2.0
Table Of Contents
- VMware ACE Administrator’s Manual
- Contents
- About This Book
- Introduction and System Requirements
- Learning the Basics of Workstation ACE Edition
- Terminology for This Chapter
- Setting Up Your Administrative Workstation
- Overview of the Workstation ACE Edition Window
- Accessing Commands in the Workstation ACE Edition Window
- Workstation ACE Edition Window Elements
- ACE Master Icons in the Sidebar
- Adding ACE Masters to ACE 2 Management Servers
- Viewing ACE Masters in the Sidebar
- Using the ACE Icons on the Home Page
- Viewing the Summary for an ACE Master
- Viewing the Summary for All ACE Instances Managed by an ACE 2 Management Server
- ACE Menu
- New ACE Master, Connect to ACE 2 Management Server, and Open Hot Fix Commands in the File Menu
- ACE Master Toolbar
- Creating Packages to Distribute to Users
- Basic Steps for Creating and Deploying ACE Packages
- Keeping Users Up-to-Date
- Installing, Configuring, and Upgrading Workstation ACE Edition
- Installing and Configuring the ACE 2 Management Server
- ACE 2 Management Server Setup Options
- System Requirements for the ACE 2 Management Server
- Features of the ACE 2 Management Server
- Components of the ACE 2 Management Server
- Using SSL Certification and Protocol
- Installing the ACE 2 Management Server
- Configuring the ACE 2 Management Server
- Using Event Logs
- Stopping and Starting the Apache Service Manually
- Logging On to the ACE 2 Management Server
- Using the ACE 2 Management Server
- Unblocking Port Traffic and Changing Port Assignments
- Creating and Configuring ACE Masters
- Creating an ACE Master
- Creating a New ACE Master
- Cloning an ACE Master from an Existing ACE Master
- Cloning an ACE Master from an Existing Virtual Machine
- Cloning a Virtual Machine from an ACE Instance
- Networking ACE Instances
- ACE Master Settings
- Virtual Machine Settings
- Setting and Using Policies and Customizing VMware Player
- Taking Advantage of Policies
- Using the Policy Editor
- Setting Policies
- Setting Access Control Policies - Activation and Authentication
- Setting Host-Guest Data Script Policies
- Setting Expiration Policies
- Setting Copy Protection Policies
- Setting Resource Signing Policies
- Setting Network Access Policies
- Before You Begin: Read These Notes About Host Policies
- Getting Started with Setting Network Access
- Using the Network Access Wizard to Configure Network Access
- Using the Zone, Ruleset, and Rule Editors to Configure Network Access
- Using the Zone Editor to Set Up and Configure Network Zones
- Using the Ruleset and Rule Editors to Configure Host and Guest Access
- Network Properties Packaging
- Understanding the Interaction of Host Access and Guest Access Filters With Tunneling Protocols
- Setting Removable Devices Policies
- Setting USB Device Policies
- Setting Virtual Printer Policies
- Setting Runtime Preferences Policies
- Setting Snapshot Policies
- Setting Administrator Mode Policies
- Setting Hot Fix Policies
- Setting Policy Update Frequency
- Writing Plug-In Policy Scripts
- Customizing the VMware Player Interface
- Package Settings
- Custom EULA
- Instance Customization
- Benefits of Instance Customization
- Overview of the Instance Customization Process
- Before You Specify Instance Customization Settings, Perform These Tasks
- Downloading the Microsoft Sysprep Deployment Tools
- Specifying Package Settings for Instance Customization
- Placeholder Values to Use in Instance Customization
- Packaging with Instance Customization Enabled
- How ACE Instance Customization Completes on the ACE User’s Machine
- Package Lifetime
- Encryption
- Deployment Platform
- Setting Up a Remote Domain Join
- Troubleshooting Setup Issues
- Creating Packages and Deploying Them to Users
- Preview, Save, Test, Publish
- Pocket ACE
- Installing and Using VMware Player and ACE Instances
- Installing the ACE Package on a Windows Host Computer and Running the ACE Instance
- Installing VMware Player on a Windows Host Computer
- Installing an ACE Instance on a Windows Host Computer
- Installing an ACE Package Silently on a Windows Host Computer
- Uninstalling VMware Player from a Windows Host Computer
- Uninstalling an ACE Instance from a Windows Host Computer
- Running the ACE Instance on a Windows Host Computer
- Installing the ACE Package on a Linux Host Computer and Running the ACE Instance
- Installing VMware Player on a Linux Host Computer
- Installing the ACE Instance on a Linux Host Computer
- Installing an ACE Package Silently on a Linux Host Computer
- Uninstalling an ACE Instance from a Linux Host Computer
- Uninstalling VMware Player from a Linux Host Computer
- Running the ACE Instance on a Linux Host Computer
- Controlling Which Virtual Machines and ACE Instances Run on a Host
- Running VMware Player
- Starting VMware Player
- Entering a Client License in VMware Player for an ACE Instance
- Quitting VMware Player
- Enlarging VMware Player to Fill the Screen
- Understanding VMware Player Status Indicators
- Viewing Messages, Notifications, and the ACE Information Dialog Box
- Controlling Devices Attached to VMware Player
- Setting VMware Player Preferences
- Taking Snapshots in VMware Player
- Using Shared Folders
- Printing from VMware Player
- Troubleshooting Problems
- Troubleshooting Tools
- Preserving the State of an ACE Instance
- Installing the ACE Package on a Windows Host Computer and Running the ACE Instance
- Instance View
- Opening a View of All Instances Managed by a Server
- Setting Up Queries to Search for Instances
- Showing, Hiding, Moving, and Resizing Columns in the Instances Table
- Adding Custom Database Fields by Adding Columns
- Changing the Sort Order of the Instances Table
- Deactivating and Reactivating Instances from the Instance View
- Resetting Expiration Dates for an Expired Instance by Clicking Reactivate
- Using the Details View
- Using the Connect to ACE 2 Management Server Command to Open an Instance View
- Appendix: Using the VMware ACE 2 Management Server Database Schema and Querying the Audit Event Log Data
- Glossary
- Index
- Updates for the VMware ACE Administrator’s Manual
VMware, Inc. 259
Appendix: Using the VMware ACE 2 Management Server Database Schema and Querying the Audit Event Log Data
identityData VARCHAR(128), /* Internal representation, SID in AD */
/* case, token value goes here. */
accVersion INTEGER NOT NULL, /* Access object version number */
identityType INTEGER NOT NULL, /* AD User, Group, or Token Value */
identityName VARCHAR(128), /* UI visible user/group name in AD case */
accUseInstanceLimit VARCHAR(7)
DEFAULT 'FALSE' NOT NULL, /* Limit number of instances for this ID? */
accInstanceLimit INTEGER NOT NULL, /* Max no. of ACE instances allowed */
accTsCreated VARCHAR(21) DEFAULT 0 NOT NULL, /* Creation timestamp */
accTsLastModified VARCHAR(21) DEFAULT 0 NOT NULL, /* Last modified timestamp */
deleted VARCHAR(7) DEFAULT 'FALSE', /* Is this entry deleted (tombstone) */
PRIMARY KEY(accessPK),
FOREIGN KEY(aceUID) REFERENCES PolicyDb_Ace(aceUID));
/* ACE Instance object data */
CREATE TABLE PolicyDb_Instance (
instanceUID VARCHAR(128), /* VM instance ID (primary key) */
packageUID VARCHAR(128) NOT NULL, /* The package it belongs to. */
aceUID VARCHAR(128) DEFAULT '' NOT NULL, /* The ACE Master it belongs to */
creatorIdName VARCHAR(128) NOT NULL, /* Display name of the activator user */
creatorIdData VARCHAR(256), /* Fully qualified name of the activator */
creatorAuthType INTEGER NOT NULL, /* The type of access check at activation */
activationDate VARCHAR(21) NOT NULL, /* The date and time for the activation. */
lastPolicyCheck VARCHAR(21) NOT NULL, /* Last time when the player called server */
revocationDate VARCHAR(21) NOT NULL, /* When the instance was revoked */
replacementDate VARCHAR(21) NOT NULL, /* When replaced because of Copy Protect. */
/* policy */
inheritsExpiration
VARCHAR(7) DEFAULT 'FALSE' NOT NULL, /* Use expiration info from Ace Policy
Set */
insUseValidDates
VARCHAR(7) DEFAULT 'FALSE' NOT NULL, /* Use validity dates or always valid */
insValidDateStart VARCHAR(21) NOT NULL, /* The instance is valid from this date*/
insValidDateEnd VARCHAR(21) NOT NULL, /* The instance is valid till this date*/
insPassword VARCHAR(128), /* The login password for non-AD */
/* authentication for this instance */
hostName VARCHAR(128), /* The name of the host PC the VM runs on */
hostIp VARCHAR(128), /* The IP addr of the host the VM runs on */
insProtectionKey VARCHAR(1024), /* Instance VM disk encryption key */
copyProtectionId VARCHAR(1024), /* Stores location of the copy */
insPreview VARCHAR(7) DEFAULT 'FALSE' NOT NULL, /* Is preview instance */
guestIpAddress VARCHAR(128) DEFAULT '', /* Reported VM IP address */
guestMacAddress VARCHAR(128) DEFAULT '', /* Assigned VM MAC address */
guestMachineName VARCHAR(128) DEFAULT '', /* The guest (VM) OS host name */
guestConfigStatus INTEGER DEFAULT 0, /* The completion status of guest */
/* auto-configuration */
guestConfigMsg VARCHAR(512), /* Message for the guest auto-config */
insTsCreated VARCHAR(21) DEFAULT 0 NOT NULL, /* Creation timestamp */
insTsLastModified VARCHAR(21) DEFAULT 0 NOT NULL, /* Last modified timestamp */
deleted VARCHAR(7) DEFAULT 'FALSE', /* Is this entry deleted (tombstone) */