Service Manual

Product and subsystem security
Topics:
Product overview
Authentication
Authorization
Network security
Data security
Cryptography
Auditing and logging
Code or product integrity
Product overview
Dell Wyse Management Suite is the next generation management solution that enables you to centrally configure, monitor,
manage, and optimize your Dell Hybrid Client powered endpoints and Dell thin clients. It also offers advanced feature options
such as cloud and on-premises deployment, manage-from-anywhere option by using a mobile application, and so on..
Authentication
Dell Wyse Management Suite supports the following processes to authenticate the product subsystems:
Wyse Management Suite console authentication
Device registration with Wyse Management Suite
Wyse Management Suite remote repository authentication
Login security settings
Administrator console login settingsBy default, you can log in to the console using the registered administrator
credentials enabled during installation. The registered administrator can access the product with a registered username and
password. After a failed login, you are notified with the text as
Your login attempt was un successful, try again. Reason: Invalid username or password
HTTPS communication is enabled by default. Security on session is established by enforcing a token authentication for each
request to access the console.
You can also configure Active Directory to enable the Domain account to access the product.
NOTE:
Secure connection to Active Directory can be established with the use of LDAPS protocol. For more information,
see Wyse Management Suite 3.2 Administrator's guide at https://www.dell.com/support/manuals.
Device login securityDevices are registered with a secured group token. Device check-in and device commands are
performed with a unique device authentication code. Device and Wyse Management Suite coordinates using MQTT in a
secure way.
Remote repository login settingsRepository is registered with the Wyse Management Suite using the administrator
user accounts.
User and credential management
User account and security credentials
3
Product and subsystem security 7