{"id":103908,"date":"2024-01-24T11:30:00","date_gmt":"2024-01-24T16:30:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=103908"},"modified":"2024-01-24T10:06:03","modified_gmt":"2024-01-24T15:06:03","slug":"what-is-remote-user-access","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-remote-user-access","title":{"rendered":"What Is Remote User Access?"},"content":{"rendered":"\n

Remote user<\/em> access and remote access are two very similar sounding phrases that actually mean very different things. In this article, we\u2019ll show the distinction between the two terms and discuss them both in further detail.<\/p>\n\n\n\n

What Is Remote User<\/em> Access?<\/h2>\n\n\n\n

Remote user<\/em> access provides users with access to company resources regardless of physical location. That means traveling employees and remote personnel from across the world can all access internal applications, corporate intranet, and any other digital service necessary to complete their work.<\/p>\n\n\n\n

Learn more about remote user<\/em> access \u2193<\/a><\/p>\n\n\n\n

What Is Remote Access?<\/h2>\n\n\n\n

Remote access is essentially another term or alternative for remote desktop<\/a>. Remote access is a way for IT to take control of an end user\u2019s device, from anywhere at any time, with or without their presence, to troubleshoot technical problems. With remote access, IT can take control of end user devices to resolve issues and get users back up and running quickly. Rather than running into any technical problems blind or trying to get the user to screen share, IT can view and control the device in question without the assistance of the end user.<\/p>\n\n\n\n

Learn more about remote access \u2193<\/a><\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> In short, remote user access refers to how remote workers are able to access their work resources, and remote access is a useful ability for IT to support remote personnel by connecting to their machine without being physically present.\u00a0<\/p><\/div><\/div><\/div>\n\n\n\n

Now that it\u2019s clear how different remote user<\/em> access and remote access are, let\u2019s dive into the common methods of remote user<\/em> access.<\/p>\n\n\n\n

Common Methods of Remote User Access<\/h2>\n\n\n\n

There are a handful of ways that remote employees are able to access work resources securely and efficiently, some of which are through virtual private networks (VPNs), remote desktop protocol (RDP), and secure shell (SSH).<\/p>\n\n\n\n

Virtual Private Networks (VPN)<\/h3>\n\n\n\n

VPNs are the most common method of providing remote user access. These tools establish an encrypted connection between remote users and the main corporate network. That means that any user can connect to the network securely \u2014 even if they are connecting from an unsecured public Wi-Fi network.<\/p>\n\n\n\n

There are two main VPN protocols that provide remote user access:<\/p>\n\n\n\n