How to set up Request Permission to Connect for RDP Terminal Sessions

We’ve introduced a new feature that requires users to request permission before switching to a specific RDP session on a server. This added layer of security ensures that end users are aware of and approve any remote access requests, enhancing privacy and control.

Supported Subscriptions

  • Splashtop Enterprise [Remote Support (Technician) | Remote Access (End-User)]

Requirements

  • Remote Side: Streamer app version 3.7.4.2 or higher
How to enable the feature

To enable the permission request feature, follow these steps:

  1. Log into the Web Console:
  2. Go to Team Settings or User Granular Control:
    • Team Settings: Go to Management Settings Session Security Request permission to connect, and click Detailed setup.
      Detailed setup screenshot
      Select the RDP Terminal Session tab.
      Snipaste_2025-06-10_14-52-12_en-us.png
       Select one of the three Request permission to connect options and apply them based on the user role (Admin, Group Admin, or Member).
      Request permission settings screenshot
    • User Granular Control: Navigate to Management Users, find the user, and click the request permission icon.
      User settings screenshot
      Select the RDP Terminal Session tab, then choose one of the three Request permission to connect options for the user.
      Snipaste_2025-06-10_14-54-03_en-us.png
Note: The feature is off by default and must be manually enabled by an admin.
What the feature does

Once enabled, this feature will prompt users to request permission before switching to an active RDP session on the server. Here’s how it works:

  • Permission Request: When a user tries to switch to another session, the end user in that session will receive a permission request pop-up asking for approval.
  • Session Switch Behavior:
    • If the end user approves, the session switch happens immediately.
    • If the end user denies, the switch is canceled, and the user remains in their original session.
  • Request Permission to Connect Options:
    • Reject connection after request expires (At login screen, reject automatically)
      • If no response is received within 30 seconds, the connection is rejected automatically. If the computer is on the login screen, the request is bypassed and rejected instantly.
    • Reject connection after request expires (At login screen, allow automatically)
      • If no response is received within 30 seconds, the connection is rejected. If on the login screen, the system automatically allows the connection.
    • Allow connection after request expires
      • If no response is received within 30 seconds, the connection is automatically accepted.

This new permission request feature enhances session security and ensures that end users have control over who can access their sessions. By following the steps outlined above, admins can enable this feature for their team, providing greater control and security for remote access.

Related Articles

0 out of 0 found this helpful