|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Automatic discovery on LAN
|
|
Centralized access to remote nodes on WAN/LAN/VPN
|
Automatic assignment of the first available Enterprise Desktop node
|
Guest desktop sharing (no system account required on the nodes)
|
Access to the local physical desktop for administration
|
Access via NoMachine Network (no IP required)
|
Give access to 'Foreign X Server' nodes (e.g. Solaris, AIX, HP-UX, BSD)
|
High-availability gateway to remote nodes
|
Load-balancing of connections between servers
|
Security and Authentication
|
|
Operational on any network: WAN, LAN, VPN, NAT, DMZ
|
Secure communication protected by SHA256 TLS/SSL cryptography
|
Support for industry standard SSH protocol
|
Full encryption for UDP traffic
|
Connect via HTTP proxy or SOCKS
|
|
Support for LDAP and MS Active Directory accounts
|
PAM based password authentication against Kerberos KDC
|
MIT/Heimdal/MS Active Directory Kerberos ticket authentication + ticket forwarding to the session(1)
|
PKCS11 smartcard authentication and authentication forwarding to the session(1)
|
PAM password + PAM-based 2FA (Google Authenticator, Yubikey)
|
Separate account authentication on the nodes
|
User Administration and User Management
|
|
User forwarding to any of the nodes
|
Automatic generation of system guest accounts for Linux terminal server nodes
|
Client redirection per-user and per-IP
|
|
|
Remote node management via remote administration interface
|
NoMachine profile propagation to any nodes (NoMachine servers)
|
Function as a node of Enterprise Cloud Server
|
Create a multi-level hierarchy of nodes
|
|