Virtual Meeting Rooms can be configured to require a Host or Guest PIN to join a meeting to insure that only those invited can attend.


The manager of the VMR can configure the Host and Guest PIN's via their account at my.vNetCall.com (once logged into my.vNetCall.com or my.videxio.com select 'Profile' in the pulldown for your account name, then 'Profile' > 'Your VMR').


The options are:

  • No PINs defined -- all participants join with the same role
  • Only Host PIN defined -- the first participant who enters the Host PIN is the host and starts the meeting, while all other participants are guests
  • Host PIN along with Guest PIN defined -- the first participant who enters the Host PIN starts the meeting, while all other participants are guests. There can be multiple hosts.

Participants entering the Host PIN will start the meeting, while participants entering the Guest PIN will wait in a welcome lobby until the first Host joins.


Host and Guest PIN's are static and kept as-is until the manager of the VMR either deletes or changes them. If a PIN is set on a VMR, the host will have to join the VMR before any guests can enter, independent of whether a Guest PIN or only a Host PIN are used.


VMR PIN brute force attack resistance


Common attacks on videoconferencing systems include rogue calls — such as Spam Over Internet Telephony (SPIT) or toll fraud call attempts — that are targeted at an organisations SIP (or, more rarely, H.323) infrastructure.

To mitigate such attacks, the Pexip Service platform enables PIN brute force resistance and on all VMRs.

The current blocking policies on PIN attacks are as follows:

  • 5 is the maximum attempts for Web/Desktop app users
  • 3 is the maximum attempts for SIP/H323/Skype4B connections


If more than 20 incorrect PIN entry attempts are made against that VMR in a 10 minute window this will block the VMR. While blocked, it will appear to any callers as though the VMR/alias does not exist any longer and the call will fail.