Establish a secured connection
VNC protocol uses encryption only while making an initial connection and authorization. Once connected, all data transmitted is unencrypted, and a malicious user could snoop the VNC session, unless you are using Screen Sharing with encryption set to on. Remotix supports tunneling of VNC and RDP connections over SSH, a network protocol for secure data communication.
When you connect to a server over SSH, an SSH server will establish a connection to the VNC or RDP server instead of you and transmit all remote screen data to the Remotix through a secured SSH channel.
To establish an SSH connection, you have to provide SSH credentials in addition to the VNC or RDP login information.
Remotix supports two types of SSH authentication:
- Password: requires the password associated with the provided SSH username.
- Public Key: requires a pair of keys. See Connect to a Mac using authentication key for SSH.
The public key authentication is more secure and is a good protection against man-in-the-middle attacks. This also comes useful when you have several servers since it allows you to authenticate on all servers via the same personal private key. To use public key authentication in Remotix, choose the public key authentication type in connection settings and specify a private key’s location.
Use password authentication for SSH
- Select a connection in Stored list, or create a new one.
See Finding servers for information. - Click Edit.
- Open SSH Tunnel pane.
- Enable Use SSH Tunnel.
- Enter the SSH server hostname and port.
- Enter SSH authentication credentials.
If you’re using a Mac as an SSH server, these will be your OS X username and password. - Click Save.
Use public key authentication for SSH
- Select a connection in Stored list, or create a new one.
See Finding servers for information. - Click Edit.
- Open SSH Tunnel pane.
- Enable Use SSH Tunnel.
- Enter the SSH server hostname and port.
- Choose Public Key authentication type.
- Enter SSH username.
- Specify the private key file location.
- Click Save.
For more information about SSH protocol and SSH tunneling, see Secure Shell, Secure shell tunneling.
RELATED INFORMATION
Enable SSH on Mac