Require approval for access¶
The Require Approval option enhances security by mandating that users must request access to a server before they can connect. When this option is enabled, authorized users are given a specified timeframe to either approve or reject the access request. This mechanism ensures that access to critical systems is controlled and monitored, reducing the risk of unauthorized or inappropriate use. It also fosters accountability, as each access request is documented and reviewed by designated personnel. This feature aligns with 4-Eyes principle by providing an additional layer of oversight and control.
Note
The 4-Eyes principle is a security measure that enhances access management by requiring the approval or presence of two authorized individuals for critical operations. This approach ensures that no single person has complete control over sensitive actions, reducing the risk of errors, fraud, or unauthorized access.
In order to enable sending user requests, it’s necessary to have the Require approval option checked in safe configuration. For more information, refer to the Creating a safe section.
Note
To receive email notifications about pending sessions, select Session awaiting approval notification in safe configuration.
Approving and declining user requests is also possible via the Fudo Officer application. Session awaiting approval (push) notification should be enabled in order to see notifications about pending requests.