send.
- The administrator receives the right change request.
- Once the administrator approves or declines your request, you are notified with the popup message.
For multiple devices
- Open the Access request tab.
- In the Device drop-down menu, select the device for which you want to request rights.
- If desired, select a specific device instance from the Instance menu.
- In the Access drop-down, select the desired right and click Add.
- Repeat these steps for other devices.
- In the Comments field, enter a message for the administrator.
- Click Send.
- The administrator receives the right change request.
- Once the administrator approves or declines your request, you are notified with the popup message.
For certain device models (offline mode)
- Open the Connected devices tab.
- Right-click on a device or port entry for which you want to request the access right change.
- Click Generate request code.
- The Generate request code dialog appears.
- Click Copy.
- The code is copied to the clipboard.
- Send the code to the administrator.
- The administrator receives the request and sends you the unblocking code, if necessary. For details, see Entering unblocking code.
Controlling the use of keyboards
The usage of keyboards other than the ones primarily connected to your computer, may be prohibited. The administrator can grant you the right to control newly connected keyboards on your own. Depending on the permission, a message appears once or every time when a keyboard is connected, where you select whether an additionally connected keyboard will be permitted or not.
- Click Accept in the pop-up dialog to permit the connected keyboard.
- Click Decline to block the keyboard.
- To change your decision later, right-click the keyboard under Access Control | Connected devices tab and select Modify access from the context menu.