^^ Answer: Yes - Using a non-admin user for both SSH and Session/Screen Sharing ^^
RDP = Remote Desktop Protocol - I don't know what else to call it as I am NOT using "VNC", "RealVNc" "TightVNC" etc.
I'm NOT trying to connect to an Admin account session on a remote machine. I just want the SSH user account used to connect to the remote machine to connect to there own desktop session and not be able to choose who ever else's session they want including say any Admin session that happen to be running! This doesn't seem to be right.
FYI... I'm using Apples own software to connect thats why I call it RDP or I guess just call it "Screen Sharing".
I Thought Apple had it own proprietary system protocol. Does it really only use some variant of VNC protocol ? as I have all VNC option switched off in OSX's Sharing/Managment settings.
RDP is a Microsoft protocol. Port 5900 is the usual port for the VNC protocol. Apple's screen sharing is based on the VNC protocol. So I was being too literal when reading your post. Sorry I added that noise to the discussion.
If you really have duplicated the exact security settings when testing without port forwarding, then you might have discovered an exploit that should be reported. But, you should check very carefully for any configuration differences between the two scenarios that you've set up.
In the port forwarding setup, the remote machine thinks a VNC connection is being initiated from loopback interface rather than an external one. I suppose Apple's VNC server could be dropping its guard with respect to that private network interface, but I think that's a stretch. Try to port forward to the remote machine's external address instead; see if that makes a difference.
As an aside, the choice of ssh user is unrelated to the user trying to establish the screen sharing session. The ssh user is simply setting up the ssh tunnel. The screen sharing session is using that tunnel and different credentials can be supplied for that session.