Makes more get the job done for installers: generally terminal servers must be configured independently, and never throughout the interface with the access control software.Shared assets are available to end users and teams other than the source's owner, and they should be protected from unauthorized use. Within the access control product, consumer