{"id":"nasoym-ubuntu-x2go-server","name":"ubuntu_x2go_server","homepage":"https://hub.docker.com/r/nasoym/ubuntu_x2go_server","repo_url":"https://hub.docker.com/r/nasoym/ubuntu_x2go_server","category":"infrastructure","subcategories":[],"tags":["remote-desktop","x2go","ubuntu","ssh-tunneling","remote-access","linux-server"],"what_it_does":"ubuntu_x2go_server is a packaging/installation resource for running an X2Go server on Ubuntu, enabling remote desktop sessions (typically via SSH-tunneled X2Go) for users to access graphical environments.","use_cases":["Provide remote GUI access to Ubuntu systems for teams or customers","Run lightweight virtual desktop sessions on servers","Support remote work environments where full VNC/RDP is undesirable","Set up terminal-like remote desktops with session management"],"not_for":["Highly interactive real-time 3D workloads (X2Go may not be ideal)","Internet-exposed deployments without strong network and host hardening","Use cases requiring a public web API/SDK integration (this is a system/service, not an application API)"],"best_when":"You want remote desktop access to Ubuntu hosts using X2Go and can secure the network/SSH access appropriately.","avoid_when":"You need a managed cloud service with provider SLA, or you require a standardized REST/GraphQL API, or you cannot implement SSH/host security controls.","alternatives":["Apache Guacamole (web-based gateway for SSH/VNC/RDP)","xrdp / RDP-based remote desktop (platform dependent)","VNC (often with SSH tunneling)","NoMachine (commercial/closed source option)","Windows RDP for Windows targets"],"af_score":19.5,"security_score":45.8,"reliability_score":30.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:29:48.571076+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["SSH authentication (user accounts/keys) used as transport for X2Go"],"oauth":false,"scopes":false,"notes":"Auth is typically handled via system accounts/SSH configuration rather than an API-layer authentication mechanism. Security depends on how SSH and the X2Go server are configured."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"No SaaS pricing information available; this is an infrastructure component intended to be self-hosted."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":19.5,"security_score":45.8,"reliability_score":30.0,"mcp_server_quality":0.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":50.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":55.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":50.0,"security_notes":"Security largely depends on SSH and OS hardening (key-based SSH vs passwords, fail2ban/limits, firewalling, least-privilege user accounts). TLS/transport security is typically provided by SSH tunneling rather than a separate HTTP/TLS layer. No package-manifest/dependency details were provided here to assess CVE hygiene.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":40.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["This is not an agent-callable API; it’s a host-level service setup where 'errors' are surfaced via logs/SSH connectivity rather than structured responses.","Remote desktop services are sensitive to network/firewall rules, SSH configuration, and display/session permissions."]}}