Security configuration options

Access the Security tab to configure the security level, clear stored passwords, view/clear known hosts, and set webview permissions.

The Security tab consists of four sections:


Changes are not applied until Apply is clicked. To discard changes, click Restore.

Security Level

Use the slide to set the security level.


The Passwords section of the Security tab is for password management.

The Manage button allows you to clear one or more stored user/password combinations. Click the Manage button to open the Manage passwords dialog. From this dialog, you can clear selected (or all) passwords stored by the GDC.

The Disable checkbox determines whether a user will be able to store their password and whether a user can silently logged in. By default, it is not selected; users will have the option to save their passwords by selecting the Save Password checkbox on the login form. When selected, the GDC stores the user and password for a specific host and port. The GDC will then attempt to silently log in a user if their credentials were saved and they are coming from the same host and port.

To prevent a user from saving their password, select the Disable check box. When selected, the Save password checkbox will not appear on the Login box and the end user must enter their password at every login attempt. No user will silently be logged in.

Known Hosts

View or remove known hosts.

Click the Manage button to open the Manage known hosts dialog. From this dialog, you can view known host details and remove selected (or all) known hosts.

Webview Permissions

Manage webview permissions.

Select and click the toggle to turn on the selected permission. When a webcomponent or UR application requests permissions, the GDC automatically answers based on the selected toggles. There are permissions for:
  • Notifications — Grants permission for web notifications for the end-user.
  • Location — Grants permission for the user's hardware or services location.
  • Audio capture devices, such as microphones
  • Video capture devices, such as cameras
  • Mouse locking — Grants permission for locking the mouse pointer to the web view. This is typically used in games.
  • Video output capture — Grants permission for the capture of the user's display. For example, screen sharing.
  • Both Audio & Video output capture — Grants permission for the capture of the user's audio and video display.