From 0b82f193180b62b94915bdd536915bfc1bfefb69 Mon Sep 17 00:00:00 2001 From: Bolke de Bruin Date: Wed, 9 Sep 2020 09:12:19 +0200 Subject: [PATCH] Improve documentation --- SECURITY.md | 3 ++- docs/man/xrdp.ini.5.in | 12 ++++++++++++ 2 files changed, 14 insertions(+), 1 deletion(-) diff --git a/SECURITY.md b/SECURITY.md index f7416710..2fec6a31 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -9,7 +9,8 @@ If you find a security vulnerability please kindly inform us about the problem i so that we can fix the security problem to protect a lot of users around the world as soon as possible. -Our email eddress for security report is: +Our email address for security report is below. This is a private mailing list and not open +for public viewing. * [xrdp-core@googlegroups.com](mailto:xrdp-core@googlegroups.com) diff --git a/docs/man/xrdp.ini.5.in b/docs/man/xrdp.ini.5.in index d7bce514..daa62afd 100644 --- a/docs/man/xrdp.ini.5.in +++ b/docs/man/xrdp.ini.5.in @@ -120,6 +120,18 @@ The default for RDP is \fB3389\fP. .TP \fBrequire_credentials\fP=\fI[true|false]\fP +If set to \fB1\fP, \fBtrue\fP or \fByes\fP, \fBxrdp\fP will scan the user name provided by the +client for the ASCII field separator character (0x1F). It will then copy over what is after the +separator as the password supplied by the user and treats it as autologon. If not specified, +defaults to \fBfalse\fP. + +.TP +\domain_user_separator\fP=\separator\fP +If specified the domain name supplied by the client is appended to the username separated +by \fBseparator\fP. + +.TP +\enable_token_login\fP=\fI[true|false]\fP If set to \fB1\fP, \fBtrue\fP or \fByes\fP, \fBxrdp\fP requires clients to include username and password initial connection phase. In other words, xrdp doesn't allow clients to show login screen if set to true. If not specified, defaults to \fBfalse\fP.