Administrator Guide
Table Of Contents
- Dell Wyse ThinOS Lite Release 2.6 Administrator’s Guide
- Introduction
- Before working on ThinOS Lite
- Getting started
- Global connection settings
- Configuring the connectivity
- Configuring the network settings
- Configuring the remote connections
- Configuring the Citrix broker setup
- Configuring the visual settings
- Configuring the general options
- Configuring the authentication settings
- Configuring the central configurations
- Configuring the VPN manager
- Configuring the connection broker
- Configuring Citrix
- Configuring the Citrix broker setup
- Citrix HDX RealTime Multimedia Engine—RTME
- Citrix Icon refresh
- Using multiple audio in Citrix session
- Using Citrix NetScaler with CensorNet MFA authentication
- Okta Integration through Citrix NetScaler
- Configuring ICA connections
- ICA Self Service Password Reset—SSPR
- QUMU or ICA Multimedia URL Redirection
- HTML5 Video Redirection
- ICA SuperCodec
- Anonymous logon
- Configuring the Citrix UPD Printer
- Introduction to Flash Redirection
- Configuring Citrix
- Configuring Zero Client Settings
- Performing Diagnostics
- BIOS Management
- Security Changes
- Creating and Using xen.ini Files
- Examples of Common Printing Configurations
- Important Notes
- Troubleshooting
11. In the Device Configuration pane, click Firmware Upgrade, and then click Configure this item.
12. From the Platform type drop-down list, select your thin client model.
13. From the Firmware to auto deploy drop-down list, select the firmware file that corresponds to your thin client model.
14. Click Save & Publish.
The thin client restarts, and the firmware version is upgraded.
System configuration and deployment
● ThinOS BIOS policy can be configured using Wyse Management Suite Console, Wyse Management Suite group INI, Wyse
Management Suite advanced settings and FTP INI. Dell recommends that you use any one of the methods to configure the
BIOS policy. Setting the BIOS policy simultaneously using different methods may cause a policy mismatch, and the device
reboots repeatedly. This reboot loop issue is observed when you select the reboot immediately option in the BIOS policy
settings section on the Wyse Management Suite console.
● All the installed packages are deleted when you update the ThinOS Lite version between major releases—2.5 to 2.6—using
FTP, WDM, or Wyse Management Suite.
Solution for updating firmware using FTP and WDM—Ensure that you have set the PKG install parameters in the WNOS.ini,
and the pkg files are uploaded in the directory. After the device reboot, the packages are re-installed automatically.
Solution for updating firmware using Wyse Management Suite—Wyse Management Suite App policy works only once after
the policy is created. The deleted package cannot be reinstalled using the same policy. Dell recommends that you create a
new App policy to install the package after the firmware update is complete.
● WDM vulnerability is fixed in this release. You must configure either the DHCP or the DNS option/record of the WDM server
fingerprint to automatically fetch and validate the fingerprint before checking in to the WDM server. However, there is no
impact to the ThinOS Lite device functionality if you do not to configure the fingerprint validation environment. For more
information about how to set up fingerprint using WDM, see the Dell Wyse ThinOS Lite Version 2.6 Administrator's Guide at
www.dell.com/support.
How to set up fingerprint using Wyse Device Manager
To set up your fingerprint using WDM, do the following:
1. Export the WDM server certificate from the WDM server that you want to access.
2. Extract the fingerprint value from the WDM certificate in the required format.
You must use a system with OpenSSL installed. OpenSSL can be used to extract the fingerprint in required format from the
WDM certificate itself.
The fingerprint is generated from the following command:
openssl x509 -in <your certificate name>.crt -pubkey -noout | openssl pkey -pubin
-outform der | openssl dgst -sha256 -binary | openssl enc -base64
NOTE:
If cert.crt is in DER format instead of the PEM format, you must add -inform to the first command. The
certificate supports SHA256 in base64 encoded format.
3. Configure either the DHCP option or the DNS TXT record.
● If you want to use the DHCP option, configure the following option tags defined in the DHCP server:
○ Option ID—200
○ Name—WDM_Fingerprint
○ Type—String
● If you want to use the DNS TXT record, enter the name as WDM_Fingerprint, and provide the fingerprint string value.
NOTE:
If the DNS TXT record for fingerprint cannot be retrieved, the device fetches the values from the DHCP scope
option. If the fingerprint certificate is already available, the device checks in to the WDM server. If the connection fails, the
failure logs are registered on the zero client.
Before working on ThinOS Lite 11