Dell Edge Device Manager Version R17 Administrator’s Guide
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Introduction....................................................................................................................................................6 Edge Device Manager on public cloud............................................................................................................................ 6 Log in to Edge Device Manager.................................................................................................................................
Managing Edge Gateway and Embedded PC App Inventory.....................................................................................83 Managing Edge Gateway—Ubuntu Core App Policies............................................................................................... 83 Managing Edge Gateway and Embedded PC Policy................................................................................................... 83 Managing File Repository.........................................................
Configuring the Wireless Profiles Password Editor.................................................................................................... 109 Limitations of Wireless Profiles Password Editor........................................................................................................109 D Third party licenses.................................................................................................................................... 110 License Type Details.......................
1 Introduction Edge Device Manager (EDM) is the next generation management solution for the Dell Edge Gateway devices that offers advanced feature options such as Cloud versus On-premises private cloud deployment, manage-from-anywhere through a mobile application, enhanced security such as BIOS configuration, and port lockdown.
Log in to Edge Device Manager IMPORTANT: You receive your credentials when you sign up for Edge Device Manager trial on www.wysemanagementsuite.com or when you purchase your subscription. You can purchase the Edge Device Manager subscription from your local Dell sales partner. For more details, see www.wysemanagementsuite.com. To log into the management console, do the following: 1 Start a browser on any machine with access to the internet. For the list of supported browsers, see support matrix.
Network communication ports The EDM installer adds Transfer Control Protocol (TCP) ports 443, 8080, and 1883 to the firewall exception list. The ports are added to access the EDM console and to send the push notifications to the thin clients.
The following are supported operating system language pack: 1 English 2 French 3 Italian 4 German 5 Spanish 6 Simplified Chinese 7 Japanese Supported browsers The following are the supported browsers: 1 Internet Explorer 11.0 and later versions 2 Google Chrome 62.
Configuration parameters are deployed to all devices in that group and all the subgroups, when the administrator creates and publishes the policy. After a configuration is published and propagated to the devices, the settings are not sent again to the devices until the administrator makes a change. New devices that are registered, receive the configuration policy that is effective for the group to which it was registered.
2 Key features • Windows 10 IoT Enterprise 2016 LTSB support for the following devices: – Edge Gateway—5000 Series – Embedded PC 3000 – Embedded PC 5000 • Updated EDM help URL—EDM help has a separate URL which is determined based on the available licenses. • Advanced application policy – Ability to push multiple application packages within single policy. – Applies policy to the devices that matches operating system or platform filters; or operating system and platform filters.
when they check-in. The policy cannot be edited, but can be deleted. The options Apply the policy to devices on check-in and Apply the policy to new devices cannot exist together. • Batch synchronization of BIOS admin and password—EDM system administrator can set the BIOS administrator and password for multiple devices. In the Jobs page, More Actions drop-down list is added.
3 EDM Dashboard overview The Dashboard page allows you to quickly view important status information about the system and recent events that have been performed within the system. By clicking a link in the Alerts area, you can view details about that item. Figure 1. Dashboard Links on the Dashboard page include: • Alerts This section displays the summary of all the alerts. These alerts allow you to quickly go to functional areas of the system that require your attention.
4 Managing group and configs The Groups & Configs page enables you to define policies that are required to configure your devices. You can create sub groups of the global group policy and categorize devices based on your requirements. For example, devices can be grouped based on job functions, device type, and so on. Figure 2.
NOTE: • When you modify the lower-level policies, a bullet symbol is displayed next to the policy. This symbol indicates that the policy is an override to a higher-level policy. For example, System Personalization, Networking, Security, and so on. • When you modify policies, an asterisk (*) is displayed next to the policy. This symbol indicates that there are unsaved or unpublished changes. To review these changes before publishing them, click the View pending changes link.
3 Click Save and Publish. Group tree hierarchy Group tree hierarchy consists of the following options: • Add Group • Edit Group • Remove Group Adding a group To add a group, complete the following steps: 1 On the Groups page, in Group Tree Hierarchy, click the + icon. 2 On the Add New Group(s) dialog box, enter the group information such as Group Name, Description, and the Parent Group value is displayed as Default Policy Group.
Unmanaged group Devices that belong to the unmanaged group do not use licenses or receive configuration or application-based policies. To add devices to an unmanaged group, use the unmanaged group device registration key as part of auto registration or manual device registration. To configure an unmanaged group, do the following: 1 Click Edit group. The Editing Unmanaged Group page is displayed. The following options are displayed on the page: 2 • Group Name—Displays the name of the group.
Figure 3. Ubuntu Core 3 After configuring the options, click Save & Publish. The Ubuntu Core edge gateway policy settings include the following options: • System Personalization • Login Experience • Security • Location • Edge Gateway 5000 BIOS Settings • Other • Edge Gateway 3001 BIOS Settings • Edge Gateway 3002 BIOS Settings • Edge Gateway 3003 BIOS Settings System personalization Use this page to set the time zone name, log level, and device owner. Table 2.
Parameter Description • Owner Warning Specifies the device owner. Login experience Use this section to define the administrator password for the supported operating system. Table 3. Login experience Parameter Description OS Admin Password Use this option to specify a new password for the admin user. By default, the password is set as Ubuntu. IMPORTANT: The OS Admin Password field cannot be left blank. Security Use this section to define security settings such as port configuration, SSH, and others.
Parameter Description City Specifies the city where your device is located. Zip Code Specifies the zip code of the city where your device is located. Country Specifies the country where your device is located. Edge Gateway 5000 BIOS settings Use this page to define Edge Gateway 5000 BIOS settings. Table 6. General settings Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 7.
Parameter Description Serial Port 4 RS485 Select the check box to determine how the built-in serial port operates. It avoids resource conflicts between the devices by disabling or remapping the address of the port. This port is at 3E8h with IRQ 10. Enable UEFI Network Stack Select the check box to install or make available the UEFI Networking protocols, allowing pre-operating system and early operating system networking features to use any enabled NICs. This may be used without switching on the PXE.
Parameter Description Enable CANBus Select the check box to enable CANBus. Table 10. Security settings Parameter Description Admin Setup Lockout Select the check box to prevent users from entering setup when the administrator password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you that someone has opened the case.
Parameter Description • • • Every Day Weekdays Select Days Table 14. POST Behavior settings Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots. Keyboard Errors Select the check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
Other settings Use this page to configure auto-pilot and firmware updates. You can update the operating system, BIOS, and applications after they are available in the Canonical/Dell store. By default, the options are enabled. Table 17. Other settings Parameter Description Enable Firmware Auto Update Select the check box to enable automatic update of your firmware. Enable Auto-Pilot Select the check box to enable the auto-pilot feature.
Parameter Description Enable Top USB Port 2 Select the check box to enable the device attached to this port. The device is also made available to the operating system. If USB port is disabled, operating system cannot recognise any device attached to this port. Enable Boot Support Select the check box to allow the system to boot any type of USB Mass Storage Devices—HDD, memory key, floppy.
Table 25. Auto On settings Parameter Description Auto On From the drop-down list, set the time of day when you want the system to turn on automatically. Table 26. POST Behavior settings Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots. Keyboard Errors Select the check box to report keyboard-related errors when the system boots.
Edge Gateway 3002 BIOS settings Use this page to define Edge Gateway 3002 BIOS settings. Table 29. General Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 30. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled—The internal LAN is off and not visible to the operating system.
Parameter Description Enable Boot Support Select the check box to allow the system to boot any type of USB Mass Storage Devices—HDD, memory key, floppy. USB-aware operating system always recognizes the USB Mass Storage devices irrespective of this setting if the port is enabled. Table 32. Wireless Parameter Description Enable WWAN Select the check box to enable Wireless Wide Area Network (WWAN). Enable WLAN Select the check box to enable Wireless Local Area Network (WLAN). Table 33.
Table 37. POST Behavior settings Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots. Keyboard Errors Select the check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 41. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled—The internal LAN is off and not visible to the operating system. Force Disabled—The internal LAN is off and not visible to the operating system even if it has an IP address. Enabled—The internal LAN is enabled.
Table 43. Wireless Parameter Description Enable WWAN Select the check box to enable Wireless Wide Area Network (WWAN). Enable WLAN Select the check box to enable Wireless Local Area Network (WLAN). Enable Bluetooth Select the check box to enable Bluetooth. Enable CANBus Select the check box to enable CAN Bus. Table 44. Security Parameter Description Admin Setup Lockout Select the check box to prevent users from entering Setup when the Admin password is set.
Table 48. POST Behavior Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots. Keyboard Errors Select the check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
• Security • Location • Other • Edge Gateway 3001 BIOS Settings • Edge Gateway 3002 BIOS Settings • Edge Gateway 3003 BIOS Settings System personalization Use this page to set the time zone name, log level, and device owner. Table 51. System personalization Parameter Description Time Zone Name From the drop-down list, select an appropriate time zone. Log Level From the drop-down list, select your preferred log level.
Parameter Description WARNING: If SSH is disabled, you cannot log in or connect to a headless device. Deactivate WebDM/snapweb Select the check box to uninstall Web Device Manager (WebDM) or snapweb. WebDM is a web-based management interface that allows you to configure, and install packages on Ubuntu Core devices. Location Use this page to configure edge gateway device location settings such as floor, building, campus, and so on. Table 54.
Table 57. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Disabled—The internal LAN is off and not visible to operating system. Force Disabled—The internal LAN is off and not visible to operating system even when an IP address is available. Enabled—The internal LAN is enabled. Enabled w/PXE—The internal LAN is enabled—with Preboot Execution Environment (PXE) boot.
Table 60. Security Parameter Description Admin Setup Lockout Select the check box to prevent users from entering Setup when the Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to provide information if someone has opened the case. From the drop-down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable—Disable chassis intrusion feature. Enable—Report intrusions during POST.
Parameter Description Extend BIOS POST Time From the drop-down list, select an option to create an extra preboot delay which allows the user to see POST status messages. The available options are: • • • 0 seconds 5 seconds 10 seconds Table 65. Maintenance settings Parameter Description BIOS Recovery—from Hard Drive Select the check box to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 66.
Parameter Description • • • Disabled—The internal LAN is off and not visible to the operating system. Force Disabled—The internal LAN is off and not visible to the operating system even if it has an IP address. Enabled—The internal LAN is enabled. Enable UEFI Network Stack Select the check box to install or make available the UEFI Networking protocols, allowing pre-operating system and early operating system networking features to use any enabled NICs. This may be used without switching on the PXE.
Parameter Description • UEFI Capsule Firmware Update On-Silent—Enable intrusion detection but does not display any detected intrusion. Select the check box to allow system to update BIOS UEFI capsule update packages by the system. Disabling this option blocks the BIOS updates from services such as Microsoft Windows Update and Linux Vendor Firmware Service (LVFS). Table 72. BIOS Admin Password Parameter Description Enable Admin Password Select this check box to enable the BIOS administrator password.
Table 76. Maintenance settings Parameter Description BIOS Recovery—from Hard Drive Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 77. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time.
Parameter Description Watchdog Timer Support Select the check box to enable the Watchdog Timer feature. Table 80. USB Configuration Parameter Description Enable USB 3.0 Ports Select the check box to enable the device attached to this port. The device is also made available to the operating system. If USB port is disabled, operating system cannot recognise any device attached to this port. Enable Top USB Port 1 Select the check box to enable the device attached to this port.
Table 83. BIOS Admin Password Parameter Description Enable Admin Password Select this check box to enable the BIOS administrator password. Table 84. Power Management Parameter Description Wake On LAN From the drop-down list, select an option to allow the computer to power up from the off state when triggered by a special LAN signal or from the hibernate state when triggered by a special wireless LAN signal. Table 85.
Table 88. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time. From the drop-down list, select any of the following options: • • • Reboot immediately Reboot later Do not reboot. Configuring Windows policy settings To configure the policy settings for the Windows device, do the following: 1 Select a group, and then click Edit Policies. 2 Click Windows. Figure 4.
System personalization Use this page to configure the Edge Gateway device settings such as time servers, time zone name, log level, and device owner. Table 89. System personalization Parameter Description Time Servers (NTP Servers) Enter the time servers to synchronize local time. Use comma separated list format. Timezone Name Select your appropriate time zone from the available time zones in the drop-down list. Log Level From the drop-down list, select your preferred log level.
Location Use this page to configure location settings such as floor, building, campus, and so on. Table 92. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the Building where your device is located. Campus Specifies the campus where your device is located. Formatted Address Specifies the formatted address where your device is located. Street Address Line One Specifies the Street address where your device is located.
Edge Gateway 5000 BIOS settings Use this page to define Edge Gateway 5000 BIOS settings. Table 95. General Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 96. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled—The internal LAN is off and not visible to the OS.
Parameter Description WLAN Region Code From the drop-down list, select the WLAN region code. Table 97. USB Configuration Parameter Description Enable USB 3.0 Ports Select this check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS cannot see any device attached to this port. Enable Top USB Port 1 Select this check box to enable the device attached to this port. The device is also made available to the OS.
Table 100. BIOS Admin Password Parameter Description Enable Admin Password Select this check box to enable BIOS administrator password. Successful changes to this password take effect immediately. Table 101. Power Management Parameter Description AC Recovery From the drop-down list, select an option to specify how the system behaves when AC power restored after an AC power loss.
Table 104. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 105. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time.
Table 108. USB Configuration Parameter Description Enable USB 3.0 Ports Select this check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS cannot see any device attached to this port. Enable USB Port 1 Select this check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS cannot see any device attached to this port.
Table 112. Power Management Parameter Description Wake On LAN From the drop-down list, select an option to allow the computer to power up from the off state when triggered by a special LAN signal or from the hibernate state when triggered by a special wireless LAN signal. Table 113. Auto On Parameter Description Auto On From the drop-down list, set the time of day when you would like the system to turn on automatically. Table 114.
Parameter Description • Do not reboot. Edge Gateway 3002 BIOS settings Use this page to define Edge Gateway 3002 BIOS settings such as Wake-On-LAN, Auto-On, and Admin Password. Table 117. General Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 118. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller.
Parameter Description always sees USB Mass Storage devices irrespective of this setting, provided the port is enabled. Table 120. Wireless Parameter Description Enable WWAN Select this check box to enable Wireless Wide Area Network (WWAN). Enable WLAN Select this check box to enable Wireless Local Area Network (WLAN). Table 121. Security Parameter Description Admin Setup Lockout Select this check box to prevent users from entering Setup when the Admin password is set.
Table 125. POST Behavior Parameter Description Numlock LED Select this check box to turn on the Numlock LED when the system boots. Keyboard Errors Select this check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 129. System Configuration Parameter Description Integrated NIC 1 From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC2 Disabled—The internal LAN is off and not visible to the OS. Force Disabled—The internal LAN is disabled and not visible to the OS even if it has an IP address. Enabled—The internal LAN is enabled. Enabled w/PXE—The internal LAN is enabled—with Preboot Execution Environment (PXE) boot.
Table 132. Security Parameter Description Admin Setup Lockout Select this check box to prevent users from entering Setup when the Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell your someone has opened the case. From the drop-down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable—Disable chassis intrusion feature. Enable—Report intrusions during POST.
Parameter Description • Extend BIOS POST Time Auto From the drop-down list, select an option to create an extra preboot delay which allows the user to see POST status messages. The available options are: • • • 0 seconds 5 seconds 10 seconds Table 137. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select the check box to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 138.
Figure 5. Embedded PC—Windows The Windows Embedded PC policy settings include the following options: • System personalization • Login experience • Security • Location • Network • Other • BIOS • Embedded Box PC 3000 System Personalization Use this page to define system personalization settings such as time servers, time zone name, log level, and owner. Table 139. System Personalization Parameter Description Time Servers (NTP Servers) Enter the time servers to synchronize local time.
Parameter Description Owner Specifies the device owner. Login Experience Use this section to define the OS admin credentials. Table 140. Login Experience Parameter Description OS Admin Credentials Specifies the admin username, and password for the OS By clicking Add Item, you can enter the OS Admin Username, and the OS Admin Password. Security Use this section to configure security settings for the Windows devices. Table 141.
Network Use this page to customize the network configurations like radio state, and manage wireless profiles for the Embedded PC—Windows devices. Table 143. Network Parameter Description Radio State Select the check box to change the wireless radio state. Windows Wireless Profiles From the drop-down list, select your preferred windows wireless profiles. Only Windows wireless profiles uploaded to File Repository are listed.
Parameter Description • • • • Disabled—The internal LAN is off and not visible to the OS. Force Disabled—The internal LAN is off and not visible to the OS. Enabled—The internal LAN is enabled. Enabled w/PXE—The internal LAN is enabled—with PXE boot. NOTE: The device may lose connectivity with WMS, if you disable both integrated NIC and integrated NIC 2. SMART Reporting Select the check box to control the reporting of hard drive errors for integrated drivers during system startup.
Table 149. Security Parameter Description Admin Setup Lockout Select the check box to prevent users from entering the setup when the Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you that someone has opened the case. From the drop-down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Table 153. POST Behavior Parameter Description Numlock LED Select this check box to turn on the Numlock LED when the system boots. Keyboard Errors Select this check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 157. System Configuration Parameter Description Serial Port 1—Serial Port 4 Select the option from the drop-down list. This option determines how the built-in serial port operates. It avoids resource conflicts between devices by disabling or remapping the address of the port. Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled—The internal LAN is off and not visible to the OS.
Parameter Description always sees USB Mass Storage devices irrespective of this setting, provided the port is enabled. Table 159. Security Parameter Description Admin Setup Lockout Select the check box to prevent users from entering setup when the Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you that someone has opened the case.
Table 164. Performance Parameter Description Multi Core Support Select the core support from the drop-down list. This option specifies whether the processor has one or more cores enabled. The performance of some applications improve with the additional cores. Hyperthread Control (if applicable) Select the check box to enable HyperThreading in the processor. Table 165. POST Behavior Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots.
Table 167. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 168. Wireless Parameter Description Wireless Device Enable Select the check box to enable the internal wireless devices. Table 169. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot.
• System Personalization • Login Experience • Security • Location • Other • BIOS Embedded BOX PC 3000 Settings • BIOS Embedded BOX PC 5000 Settings System Personalization Use this page to define system personalization settings such as time zone name, log level, and owner. Table 170. System Personalization Parameter Description Time Zone Name Select your appropriate time zone from the available time zones in the drop-down list.
Location Use this page to configure location settings such as floor, building number, and so on. Table 173. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the building where your device is located. Campus Specifies the campus where your device is located. Formatted Address Specifies the formatted address where your device is located. Street Address Line One Specifies the Street address of line where your device is located.
Parameter Description • • Integrated NIC 2 Enabled—The internal LAN is enabled. Enabled w/PXE—The internal LAN is enabled—with Preboot Execution Environment (PXE) boot. From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Disabled—The internal LAN is off and not visible to the OS. Force Disabled—The internal LAN is off and not visible to the OS. Enabled—The internal LAN is enabled.
Table 179. Security Parameter Description Admin Setup Lockout Select the check box to prevent users from entering Setup when the Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the bios can use to tell you that someone has opened the case. From the drop-down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable—Disable chassis intrusion feature. Enable—Report intrusions during POST.
Table 183. POST Behavior Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots. Keyboard Errors Select the check box to report keyboard-related errors when the system boots. Fastboot From the drop-down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 187. System Configuration Parameter Description Serial Port 1—Serial Port 4 From the drop-down list, select an option to determine how the built-in serial port should operate. It avoids resource conflicts between devices by disabling or remapping the address of the port. Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled—The internal LAN is off and not visible to the OS.
Parameter Description always sees USB Mass Storage devices irrespective of this setting, provided the port is enabled. Table 189. Video Parameter Description Video Mode Select the video mode from the drop-down list. The platform supports video output on three of the four video connectors. Video output is always supported on Display Port1 and HDMI. This feature selects video output either on the DisplayPort2 or VGA.
Table 194. Performance Parameter Description Multi Core Support Select the core support from the drop-down list. This option specifies whether the processor has one or more cores enabled. The performance of some applications improves with the additional cores. Hyperthread Control (if applicable) Select the check box to enable HyperThreading in the processor. Table 195. POST Behavior Parameter Description Numlock LED Select the check box to turn on the Numlock LED when the system boots.
Table 197. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 198. Wireless Parameter Description Wireless Device Enable This option allows you to enable/disable the internal wireless device Table 199. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot.
5 Managing Devices This section describes how to perform a routine device management task by using the management console. To locate the inventory of the devices, click the Devices tab. You can view a subset of the devices by using various filter criteria, such as groups or subgroups, device type, operating system type, status, subnet, platform, or time zone. To view the Device Details page of a particular device, click the device entry listed on the page.
• Status • OS Type • OS Subtype • Platform • OS Version • Agent Version • Subnet • Timezone 1 From the Configuration Groups drop-down list, select either the default policy group or the groups which are added by an administrator.
NOTE: • For public cloud you must register your thin clients by providing Wyse Management Suite URL and the Group Token for the group to which you want to register this device. • For private cloud you must register your thin clients by providing Wyse Management Suite URL and optionally the Group Token for the group to which you want to register this device. Devices are registered to the Unmanaged Group if the group token is not provided.
1 Insert a USB drive into a PC or laptop with which you are logged in to EDM. 2 Create a folder named config at the root level of the USB drive. 3 Within the config folder, create another folder named ccm-wda. 4 Download the Bootstrap file for the group to which you want to register the Edge Gateway/Embedded PC. 5 Rename the file to reg.json, and place inside the ccm-wda folder on the USB drive.
Parameter Description Shutdown Now Allows you to shut down the devices. Schedule Device Command Allows you to schedule the device command. Schedule App Policy Allows you to schedule the app policy. Wake on LAN If a device is turned off or in the sleep mode, and you want to activate the device, then select the device, and click the Wake on LAN option. Export Devices to CSV Allows you to export the devices to CSV.
6 Apps and Data The Apps & Data tab describes how to perform routine device application and file inventory management tasks and to set policies using the management console Figure 8.
4 Select the preferred applications, and then click Add to Inventory. 5 To return to the inventory, click Back to Inventory. Managing Edge Gateway and Embedded PC App Inventory The Edge Gateway / Embedded PC App Inventory page enables you to quickly view, and manage the application inventory for your Embedded PC device. To manage the Embedded PC inventory, do the following: 1 To add applications to the Embedded PC inventory, follow the user instructions specified on the page.
4 In the Add Standard App Policy page, do the following: a b c d e f g h 5 Enter a Policy Name. From the Group drop-down menu, select a group. From the Task drop-down list, select a task. From the OS Type drop-down menu, select an operating system type. Enter an Application. If you want to deploy an image to a specific operating system or platform, select either OS Subtype Filter or Platform Filter. Enter the Installer Parameters.
3 To add a file to the inventory, click Add File. The Add File page is displayed. 4 In the Add File page, do the following: a b To select a file, click Browse and navigate to the location where your file is located. From the Type drop-down list, select any one of the following options that suits your file type: • Certificate • Wallpaper • Logo • EULA text file • Windows Wireless Profile • INI file • Locate • Printer Mappings c d • Font Enter the description for your file.
7 Managing rules This section describes how to add and manage the rules in the EDM console. The following filtering options are provided: Registering unmanaged devices Configure the rules for unmanaged devices by using the Registration option.
Figure 10. Edit Rule 4 Click Save. Creating unmanaged device auto assignment rules To create rules for the unmanaged device auto assignment, do the following: 1 Click the Rules tab. 2 Select the Unmanaged Device Auto Assignment option. Figure 11. Add Rule 3 Click the Add Rules tab.
Figure 12. Create a rule for device auto assignment 4 Enter the Name, and then select Destination Group. 5 Click the Add Condition option, and select the conditions for assigned rules. 6 Click Save. The rule is displayed in the unmanaged group list. This rule is applied automatically, and the device is listed in the destination group. Editing unmanaged device auto assignment rule 1 Click the Rules tab. 2 Select Unmanaged Device Auto Assignment. 3 Select the rule and then click Edit Rule.
• Global and Group Admin NOTE: The notification frequency can be configured for every 4 hours, every 12 hours, daily or weekly basis to the target client. Figure 13. Alert Notification 1 To add a rule, click the Add Rule option and enter the following details: a b c From the drop-down list, select Rule. Enter the Description. From the drop-down list, select a target device to apply Notification Target and the time duration to apply Notification Frequency. Figure 14. Add Rule 2 Click Save.
8 Managing Jobs This page describes how to schedule and manage jobs in the management console. Figure 15. Jobs This include the following options: • Configuration Groups—From the drop-down list, select the configuration group type. • Scheduled by—From the drop-down list, select your preferred option. The available options are: a Admin – App Policy – Image Policy – Device Commands b System – Publish Group Configuration – Others • OS Type—From the drop-down list, select the OS type.
d 1 or more Cancelled e 1 or more Completed Topics: • Schedule application policy • Schedule device command job • Editing and cancelling job • Sync BIOS Admin Password Job Schedule application policy To schedule an application policy, complete the following task: 1 On jobs page, click the Schedule App Policy option. The App Policy Job screen is displayed. 2 From the drop-down list, select the policy. Image or application is not a recurring job.
Editing and cancelling job To edit a job, do the following: 1 Click the Jobs tab. 2 Select a job, and then click the Edit option. To cancel a job, do the following: 1 Click the Jobs tab. 2 Select a job, and then click the Cancel option. Sync BIOS Admin Password Job To synchronize the BIOS admin password, do the following: 1 On the Jobs page, from More Actions drop-down list, select Sync BIOS Admin Password. The Sync BIOS Admin Password Job page displayed. Figure 16.
9 Enter the description in the provided field. 10 Click Preview.
9 Events This section describes how to display all events and alerts in the management system with the help of management console. It also provides instructions on displaying an Audit of events and alerts for system auditing purposes. Summary of Events and Alerts is used to obtain an easy-to-read daily summary of what has happened in system. Audit page is used to format the information into a typical audit log-view, where one line is displayed for each event in the order of time. Figure 17.
4 • Custom Event Type—All the events are classified under particular groups. The available options in the drop-down menu are: • Access • Registration • Configuration • Remote Commands • Management • Compliance Viewing audit log The Audit window arranges the information into a typical audit log-view. You can view the timestamp, event type, source, and description of each event in the order of time. 1 Go to Events > Audit. Figure 18.
10 Managing users This section describes how to perform a routine user management task in the management console. The following are the two types of users: • Administrator(s): Edge Device Manager administrator can be assigned global administrator, group administrator, or viewer. – A Global Administrator has access to all EDM functions. – A Group Administrator has access to all assets and functions for specific groups that are assigned to them.
Figure 20. Unassigned Admins NOTE: To import users from the CSV file, click Bulk Import. Topics: • Adding new admin user • Editing admin user • Deactivating admin account • Deleting admin Adding new admin user To add an admin user, do the following: 1 Go to Users > Administrator(s), and then click Add Admin. The New Admin User page is displayed. Figure 21. New Admin User 2 Enter your email ID and user name in the respective fields.
4 Do one of the following: • If you click the Personal Information tab, enter the following details: – First Name – Last Name – Title – Mobile Phone Number • If you click the Roles tab, enter the following details: 1 In the Roles section, select the preferred role from drop-down list. The following options are available: – Global Administrator – Group Administrator – Viewer 2 In the Password section, do the following: a 5 Enter the custom password. b Click Save.
Deleting admin Users must be deactivated before you delete them. To delete a user, do the following: 1 Select the check box of a particular user or users which you want to delete. 2 From the More Actions drop-down menu, select Delete User(s). 3 Click Yes.
11 Portal administration This section contains a brief overview of your system administration tasks that are required to set up and maintain your system. Figure 22.
Configuring console settings This section enables you to configure settings for the Edge Device Manager console. Active Directory To import Active Directory users on the EDM private cloud, do the following: 1 Log in to the EDM private cloud. 2 Navigate to Portal Admin > Console Settings > Active Directory (AD). 3 Click the Add AD Server Information link. 4 Enter the server details such as AD Server Name, Domain Name, Server URL, and Port. 5 Click Save. 6 Click Import.
NOTE: To allow tenants to follow the ADFS configuration, upload the ADFS metadata file. a To upload the XML file stored on your device, click Load XML File. The file is available at https://adfs.example.com/FederationMetadata/2007–06/FederationMetadata.xml. Enter the details of the entity ID and X.509 signing certificate in the respective boxes. Enter the ADFS login URL address and the ADFS logout URL address in the respective boxes.
6 Safely eject the USB drive, and insert into the Edge Gateway/Embedded PC device, then reboot. External app services This section allows you to create secured Application Programming Interface (API) accounts. This service provides the ability to create special accounts. To configure the external application service, do the following: 1 Log in to the EDM, and click the Portal Administration tab. 2 Select External App Services under Console Settings. 3 Select the Add tab to add an API service.
Other settings You can use the following settings to enforce the APNS Warnings, License Expiration Warnings, and other Self Service Legal Agreements. • Dismiss License Expiration Warning on Dashboard page—Select this check box to disable the warning for a license expiration from displaying on the Dashboard page. • Heartbeat interval—The device sends heartbeat signal every 60 to 360 minutes. • Checkin interval—The device sends full checking signal every 8 to 24 hours.
Figure 23. Generate Report 4 Select the delimiter. 5 Click Save. Multi-Tenant This section allows you to create an additional organization. You can manage the organizations independently. Each account must have its own license key and can set up its own set of administrator accounts, policies, operating system images, application, rules, alerts, and so on. The high level operator creates these organizations. 1 Select the Enable Multi-Tenant check box.
Custom branding This option allows you to add the name of your company and its logo or brand. You can upload your own header logo, favicon, add a header title, and change header colors to customize the Wyse Management Suite portal. To access and specify custom branding: 1 Go to Portal Administrator > Account > Custom Branding. 2 Click Enable Custom Branding. 3 In Header Logo, click Browser and select and select the header logo image from the folder location.
A Troubleshooting Edge Device Manager Table 201. Troubleshooting Issue Workaround Windows Dell gateway agent service does not start in Edge gateway. Clear the log files at \Users\Public\Public Documents \Dell, and reboot the device. You cannot update Wyse Device Agent to 14.2.x version on Windows Edge gateway and Embedded devices. Reboot the device to auto update the agent. When you update the firmware for the first time, the error message Update the firmware again.
B Supported devices • Edge gateway 5000 running Windows 10 LTSB 15 • Edge gateway 3000 running Ubuntu Core 16 • Edge gateway 3000 running Windows 10 IoT LTSB 2016 • Edge gateway 5000 running Ubuntu Core 16 • Edge gateway 5000 running Windows 10 IoT LTSB 2016 • Embedded PC 3000 running Windows 7 Pro • Embedded PC 3000 running Windows 7 Pro for FES • Embedded PC 3000 running Windows Embedded Standard 7P • Embedded PC 3000 running Windows Embedded Standard 7E • Embedded PC 3000 running Windo
C Wireless profiles password editor The Wireless profiles password editor is used to capture the wireless profiles and edit the passwords. The profiles are saved in an .XML file. The same .XML file can be used to configure the EDM through Cloud Client Manager. NOTE: .NET Framework v4.5 must be installed to run this tool on any Windows operating system or Windows Embedded operating system.
D Third party licenses The table provides the details about third party licenses for Dell Edge Device Manager R17. Table 202. Third party licenses Sl No Component name License type 1 apache-tomcat-7.0.72 Apache License, Version 2.0 2 jdk1.8.0_112 Oracle Binary Code License 3 jre1.8.0_112 Oracle Binary Code License 4 mariadb-10.0.26-winx64 GNU GPL V2 5 mosquitto-1.3 Eclipse Public licenses- v 1.0 6 bootstrap-2.3.2 Apache License, Version 2.0 7 backbone-1.3.3 MIT 8 aopalliance-1.0.
Sl No Component name License type 23 Relayrides / pushy - v0.9.3 MIT 24 zlib-1.2.8 zlib license 25 yaml-cpp-0.5.1 MIT 26 wiredtiger GNU GPL V2 27 unicode-8.0.0 unicode licensesagreement 28 snappy-1.1.2 BSD 3 Clause 29 scons-2.5.0 MIT 30 S2 Apache 2.0 31 pcre-8.38 PCRE licenses 32 mozjs-38 MPL-2.0 ,GPL-2,LGPL-2.1,BSD-2Clause,MIT,LGPL-2+, public-domain,ICU 33 asio-asio-1-11-0 Boost Software licensesVersion 1.0 34 IntelRDFPMathLib20U1 BSD 3 Clause 35 gperftools-2.
Sl No Component name License type 49 Newtonsoft.Json.dll 6.0.3.17227 MIT 50 RestSharp.dll 104.1.0.0 Apache License Version 2.0 51 Microsoft.Win32.TaskScheduler.dll 2.3.0 MIT 52 Interop.NETWORKLIST.dll 1.0.0.0 Windows OS License - PIA files (Primary Interop Assemblies) 53 Interop.NetFwTypeLib.dll 1.0.0.0 Windows OS License - PIA files (Primary Interop Assemblies) 54 7zip.dll GNU LGPL License Type Details Apache License, Version 2.0 Apache License Version 2.0, January 2004 http://www.
1 Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright licensesto reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 2 Grant of Patent License.
To apply the Apache licenses to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
4 DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ORACLE FURTHER DISCLAIMS ALL WARRANTIES, EXPRESS AND IMPLIED, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. 5 LIMITATION OF LIABILITY.
b 4 116 protects Oracle's interests consistent with the terms contained in this Agreement and that includes the notice set forth in Section H, and you agree to defend and indemnify Oracle and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software.
the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement.J. THIRD PARTY CODE. Additional copyright notices and licensesterms applicable to portions of the Software are set forth in the THIRDPARTYLICENSEREADME file accessible at http://www.oracle.com/technetwork/java/javase/ documentation/index.html.
combination to be covered by the Licensed Patents. The patent licensesshall not apply to any other combinations which include the Contribution. No hardware per se is licensed hereunder. 3 c Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no assurances are provided by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity.
• If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. BSD-3 Clause BSD licenses Copyright (c) 2000-2006, www.hamcrest.org All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 1 The protobuf-c library, as well as the PLCrashLogWriterEncoding.cfile are licensed as follows: Copyright 2008, Dave Benson. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License.
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
UNICODE, INC. licensesAGREEMENT - DATA FILES AND SOFTWAREUnicode Data Files include all data files under the directorieshttp:// www.unicode.org/Public/, http://www.unicode.org/reports/,http://www.unicode.org/cldr/data/, http://source.icu-project.org/repos/icu/, andhttp://www.unicode.org/utility/trac/browser/.Unicode Data Files do not include PDF online code charts under thedirectory http:// www.unicode.org/Public/.
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
Written by: Zoltan Herczeg Email local part: hzmester Emain domain: freemail.hu Copyright(c) 2009-2015 Zoltan Herczeg All rights reserved. THE C++ WRAPPER FUNCTIONS Contributed by: Google Inc. Copyright (c) 2007-2012, Google Inc. All rights reserved.
On Debian systems, the complete text of the GNU Lesser General Public licensescan be found in the file `/usr/share/common-licenses/ LGPL-2.1'. License: BSD-2-Clause Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Files: js/src/assembler/assembler/AbstractMacroAssembler.h js/src/assembler/assembler/AssemblerBuffer.h js/src/assembler/assembler/CodeLocation.h js/src/assembler/assembler/LinkBuffer.h js/src/assembler/assembler/MacroAssemblerCodeRef.h js/src/assembler/assembler/MacroAssembler.h js/src/assembler/assembler/MacroAssemblerX86_64.h js/src/assembler/assembler/MacroAssemblerX86Common.h js/src/assembler/assembler/MacroAssemblerX86.h js/src/assembler/assembler/RepatchBuffer.
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public licensesas published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public licensesfor more details.
2002, Ranjit Mathew 2002, Bo Thorsen 2002, Roger Sayle License: MIT Files: js/src/jit-test/tests/arguments/strict-args.js js/src/jit-test/tests/arguments/strict-nested-shadow-eval.js js/src/jit-test/tests/arguments/nonstrict-assign.js js/src/jit-test/tests/arguments/strict-nested-assign-shadowed-var.js js/src/jit-test/tests/arguments/nonstrict-noargs.js js/src/jit-test/tests/arguments/strict-nested-assign-shadow-function.js js/src/jit-test/tests/arguments/strict-assign-outer-param.
js/src/jit-test/tests/arguments/strict-args-generator-flushstack.js js/src/jit-test/tests/arguments/strict-nested-assign-shadow-function-call.js js/src/jit-test/tests/basic/bug584565.js js/src/jit-test/tests/basic/bug586917.js js/src/jit-test/tests/basic/wrap-primitive-this.js js/src/jit-test/tests/basic/bug513898-regexp.js js/src/jit-test/tests/basic/bug625141-2.js js/src/jit-test/tests/basic/bug625141-1.
Copyright: 2003-2005 Tom WuLicense: MIT Files: js/src/jit-test/tests/v8-v5/check-deltablue.js js/src/v8/deltablue.jsCopyright: 2008 the V8 project authors 2008 Google 1996 John Maloney 1996 Mario Wolczko License: GPL-2+ This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public licensesas published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
js/src/v8/run-earley-boyer.js js/src/v8/run-raytrace.js js/src/v8/run-richards.js js/src/v8/run.js js/src/v8-dtoa/*Copyright: 2006-2010 the V8 project authors 2007, 2008 GoogleLicense: BSD-3-ClauseFiles: js/src/metrics/jint/sunspider/crypto-md5.js js/src/metrics/jint/sunspider/crypto-sha1.js js/src/metrics/jint/sunspider/math-cordic.js Copyright: 2007 Apple Inc.
Software is furnished todo so, all subject to the following:The copyright notices in the Software and this entire statement, including the above licensesgrant, this restriction and the following disclaimer,must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivativeworks are solely in the form of machine-executable object code generated bya source language processor.
derivative works of the Software, unless such copies or derivativeworks are solely in the form of machine-executable object code generated bya source language processor. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.
Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A "Major Component", in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.
further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source.
work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies.
combine any covered work with a work licensed under version 3 of the GNU General Public licensesinto a single combined work, and to convey the resulting work. The terms of this licenseswill continue to apply to the part which is the covered work, but the work with which it is combined will remain governed by version 3 of the GNU General Public License. 14. Revised Versions of this License.
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE.
conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" * * 4.
RestSharp.dll 1 Apache License 2 Version 2.0, January 2004 3 http://www.apache.org/licenses/ 4 5 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 6 7 1. Definitions. 8 9 "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. 10 11 "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 54 55 7. Disclaimer of Warranty.
E Terminology The following table lists the important terminology used in the guide: Table 203. Terminology Terminology Definition Private cloud Edge Device Manager server installation, installed on premise that is private to your organization’s data-center. WDA Wyse device agent which resides in the device and acts as an agent for communication between server and client. Local repository Application, and file repository that is installed by default in the Edge Device Manager server.