X Window Authorization

X Window Authorization

In the X Window System, programs connect to the X server, possibly via a computer network. Since the network may be accessible to other users, a method for forbidding access to programs run by users different from the one who is logged in is necessary.

There are five standard access control mechanisms that control whether a client application can connect to an X server. They can be grouped in three categories:

  1. access based on host
  2. access based on cookie
  3. access based on user

Additionally, like every other network connection, tunnelling can be used.

Read more about X Window Authorization:  Host-based Access, Cookie-based Access, User-based Access, Tunneling

Famous quotes containing the word window:

    It is a pleasure to stand upon the shore, and to see ships tossed upon the sea: a pleasure to stand in the window of a castle, and to see a battle and the adventures thereof below: but no pleasure is comparable to standing upon the vantage ground of truth ... and to see the errors, and wanderings, and mists, and tempests, in the vale below.
    Francis Bacon (1561–1626)