Administrator Guide
Original Equipment Manufacturer branding...........................................................................................................51
Configuring universal access.................................................................................................................................... 53
Chapter 4: Configuring Connections locally ................................................................................ 56
Configuring and managing the browser connections............................................................................................... 56
Managing browser global settings...........................................................................................................................58
Configuring and managing Citrix connections............................................................................................................60
Configuring the server connection type.................................................................................................................61
Configuring Global Citrix settings............................................................................................................................64
Managing PAM login................................................................................................................................................... 70
Citrix ICA Client RTME...............................................................................................................................................70
Citrix Workspace App..................................................................................................................................................71
Configuring and managing the custom connections................................................................................................. 71
Configuring and managing the Ericom PowerTerm connections...........................................................................72
Configuring and managing RDP connections............................................................................................................. 76
Configuring and managing the SSH connections...................................................................................................... 82
Configuring and managing VMware connections...................................................................................................... 82
Configuring and managing the VNC viewer connections........................................................................................ 87
Starting VDI session without login credentials...........................................................................................................90
Zoom application for VDI.................................................................................................................................................90
Chapter 5: Security settings........................................................................................................ 91
Managing the accounts settings.................................................................................................................................... 91
Managing the certificates............................................................................................................................................... 92
Configuring the firewall settings................................................................................................................................... 93
Managing SSH server preferences............................................................................................................................... 94
Setting VNC server preferences ..................................................................................................................................95
Chapter 6: Additional management configurations...................................................................... 97
Active Directory.................................................................................................................................................................97
Configuration management............................................................................................................................................ 98
HAgent............................................................................................................................................................................... 100
INI management.............................................................................................................................................................101
Logs and Tools ................................................................................................................................................................ 102
SCEP configuration management................................................................................................................................106
Wyse Device Agent ........................................................................................................................................................ 107
Chapter 7: Viewing XTerm.......................................................................................................... 110
Chapter 8: Imaging solutions.......................................................................................................111
Merlin Imaging from file server...................................................................................................................................... 111
Merlin imaging using docking station with MAPT..................................................................................................... 111
Chapter 9: Password encoding................................................................................................... 112
Base64 passwords encoding..........................................................................................................................................112
AES password encoding................................................................................................................................................. 112
Appendix A: Central configuration—Automating updates and configurations..............................113
How INI files are deployed..............................................................................................................................................113
4
Contents