820-4905 SSGD 4.41 Release Note
820-4905 SSGD 4.41 Release Note
820-4905 SSGD 4.41 Release Note
41
Release Notes
Copyright 2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, Californie 95054, États-Unis. Tous droits réservés.
Sun Microsystems, Inc. possède les droits de propriété intellectuels relatifs à la technologie décrite dans ce document. En particulier, et sans
limitation, ces droits de propriété intellectuels peuvent inclure un ou plusieurs des brevets américains listés sur le site
http://www.sun.com/patents, un ou les plusieurs brevets supplémentaires ainsi que les demandes de brevet en attente aux les États-Unis
et dans d’autres pays.
Ce document et le produit auquel il se rapporte sont protégés par un copyright et distribués sous licences, celles-ci en restreignent l’utilisation,
la copie, la distribution, et la décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, par quelque
moyen que ce soit, sans l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y en a.
Tout logiciel tiers, sa technologie relative aux polices de caractères, comprise, est protégé par un copyright et licencié par des fournisseurs de
Sun.
Des parties de ce produit peuvent dériver des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque déposée
aux États-Unis et dans d’autres pays, licenciée exclusivement par X/Open Company, Ltd.
Sun, Sun Microsystems, le logo Sun, Java, JavaScript, SunSolve, JavaServer, JSP, JDK, JRE, Sun Ray, et Solaris sont des marques de fabrique ou
des marques déposées de Sun Microsystems, Inc. aux États-Unis et dans d’autres pays.
Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc.
aux États-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun
Microsystems, Inc.
Adobe est une marque enregistree de Adobe Syatems, Incorporated.
L’interface utilisateur graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun
reconnaît les efforts de pionniers de Xerox dans la recherche et le développement du concept des interfaces utilisateur visuelles ou graphiques
pour l’industrie informatique. Sun détient une license non exclusive de Xerox sur l’interface utilisateur graphique Xerox, cette licence couvrant
également les licenciés de Sun implémentant les interfaces utilisateur graphiques OPEN LOOK et se conforment en outre aux licences écrites de
Sun.
LA DOCUMENTATION EST FOURNIE "EN L’ÉTAT" ET TOUTES AUTRES CONDITIONS, DÉCLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES DANS LA LIMITE DE LA LOI APPLICABLE, Y COMPRIS NOTAMMENT TOUTE
GARANTIE IMPLICITE RELATIVE À LA QUALITÉ MARCHANDE, À L’APTITUDE À UNE UTILISATION PARTICULIÈRE OU À
L’ABSENCE DE CONTREFAÇON.
Please
Recycle
Contents
Preface ix
iii
Subject Alternative Names for Server Certificates 9
Time Zone Map File Attribute 9
Session Directory for Windows Terminal Services 10
New Features in Version 4.31 10
Audio Support in X Applications 10
Support for the Remote Desktop on Microsoft Windows Vista 11
SSH Client Settings 11
Changes in Version 4.41 11
Changes to Supported Platforms 11
SGD Server Command-Line Changes 12
Changes to SGD Web Server Component Versions 13
JDK Version Change 13
My Desktop Link 13
Changes to tarantella security start and tarantella security
stop Commands 14
Changes to tarantella status Command 14
Enabling Secure Intra-Array Communications 14
Replacing an SGD Server Certificate 14
Performance Improvements for tarantella array Commands 15
Changes in Version 4.40 15
Retirement of Classic Clients 15
Login and Authentication Sequence 15
Server Certificates and Multiple External DNS Names 16
Web Services Changes 16
Authentication Model Changes 16
Renaming of Methods 16
New Web Service Operations 18
Document/Literal SOAP Message Encoding 18
Querying Device Data 19
Contents v
6461864 and 6476661 - Automatic Login and Integrated Mode Fails With the
Gnome Desktop 32
6476194 - No KDE Desktop Menu Item for the SGD Client 32
6481312 - Upgrading Resets the Available Connection Types 33
6482912 - SGD Client Not Installed Automatically 33
6493374 - Non-ASCII Characters in Input Method Windows 33
6503530 – No Launch Menu Entries on Sun Java™ Desktop Systems 34
6555834 – Java Technology is Enabled For Browser But Is Not Installed On
Client Device 34
6592560 – Administration Console Online Help Not Available Over HTTPS
35
6598048 – French Canadian Keyboard Not Mapped Correctly for Windows
Applications 35
6609518 – Array Joining When Running the Administration Console From a
Secondary Server 35
6610760 – Custom PDF Printer Settings Not Applied For Windows
Applications 36
6611502 – Errors When Creating and Modifying Objects From a Secondary
Server 36
6616290 – Integrated Mode Issues When Using the SGD Load-Balancing JSP
36
6618698 – Blank Webtop When Using LDAP Authentication 37
6631991 – High CPU Usage When Using the SGD Enhancement Module 37
6634243 – Microsoft Windows Vista Applications Limited to 16-Bit Color
Depth 37
6654307 – Slow Log In When Using Active Directory Authentication 38
6665330 – Font Errors When Starting VirtualBox™ Software From a JDS
Session Displayed Using MyDesktop 38
6702234 – tarantella security start Command Errors When SGD
Server is Stopped 38
6711479 – Audio Unavailable on Linux Platform Client Devices 39
6711001 – SGD Server Will Not Start 39
Contents vii
viii Sun Secure Global Desktop 4.41 Release Notes • August 2008
Preface
The Sun Secure Global Desktop 4.41 Release Notes provide information about the
system requirements and support, and the new features and changes, for this
version of Sun Secure Global Desktop (SGD). This document is written for system
administrators.
ix
Shell Prompts
Shell Prompt
C shell machine-name%
C shell superuser machine-name#
Bourne shell and Korn shell $
Bourne shell and Korn shell superuser #
Typographic Conventions
Typeface* Meaning Examples
Related Documentation
The following table lists the documentation for this product. The online
documentation is available at:
docfeedback@sun.com
Please include the following document title and part number in the subject line of
your email:
Sun Secure Global Desktop 4.41 Release Notes, part number 820-4905-12.
Preface xi
xii Sun Secure Global Desktop 4.41 Release Notes • August 2008
CHAPTER 1
This chapter describes the new features and changes in Sun Secure Global Desktop
(SGD) versions 4.41, 4.40, and 4.31.
1
■ Installs a server certificate
■ Enables HTTPS connections to the SGD Web Server
■ Configures the SGD server for firewall traversal
■ Secures the SOAP connections to the SGD server
■ Enables SGD security services
■ Restarts the SGD server and SGD Web Server
See the Sun Secure Global Desktop 4.41 Administration Guide for more details about the
tarantella security enable and tarantella security disable
commands.
The pull-down header includes icons for minimizing and closing the application
window.
To display the pull-down header when this attribute is enabled, move the mouse to
the top of the application window.
To enable or disable the pull-down header, configure the attribute for the Windows
application or X application object. For example:
Note – Currently, this attribute is only configurable from the command line.
For example, you can use this log filter to find out why an Active Directory user
cannot log in to SGD.
The Sun Secure Global Desktop 4.41 Administration Guide provides details of how to
configure this feature.
To use the Administration Console, your browser must have JavaScript enabled.
Wherever possible, run the Administration Console on the primary server in the
SGD array. Some operations, for example, creating new objects or editing object
attributes, are best done on the primary server. If you perform these operations on a
secondary server and the primary server is not running, your changes are not
implemented.
Note – The SGD distribution includes a web archive (WAR) file for the
Administration Console, sgdadmin.war. Using this file to deploy the
Administration Console on another web application server is not supported.
You can start the Administration Console in one of the following ways:
■ Click the Administration Console link on the webtop of an SGD Administrator.
■ Click the Launch the Sun Secure Global Desktop Administration Console link on
the SGD Web Server Welcome Page at http://server.example.com, where
server.example.com is the name of an SGD server.
■ Go to http://server.example.com/sgdadmin, where server.example.com is the
name of an SGD server.
See the Sun Secure Global Desktop 4.41 Administration Guide for more details about the
Administration Console.
Terminology Changes
The Administration Console uses different terminology compared to previous SGD
releases.
To be able to use the My Desktop URL, the user must be assigned an application
object called My Desktop (cn=My Desktop). This object is created automatically
when SGD is installed. By default, the object is configured to run the default desktop
application available on the SGD server, for example, the Sun Java Desktop System.
You can reconfigure this object to run any application you want, but it works best
Note – Users can be assigned any number of applications, but the My Desktop URL
only gives users access to the My Desktop application.
Note – There are no controls for suspending or resuming the desktop application.
Users must log out of the desktop application as normal.
Note – This location also contains the user’s hostsvisited and certstore.pem
files.
The timeout enables user sessions to be suspended if there has been no application
session or webtop activity for a specified time period. The timeout applies to all SGD
servers in the array.
This timeout is only configurable from the command line. You cannot edit the
timeout value using the Administration Console.
A setting of 0 turns off the user session idle timeout feature. This is the default
setting.
In the following example, user sessions are suspended after 1800 seconds (30
minutes) of inactivity.
The netmask filter takes the format v.w.x.y/z. The previous “wildcard” type filters
are still supported.
The following example uses a netmask filter to specify external DNS names.
Using this attribute, keyboard shortcuts that deal with window management can
either be sent to the remote session or acted on locally. This setting is only effective
for applications having a Window Type setting of Kiosk mode.
To exit Kiosk mode when this attribute is enabled, use the key sequence
Alt-Ctrl-Shift-Space. This minimizes the kiosk session on the local desktop.
By default, the Windows key is now enabled in SGD Windows Terminal Services
sessions. The default setting for the SGD Terminal Services Client (ttatsc)
-windowskey option is on. You can change this option using the Arguments for
Protocol (--protoargs) attribute on the Windows application object.
You can now manage passwords and tokens by user identity or by user profile.
Previously, the Object Manager administration tool only supported management of
passwords and tokens by user profile.
The subject alternative names for a certificate can be displayed using the
tarantella security certinfo command.
The attribute enables you to specify a file that contains mappings between UNIX
client device and Microsoft Windows application server time zone names. The
attribute applies to all SGD servers in the array.
Session Directory can be used instead of SGD to handle session resumability for
Windows applications. Session Directory is a database that keeps track of which
users are running which sessions on which Windows application server.
The UNIX audio module contains an OSS audio driver emulator. The audio driver
emulator is installed in the kernel when you install the UNIX audio module of the
SGD Enhancement Module.
Note – As the UNIX audio module includes an audio driver emulator, the
application server itself does not actually need to have a sound card.
You can also install the SGD Enhancement Module on Microsoft Windows Vista
client devices to provide support for client drive mapping. Advanced load balancing
and seamless windows are not supported.
With this attribute, you can specify the command-line arguments for the SSH client
when the connection method for an application is SSH.
See the Sun Secure Global Desktop 4.41 Installation Guide for more information about
supported platforms for this release.
The following commands for stopping, starting, and restarting the SGD Web Server
have been deprecated:
■ tarantella webserver start
■ tarantella webserver stop
■ tarantella webserver restart
See the Sun Secure Global Desktop 4.41 Administration Guide for more detailed
information about the revised commands.
Component Version
My Desktop Link
The SGD Web Server Welcome page now includes a My Desktop link. The SGD Web
Server Welcome page is at http://server.example.com, where server.example.com is
the name of an SGD server.
The My Desktop link enables users to log in and display a full-screen desktop,
without displaying a webtop. See “The My Desktop URL” on page 5 for more
details.
Using the My Desktop link is an alternative to specifying the My Desktop URL. The
My Desktop URL is http://server.example.com/sgd/mydesktop.
This means that the tarantella security start and tarantella security
stop commands can only be used to configure security for the SGD server on which
the command is run.
In the SGD 4.41 release, if you are using secure intra-array communication, the
tarantella array join command must be run from the primary SGD server in
the array.
This enables you to replace an SGD server certificate, for example because the
original certificate is about to expire.
As a result of this change, for this release of SGD, you cannot configure applications
to display in a web browser window. The webtop and newbrowser options for the
Window Type attribute (--displayusing) have been removed.
Start up of the SGD Client is indicated by an icon in the desktop task bar. See the
Sun Secure Global Desktop 4.41 Installation Guide for more details about logging in to
SGD.
You can no longer deny a connection to SGD based on the client’s IP address.
This attribute is no longer supported. In this release, you can specify external DNS
names as subject alternative names when you generate a CSR.
See “Subject Alternative Names for Server Certificates” on page 9 for more details.
For the 4.40 release, creating and authenticating a user session have been combined
into a single method, authenticate.
The startSession and authenticateSession methods are not available for the
4.40 release.
Renaming of Methods
Some overloaded methods were present in the 4.31 release. These methods were
distinguished by the number and type of their parameters. All such overloaded
methods have been renamed for the 4.40 release. Additionally, the mandatory
parameters for the setSessionIdentity method have changed for the 4.40
release.
Interface Name Method Name in Version 4.31 Method Name in Version 4.40
The WSDL listings for the RPC/Encoded versions of the web services are still
included on this page. Do not use the RPC/Encoded versions for developing your
own applications. These versions of the web services will be deprecated in future
releases.
This setting enables you to update the Kerberos configuration for an SGD server
without having to restart the server. This feature is used for Active Directory
authentication only.
The tem status command provides status information for load balancing, UNIX
platform audio, and client drive mapping services for the SGD array. The command
lists the installed modules and indicates whether they are running or not.
In this release, by default, when you start the SGD Client from the command line or
in Integrated mode, the SGD Client assumes that the client device does not have
Java technology enabled. A new -use-java argument for the tcc and ttatcc
commands configures the SGD Client to use Java technology.
In previous releases, by default, the SGD Client assumed Java technology was
enabled. A -no-java argument for the tcc and ttatcc commands was available
to override this behavior. This argument has now been deprecated.
The available arguments for the tcc and ttatcc commands are described in the
Sun Secure Global Desktop 4.41 Administration Guide.
The client device information is written to the SGD Client log file and is displayed
on the Detailed Diagnostics page of the webtop.
--tarantella-config-login-thirdparty-searchens --login-thirdparty-ens
--tarantella-config-login-thirdparty-allownonens --login-thirdparty-nonens
--tarantella-config-ldap-thirdpartyldapcandidate-us --login-ldap-thirdparty-ens
eens
--tarantella-config-ldap-thirdpartyldapcandidate-us --login-ldap-thirdparty-profile
eprofile
--tarantella-config-xpeconfig-timezonemapfile --xpe-tzmapfile
If you are using SecurID for application server authentication, objects now use the
securid.exp script, rather than the securid/unix.exp script. For backward
compatibility, a symbolic link now exists from securid/unix.exp to the new
securid.exp script.
By default, an IM is enabled for all Japanese, Korean, and Chinese locales. To enable
an IM in other locales, you must edit vars.exp and add the locale to the
IM_localeList variable.
Array Routes
SGD has an array routes feature that enables you to configure server-side SOCKS
proxy servers. You configure array routes with the following command:
Array routes are enhanced so that you can now configure a direct connection type.
Use CTDIRECT as the connection type to specify the clients that can connect without
using a proxy server.
End-Of-Support Statements
The following table lists the end-of-support dates for SGD products.
Software and Version End of Full Support End of Limited Support End of Service Life
Sun Secure Global Desktop Software 4.40 February 3, 2010 February 3, 2014 February 3, 2014
Sun Secure Global Desktop Software 4.31 May 19, 2009 May 19, 2013 May 19, 2013
Sun Secure Global Desktop Software 4.3 April 29, 2009 April 29, 2013 April 29, 2013
Sun Secure Global Desktop Software 4.2 November 8, 2008 November 8, 2012 November 8, 2012
Secure Global Desktop Enterprise Edition 4.1 March 31, 2007
Secure Global Desktop Enterprise Edition 4.0 March 31, 2007
27
Software and Version End of Full Support End of Limited Support End of Service Life
For details of the Sun End of Service Life (EOSL) Policy, see http://
www.sun.com/service/eosl/.
Customers with a valid support agreement can upgrade to the latest version of SGD
free of charge.
Solaris™ Operating System (Solaris OS) on SPARC platforms 10, 10 Trusted Extensions
Solaris OS on x86 platforms 10, 10 Trusted Extensions
OpenSolaris on x86 platforms Latest version
Red Hat Enterprise Linux (Intel x86 32-bit) 5
SUSE Linux Enterprise Server (Intel x86 32-bit) 10
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 29
Known Bugs and Issues
This section lists the known bugs and issues with SGD version 4.41.
Solution: By default, the SGD Client maps the keypad Enter key to Return in both X
and character application sessions. With additional configuration, this behavior can
be changed.
To change the behavior of the keypad Enter key in a character application session, you
need to set up a keymap for your character application object (--keymap) and add a
mapping for KPENTER, for example:
KPENTER="hello"
Caution – The X keymap is a global user resource, so all applications for that user
might be affected by this change. If any of these applications do not handle
KP_Enter, then you might need to consult your X or Windows application vendor
for assistance.
Cause: A known issue with the Gnome Virtual File System (VFS).
Cause: A known problem with the Gnome Main Menu applet on SUSE Linux
Enterprise Server 10 (Novell bug reference 186555).
Solution: Install the latest version of the gnome-main-menu.rpm package for SUSE
Linux Enterprise Server 10.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 31
6461864 and 6476661 - Automatic Login and
Integrated Mode Fails With the Gnome Desktop
Problem: After enabling Automatic Client Login or Integrated mode, the SGD Client
does not start automatically when you log in to the Gnome Desktop and the Start
menu is not updated with webtop content when you log in to SGD. This problem
affects SUSE Linux Enterprise Server 9 and Red Hat Enterprise Linux 4.
Cause: The directories containing the .menu files are not monitored and so changes
to the Start menu are not detected.
Solution: The workaround is run the pkill gnome-panel command to restart the
gnome-panel and pick up new menu information.
Note – You must run the pkill gnome-panel command to update the menu each
time the menu changes.
Cause: SUSE-specific configuration of the KDE menu system means that if a menu
contains only one application entry, then that single application is used in the main
menu instead of the menu. If menu entry is a sub-menu, the sub-menu does not
display at all. This causes the Login menu for the SGD Client in Integrated mode not
to display.
Solution: The workaround is to add the following line to the [menus] section of the
$HOME/.kde/share/config/kickerrc file:
ReduceMenuDepth=false
Then run the following command for the KDE panel to immediately pick up the
changes:
Cause: Internet Explorer has a Protected Mode that prevents the SGD Client from
downloading and installing automatically.
Solution: Add the SGD server to the list of Trusted Sites in Internet Explorer's
Security Settings.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 33
■ Upgrade to Solaris 10 OS update 2 or higher.
Cause: SGD uses the web browser settings to determine whether to use Java
technology.
Solution: Install the Sun Java Plug-in tool and create a symbolic link from the web
browser plug-ins directory to the location of the JVM. Refer to your web browser
documentation for more information.
Cause: The Administration Console uses the JavaHelp™ software to display the
online help. Additional configuration is required to run JavaHelp over an HTTPS
connection.
Solution: Import the CA certificate used to sign the certificate for the SGD Web
Server into the JDK™ software keystore. Use the Java software keytool application
as follows:
$ keytool -import \
-keystore /opt/tarantella/bin/jdk-version/jre/lib/security/cacerts \
-storepass changeit -file /opt/tarantella/var/tsp/ca.pem
Where changeit is the password for the keystore and jdk-version is the version of the
JDK installed on the SGD server.
If you have more than one certificate in your ca.pem file, separate each certificate
and add them individually.
Solution: No known solution. A compatible keymap file is not supplied with SGD at
present.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 35
Cause: In this release, it is not possible to supply credentials for more than one
secondary server.
Solution: Run the Administration Console on the primary server, or on the server
that is to be joined into the array.
For example, if you enable the SGD Universal PDF Printer and Universal PDF Viewer
printers for an organizational unit (OU) object. Then, you override the parent objects
setting and disable the Universal PDF Printer and Universal PDF Viewer printers for
a user in the OU. The custom printer settings are not inherited by the user.
Solution: Wait for a couple of seconds and then repeat the operation.
Solution: No known solution at present. Do not run the SGD Client in Integrated
mode when using the load-balancing JSP.
Cause: LDAP assignment of applications fails if the user object does not match the
following LDAP search filter:
(|(objectclass=user)(objectclass=person)(uid=*))
Solution: In the LDAP directory, ensure that SGD users are of person or user
object class. Alternatively, assign a uid attribute to the LDAP object describing the
SGD user.
Cause: A known issue when using SGD to display Microsoft Windows Vista desktop
sessions.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 37
Solution: No known solution.
Cause: A known issue. The SGD Active Directory authentication mechanism does
not always use the nearest domain controller when looking up users.
Solution: When starting the VirtualBox software from the JDS desktop session, use
the -fn option to specify valid fonts. Alternatively, install the missing fonts on the
SGD server. See the Sun Secure Global Desktop 4.41 Administration Guide for more
details about using fonts with SGD.
Solution: Start the SGD server first, before using the tarantella security
start command.
Cause: The Enlightened Sound Daemon (ESD) is not running on the client device.
ESD is usually started when the client device desktop session is started. Otherwise,
the daemon must be autospawned by the ESD library on request.
Solution: Before starting the SGD server, ensure that sufficient disk space is
available. The minimum disk space requirements are listed in the Sun Secure Global
Desktop 4.41 Installation Guide.
Solution: Edit the Kerberos configuration file used by the SGD server, ensuring a
valid entry is present for default_realm. See the Sun Secure Global Desktop 4.41
Administration Guide for more information about the Kerberos configuration file.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 39
6716771 – Default Printer Not Created for
Windows 2008 Applications
Problem: When printing from applications hosted on a Windows 2008 Server
application server to a UNIX, Linux, or Mac OS X platform client device, a default
client printer is not shown in the Windows application print dialog.
Cause: The default printer driver used by SGD is QMS 1060 Print System. This
printer driver is not included with Windows 2008 Server.
See the Sun Secure Global Desktop 4.41 Administration Guide for more details about
configuring printer drivers for UNIX, Linux, and Mac OS X platform client devices.
Solution: The workaround is either to use client certificates with SSL connections, or
to use the Kerberos protocol, to secure the connection to Microsoft Windows Server
2008.
Although this issue results in large log files, it does not affect the operation of SGD.
Solution: The workaround is to set the LogLevel directive to error in the main
Apache configuration file at /opt/tarantella/webserver/apache/
2.2.8_openssl-0.9.8g_jk1.2.25/conf/httpd.conf.
...
Configuring and starting Secure Global Desktop web server...
Cause: A known issue when installing SGD version 4.41. The installation program
attempts to access a location on /net/telford.
Solution: Use IP address redirection for Session Directory. This is the default setting
for Windows Terminal Services.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 41
6744107 – Applications Fail to Start When Using
SSL Connections
Problem: Users cannot start applications when using a secure SSL connection to
SGD.
Cause: The SGD server is not forwarding connections from the external network
interface of the SGD server to the localhost loopback network interface on the SGD
server.
Solution: Ensure that the external bind address entry in the /opt/tarantella/
var/serverconfig/local/nic.properties file on the SGD server contains a *.
For example:
tarantella.config.edit.bindaddresses.external=*,www.example.com
By default, the external bind address entry for an SGD server contains a *.
Solution: Install the appropriate patch to install the keytable on the client device.
Platform Patch
Cause: This is caused by a Windows feature that adds new items to end of a menu
rather than preserving the alphabetical sorting.
Cause: A known issue with Windows Server 2003 terminal services sessions.
Solution: See Microsoft Hotfix 942610 for details of how to increase the color depth
to 16-bit.
Reference Description
6489154 Window focus issue when applications run in seamless window mode.
6498460 Text is not displayed properly after resizing of screen. Characters overlap or are
too far apart.
6506571 SGD Enhancement Module upgrade on Solaris fails to merge client.prf file.
6508202 Em-size/normal-width change in Japanese.
6524429 Windows XP Home client takes a built-in license, instead of a Windows 2000
client access license (CAL).
6531922 Seamless windows are not launched after clicking the Close button on the
remote application.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 43
Reference Description
6532001 Active Directory: PKI expired password fails to prompt for new password.
6536434 Korean keyboard does not work correctly with SGD.
6557536 Initial post-launch focus misleading in SGD application window.
6557568 Unexpected focus change with loss of input focus.
6568484 Name of application using seamless windows is not displayed in Japanese, but
displays correctly using a full screen.
6570049 Blank webtop when user DN contains “/”.
6572217 Webtop hints attribute is missing from Administration Console.
6589194 CPU load based load balancing algorithm providing skewed results.
6591022 Num Lock state unstable with SGD 4.31.905 patch for Num Lock and Caps Lock
state issues.
6591516 Page transitions not working in Internet Explorer.
6592699 Accent characters, tonos and dialytika, do not work correctly using Greek
keyboard.
6594537 Improved user experience and warning messages for firewall traversal mode.
6600335 “Hangul” and “Hanja” keys fail on WinXP client with Korean USB keyboard
when running Windows terminal services applications.
6609001 Cannot detach a stopped secondary server using the Administration Console.
6612935 SGD Client shows blank logout menu items on Gnome panel.
6615864 Secure and non-secure content on Add Assignment page.
6615864 Internet Explorer Warning Messages When Accessing the Administration
Console Over HTTPS.
6616296 Copy and paste from X-based 5250 or 3270 application to local Windows
Notepad does not work.
6617987 Erratic behavior seen on creating a user object with inverted commas.
6618516 ttaauxserv reports fatal error and exits when file descriptor limit is reached.
6620254 Num Lock and accent acute characters on Portuguese keyboard do not work as
expected.
6620268 Classic webtop attributes still available.
6621456 Enabling “Establish proxy settings on session start” in profile does not work.
6621911 Accented characters not properly emulated on Sun Ray™, from es_MX
ISO8859-1.
6623775 Need to secure Active Directory queries without using client certificates from
the Active Directory server.
6624044 The server/webtop/* logging filter is incorrect.
6624122 Copy and paste does not work with Windows application as non-root user in
Trusted Extensions environment.
6624795 Title on minimized Internet Explorer incorrect when using seamless windows.
6625786 Session is cut off when accessing specific URL through a Windows desktop.
6629782 Ambiguous login and SecurID dialogs are not localized.
6630832 PDF printing fails on Solaris OS 8.
6632864 Errors in 4.40 datastore reorganization on upgrade.
6633342 Access Denied errors when accessing mapped drive with SWIFT application.
6633363 Third tier authorization dialog does not accept keyboard input in Mac OS X
10.5.1.
6633389 Cyclic links for application groups not upgraded correctly.
6634373 Log Active Directory errors more concisely.
6634689 4.40 datastore reorganization does not handle dc trees very well.
6635919 -no-browser option required for ttatcc command.
6636787 Documentation for securing SOAP is unclear.
6638874 SGD Client crashes due to partial packet receipt.
6639470 Creation of new object not possible when Security Warning alert notifications
enabled.
6639655 X server security vulnerabilities.
6640141 Exception caused by LDAP search on Assigned User Profiles tab for an OU in
the Applications organization.
6641356 Extensible LDAP search filters are not validated correctly.
6641475 LDAP user attribute isMemberOf should be in the reverseAttributes list by
default.
6641538 Documentation on cache --flush krb5config should include information
about what it affects.
6643772 Unable to resume My Desktop session.
6646817 The printertypes.txt file needs to be updated.
6649163 SGD leaves “white screen” when Windows session is grabbed by Sun Ray client.
6650200 “Potentially unsafe connection” warning dialog presented repeatedly to users in
an unsecure environment.
6650334 Difficulties in “mirroring” LDAP in ENS, based on groups, with LDAP profiles
on OU.
6651582 -n option displayed on output during certificate request.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 45
Reference Description
6653001 SGD Client crash when cancelling paste action in Trusted Extensions Sun Ray
client.
6653019 Suspended Windows session causes ttatsc to consume 100% of CPU
resources.
6653024 Authentication token information does not get updated in profile when changed
a second time.
6654565 JDK change has changed keytool commands.
6655852 SGD Client fails on Ubuntu when Extra Visual Effects are enabled.
6658738 Application session load balancing is not firewall friendly.
6659812 Escape key and window close button are not working in View Certificate Details
message box.
6661505 Active Directory Global Catalog and Domain Controller hostname sorting is
incorrect.
6661507 “Failed to Find Site Objects” Active Directory error should be downgraded.
6663148 SGD server stability issues.
6663754 My Desktop feature fails if second webtop entry My Desktop2 exists.
6664301 New primary server detached unexpectedly when old primary server becomes
available.
6667259 SGD Client by default is paused when printing.
6668963 Array join issues for two servers with different configurations for secure
intra-array communications.
6670774 Array join on secure intra-array communications-enabled servers fails in certain
scenarios.
6670843 Array make_primary option is not working in the Administration Console.
6671528 Absence of Java not detected on Windows client using Internet Explorer 6.
6673906 Licenses replication issues after array remaster.
6678939 Network printers are not appearing in Windows sessions.
6679810 Documentation for CommandExecutionFailed or Error 7 should also mention
permissions on the /tmp folder on the application server.
6679845 Sun Ray DTU ID required for Windows terminal services sessions.
6680413 ttatsc core dumps with Solaris patch 119060-38.
6682124 Flushing a cached LDAP configuration using tarantella cache --flush
does not work.
6685521 Login to SGD webtop fails after upgrade from 4.31.
6686727 Administration Console: New Object pop up needs scroll bars.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 47
Reference Description
6704749 Print job size does not match in webtop and command line.
6704925 Problems with portuguesebrazilian_abnt2 keyboard.
6705544 Terminal services CALs for users with parentheses in their CN are not reused by
SGD.
6707001 Missing apostrophes in French translations.
6709037 Mouse over tooltips in an seamless windows session causes the SGD Client to
crash.
6710067 Unicode to keysym table maps the Unicode for EuroSign to the keysym for
EuroSign.
6710510 Solaris array operations take a long time to respond when other array members
are down.
6710580 Printing status: potential null pointer exception in opt.jsp.
6710927 Log in menu item not completely seen on Sun Ray client start menu.
6712258 Missing information for InvalidSessionCookie error string in localized versions.
6712649 Integrated client login fails with StringIndexOutOfBounds exception.
6712721 Garbled characters are displayed in localized authentication error message for
all languages.
6714996 Active Directory authentication does not fail over to the next Global Catalog.
Reference Description
The following table lists the significant bugs that are fixed in the 4.40.907 release.
Reference Description
2144612 Active Directory authentication does not failover to the next global catalog.
2147536 ttaxpe command does not exit if an incorrect password is entered.
2148699 CDM fails with multiple external DNS names.
2148700 SGD Client fails when an X application opens a specific window.
2148811 Printer preferences on Terminal Services not set permanently with Zebra bar
code printer.
2149630 Korean keyboard does not work correctly with SSGD 4.30.915.
2150849 Intermittent problems with serial COM port redirection.
2151274 Accented characters fail in French locale windows.
6469935 SGD Client should be able to match hostname to DNS item in certificate
subjectAltName extension.
6478585 Java virtual machine SSL key and certificate store destroyed on upgrade.
6520742 The tarantella security peerca --show command fails on primary SGD
server.
6525004 Extend client device access logging in the SGD Client.
6527507 Better error reporting for web service failures.
6532425 UNIX CDM fails if tta_tem is installed in non-standard directory.
6532764 LDAP failover is not seamless when multiple LDAP servers are configured.
6537643 SGD Client crashes if application exited while dialog displayed.
6541478 SGD session hangs if audio played from SGD while local audio is playing on
Sun Ray Client.
6541914 CDM does not work in Windows Vista in certain scenarios.
6542533 Webtop does not update to display launched applications in Safari on MacOS X
10.4.9.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 49
Reference Description
Reference Description
2146043 Using client drive mapping, you cannot overwrite a larger file.
2146285 Tomcat fails and icons do not appear on the webtop.
6440254 The proxy server authentication dialog does not display realm information.
6443192 Upgrading using the pkgadd command on Solaris OS reports hundreds of file
conflicts.
6443840 The SGD Client does not understand proxy failover from proxy server
configuration (PAC) files.
6474180 The HARD_SERVER_LIMIT of the SGD Web Server is increased to 1024.
6480225 In Integrated mode, applications fail to resume on UNIX client platforms.
6494450 Client drive mapping cannot handle files larger than 2 gigabytes.
6499639 A recursive directory request causes a segmentation fault when using client
drive mapping on UNIX and Linux platforms.
6503627 The xfrbelgian.txt keyboard map file contains a mistake.
6518152 Start menu is not updated using Integrated mode on Microsoft Windows Vista
client devices.
6518638 The tarantella print cancel command deletes all print jobs instead of
just the selected job.
6525384 XRDP does not work with SGD.
6528037 Page Not Found displays on the webtop when a group containing hosts is
deployed by mistake to a webtop.
6506222 A user’s .Xdefaults file is not used when launching an application.
Chapter 2 Support Statements, Known Issues, Bug Fixes, and Documentation Issues 51
The corrected sentence is as follows:
http://support.microsoft.com/?kbid=216783
The port number information in step 4 of the procedure should read as follows:
“The ports required depends on the SSL configuration used for Active Directory
authentication, as follows:
■ SSL connections without client certificates – TCP port 636 for the secure LDAP
connection to an Active Directory server, and TCP port 3269 for the secure
connection to the global catalog server
■ SSL connections with client certificates – TCP port 389 for the secure LDAP
connection to an Active Directory server, and TCP port 3268 for the secure
connection to the global catalog server”