Generates extra work for installers: commonly terminal servers must be configured independently, and never with the interface of the access control software program.Shared resources can be obtained to users and groups aside from the resource's owner, and they need to be protected from unauthorized use. From the access control design, end users and