Administrator Guide

Table Of Contents
Request the certificate automatically using Wyse Management
Suite
Steps
1. Log in to Wyse Management Suite.
2. Go to Groups & Configs and select your preferred group.
3. Expand Edit Policies and click ThinOS 9.x.
The Configuration Control | ThinOS window is displayed.
4. In the Advanced tab, click Privacy & Settings.
5. Click SCEP.
6. Click the Enable Auto Enrollment slider switch to enable automatic certificate enrollment using the SCEP server.
7. Click the Enable Auto Renew slider switch to automatically renew the certificate.
The client requires a password to renew the client certificate. So if you are using an enrollment password that can expire
in a short time, the enrollment password must valid at the time when auto renew behavior happens on the client. Dell
Technologies recommends using the admin credentials or a fixed enrollment password to auto enroll, and auto renew
certificate.
8. Click the Select Install CA Certificate slider switch to install the root CA's certificate as a trusted certificate after
successfully getting the client certificate.
9. Specify the country/region name, state, location, and other details.
10. Click Save & Publish.
NOTE:
You can also configure the SCEP Administrator URL, Admin User, Admin User Password, and Admin User
Domain options to request for SCEP certificate. If the enrollment password is not specified, the client uses the SCEP
Administrator URL, Admin User, Admin User Password, and Admin User Domain options to request SCEP. If you specify
the enrollment password, the enrollment password is used for SCEP, even though the password entered is invalid. In this
scenario, the SCEP Administrator URL, Admin User, Admin User Password, and Admin User Domain options are ignored.
About Default Certificates
Default certificates are embedded in the ThinOS, on ThinOS 9.1.3112 and the user cannot view the default certificate
fromSystem Settings > System Tools > Certificates. The following default certificates are displayed in the ca-certificates
folder, in an expandable tree structure format:
Certinomis_-_Root_CA.crt
Comodo_AAA_Services_root.crt
GlobalSign_ECC_Root_CA_-_R5.crt
CA_Disig_Root_R2.crt
Hongkong_Post_Root_CA_1.crt
USERTrust_ECC_Certification_Authority.crt
COMODO_Certification_Authority.crt
LuxTrust_Global_Root_2.crt
T-TeleSec_GlobalRoot_Class_2.crt
Certigna.crt
EC-ACC.crt
ePKI_Root_Certification_Authority.crt
Cybertrust_Global_Root.crt
SZAFIR_ROOT_CA2.crt
Amazon_Root_CA_4.crt
thawte_Primary_Root_CA_-_G2.crt
DST_Root_CA_X3.crt
SwissSign_Silver_CA_-_G2.crt
GeoTrust_Universal_CA_2.crt
Hellenic_Academic_and_Research_Institutions_RootCA_2015.crt
DigiCert_High_Assurance_EV_Root_CA.crt
Using the system tools
175