Is it possible to create a remote management policy which behaves in a
different way depending on the identity of the operator?

Lets say that if operator A connects to the device, a permission from user
is asked while if operator B connects, no permission from user is required.