Your unique requirements and current setup will determine what kind of configuration is most advantageous for your company. The two types of network configuration are Domain and Workgroup (also known as Peer to Peer). Please continue reading to determine which setup is best suited to your company.
Terminal Server
Once logged into a computer on the network, a user can then login to what is called a terminal server. This is a computer that allows multiple users to login simultaneously. Once logged in, users can run the programs that are installed on that computer. With a terminal server, RentalPoint is only installed once, and all users login to this computer to connect to RentalPoint. Updating to newer versions of RentalPoint is simple since you only need to update one copy of RentalPoint to affect all users.
Client/Server
If you do not have a terminal server, RentalPoint can be setup using a Client/Server configuration. This means that instead of installing RentalPoint on one computer, it will be installed on all computers in the network. A configuration file will point to the correct document/data folders and database. Once logged into a computer on the network, there will be a shortcut on the desktop that will launch RentalPoint. If you need to update RentalPoint you will need to apply the patch to all computers running RentalPoint.
Domain
A domain forces a user to login to a domain controller before they are allowed access to a computer. Logins can be used against any computer on the network. If your company is using a domain, it is recommended that a RentalPoint security group be created. This group is granted specific permissions on the SQL Server, and then users are added to the group. More information about the SQL server can be found later in this document. If your company is using a domain, you can setup RentalPoint to be configured through a Terminal Server or through Client/Server connections.
WorkGroup/Peer to Peer
If your company is not running on a domain network, it is likely that you will be running what is called Workgroup/Peer to Peer. Since there are limitations and restrictions imposed by the operating system, Peer to Peer can be difficult to configure. Due to the security improvements and features of Microsoft SQL Server and Microsoft operating systems, you must authenticate the user against the database to allow access. This type of configuration requires all operators of RentalPoint to have full administrative rights on their client computer and an account mirroring it on the server computer as well. This kind of configuration is good for small companies that do not have many computers or do not wish to create a domain infra structure.
Now that you have determined which network type you are using, continue to the next section to determine if you have a compatible operating system as well as sufficient hardware requirements.