SunRay Admin Guide
SunRay Admin Guide
SunRay Admin Guide
Copyright 2002, 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, Etats-Unis. Tous droits réservés.
Sun Microsystems, Inc. a les droits de propriété intellectuels relatants à la technologie incorporée dans le produit qui est décrit dans ce
document. En particulier, et sans la limitation, ces droits de propriété intellectuels peuvent inclure un ou plus des brevets américains énumérés
à http://www.sun.com/patents et un ou les brevets plus supplémentaires ou les applications de brevet en attente dans les Etats-Unis et dans
les autres pays.
Ce produit ou document est protégé par un copyright et distribué avec des licences qui en restreignent l’utilisation, la copie, la distribution, et la
décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, parquelque moyen que ce soit, sans
l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y ena.
Le logiciel détenu par des tiers, et qui comprend la technologie relative aux polices de caractères, est protégé par un copyright et licencié par des
fournisseurs de Sun.
Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque
déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd.
Sun, Sun Microsystems, le logo Sun, Sun Ray, Sun WebServer, Sun Enterprise, Ultra, UltraSPARC, SunFastEthernet, Sun Quad FastEthernet,
Java, JDK, HotJava, et Solaris sont des marques de fabrique ou des marques déposées, ou marques de service, de Sun Microsystems, Inc. aux
Etats-Unis et dans d’autres pays.
Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc.
aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun
Microsystems, Inc.
Netscape est une marque de Netscape Communications Corporation aux Etats-Unis et dans d’autres pays.
L’interface d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun
reconnaît les efforts de pionniers de Xerox pour la recherche et le développment du concept des interfaces d’utilisation visuelle ou graphique
pour l’industrie de l’informatique. Sun détient une license non exclusive do Xerox sur l’interface d’utilisation graphique Xerox, cette licence
couvrant également les licenciées de Sun qui mettent en place l’interface d ’utilisation graphique OPEN LOOK et qui en outre se conforment
aux licences écrites de Sun.
LA DOCUMENTATION EST FOURNIE “EN L’ETAT” ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A
L’ABSENCE DE CONTREFAÇON.
Contents
Preface xiii
2. Command-Line Interface 15
Supported Commands 15
▼ To Stop Sun Ray Services 19
▼ To Start Sun Ray Services 19
Session Redirection 19
▼ To Redirect to a Different Server 19
▼ To Redirect an Appliance Manually 20
▼ To List Available Hosts 21
3
▼ To Select a Different Server 21
Changing Policies 21
▼ To Configure CAM Using the CLI 22
Configuring Interfaces on the Sun Ray Interconnect Fabric 22
▼ To Add an Interface 23
▼ To Delete an Interface 23
▼ To Print the Sun Ray Private Interconnect Configuration 24
▼ To Add a LAN Subnet 24
▼ To Delete a LAN Subnet 24
▼ To Print Public LAN Subnets 24
▼ To Remove All Interfaces and Subnets 24
Managing Firmware Versions 25
▼ To Update All the Appliances on an Interface 25
▼ To Update an Appliance Using the Ethernet (MAC) Address 25
Restarting the Sun Ray Data Store 26
▼ To Restart Sun Ray Data Store 26
Solaris Lock Screen for Detached Sessions 26
▼ To Lock a Screen Using CDE 27
▼ To Lock an OpenWindows Session 27
▼ To Create a System-Wide Default for Screen Locking 27
Managing Monitor Settings 28
Configuring Hot Key Preferences 28
Setting Hot Key Values 30
▼ To Change the Hot Key for the Settings GUI 30
▼ To Change the Hot Key Used to Detach NSCM Sessions 31
▼ To Change the Hot Key Setting for a Single User 31
Smart Card Configuration Files 32
▼ To Load a Configuration File Into the Directory 32
3. Administration Tool 37
Administration Data 38
Logging In 38
▼ To Log Into the Administration Tool 38
▼ To Change the Administrator’s Password 40
Changing Policies 41
▼ To Change the Policy 42
Resetting and Restarting Sun Ray Services 43
▼ To Reset Sun Ray Services 43
▼ To Restart Sun Ray Services 43
Token Readers 44
Creating a Token Reader 44
▼ To Locate Token Readers 46
▼ To Get Information on a Token Reader 47
Managing Desktops 48
▼ To List All Desktops 48
▼ To Display a Desktop’s Current Properties 48
▼ To List Currently Connected Desktops 48
▼ To View the Properties of the Current User 49
▼ To Search for Desktops 49
▼ To Edit a Single Desktop’s Properties 50
Sun Ray Appliance Settings 51
▼ To Change the Sun Ray Settings 51
5
Managing Multihead Groups 52
▼ To View All Multihead Groups 52
Examining Log Files 55
▼ To View a Log File 56
Managing Smart Cards 56
▼ To View or List Configured Smart Cards 57
▼ To View The Smart Card Probe Order 58
▼ To Change the Smart Card Probe Order 59
▼ To Add a Smart Card 59
▼ To Delete a Smart Card 60
Sun Ray System Status 60
▼ To View the Sun Ray System Status 60
Administering Users 62
▼ To View Users by ID 62
▼ To View Users by Name 63
▼ To Delete a User 63
▼ To View Current Users 65
▼ To Display a User’s Current Properties 65
▼ To Add a User 66
▼ To View the User’s Sessions 67
▼ To Edit a User’s Properties 67
▼ To Add a Token ID to a User’s Properties 68
▼ To Delete a Token ID From a User’s Properties 69
▼ To Enable or Disable a User’s Token 69
▼ To Find a User 69
▼ To Get a Token ID From a Token Reader 70
Controlled Access Mode 71
▼ To Configure Controlled Access Mode 71
7
Considerations 93
Configuring the Authentication Manager for NSCM Sessions 93
▼ To Enable NSCM Sessions From the Administration Tool 94
▼ To Enable NSCM Sessions From a Command Line 96
9
11. Failover Groups 157
Failover Group Overview 158
Setting Up IP Addressing 160
Setting Up Server and Client Addresses 160
Configuring DHCP 162
Group Manager 166
Redirection 167
Group Manager Configuration 167
Load Balancing 168
Setting Up a Failover Group 169
Primary Server 169
Secondary Server 170
Removing Replication Configuration 170
Viewing the Administration Status 171
Viewing Failover Group Status 171
▼ To View Failover Group Status 171
Sun Ray Failover Group Status Icons 172
Recovery Issues and Procedures 173
Primary Server Recovery 173
Secondary Server Recovery 176
Setting Up a Group Signature 176
Taking Servers Offline 177
A. Troubleshooting 179
Understanding OSD 179
OSD Icon Topography 179
Sun Ray Desktop Unit Startup 182
Firmware Download 185
Firmware Download Failed 186
11
B. Controlled Browser 201
Controlled Browser Installation 201
▼ To Install the Controlled Browser 202
▼ To Remove the Controlled Browser 202
Controlled Browser Functionality 203
▼ To Setup the Controlled Browser in Control Access Mode
Administration 204
Browser Printing 206
▼ To Print from the Browser 206
Adding Plug-ins to the Controlled Browser 208
Set Up Considerations 209
General Requirements and Other Considerations 210
Sample Plug-In Setup 211
Index 231
The Sun Ray Server Software 2.0 Administrator’s Guide provides instructions for setting
up, administering, monitoring, and troubleshooting a system of Sun Ray™
appliances and their server or servers. It is written for system administrators who
are already familiar with the Sun Ray™ computing paradigm and have substantial
networking knowledge. This guide may also be useful for those interested in
customizing their Sun Ray systems.
xiii
Chapter 6 gives a brief description of traffic encryption between Sun Ray clients and
servers and server-to-client authentication.
Chapter 8 describes how to monitor the Sun Ray system using Sun™ Management
Center software.
Chapter 10 describes how to customize Sun Ray Server Software for controlled
access mode.
Appendix C contains a listing of Sun Ray parameter symbol values defined in the
DHCP table and a brief discussion of encapsulated options.
xiv Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Typographic Conventions
Typeface Meaning Examples
Shell Prompts
Shell Prompt
C shell machine_name%
C shell superuser machine_name#
Bourne shell and Korn shell $
Bourne shell and Korn shell superuser #
xv
Related Documentation
Application Title Part Number
http://www.sun.com/documentation
docfeedback@sun.com
Please include the part number (816-6753-10) of your document in the subject line of
your email.
xvi Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
CHAPTER 1
The current generation of Sun Ray thin-client appliances and server software
represents the highest evolution to date of client-server computing. Although the
idea of thin client computing has been considered interesting for many years, Sun
Ray is the first implementation to offer both workstation-like user functionality and
sufficient speed and reliability to be suitable for mission-critical applications. With
the addition of LAN deployment, Sun Ray is now gaining acceptance in large-scale,
distributed enterprises in addition to the schools, universities, research laboratories,
and business units of large companies where it has been developed and tested.
Computing Model
The Sun Ray system employs a network-dependent computing model in which all
computing is performed on a server, with input and output data passed back and
forth between the Sun Ray server and the Sun Ray appliances.
In previous versions of Sun Ray Server Software, mobile sessions were possible only
with smart cards. Beginning with version 1.3, it became possible to enable hot
desking with or without smart cards.
1
Because effective client-server network traffic often relies on the rapid movement of
large numbers of packets, an optimal Sun Ray implementation requires a well-
designed network. Most large implementations include at least one failover group to
ensure uninterrupted service whenever a server goes off-line.
Once a failover group is set up, Sun Ray Server Software provides automatic load
balancing to optimize performance by spreading the computing load among the
servers in the group. Whenever a server fails, the Group Manager on each remaining
server tries to distribute the failed server’s sessions evenly among the remaining
servers. The load balancing algorithm takes into account each server’s load and
capacity (number and speed of its CPUs) so that larger or less heavily loaded servers
host more sessions. These concepts are addressed in Chapter 11 and in the Sun Ray
Server Software 2.0 Installation and Configuration Guide.
The appliance acts as a frame buffer on the client side of the network. Applications
run on the server and render their output to a virtual frame buffer. Sun Ray server
software formats and sends the rendered output to the appropriate appliance, where
the output is interpreted and displayed.
From the point-of-view of network servers, Sun Ray appliances are identical except
for their Ethernet MAC addresses. If an appliance ever fails, it can easily be replaced.
Power Cycling
To power cycle a Sun Ray appliance, disconnect the power cord, wait 15 seconds,
then reconnect the power cord.
Multihead
Sun Ray Server Software supports the use of multiple displays connected to a single
keyboard and pointer. This functionality is important for users who need extra
screen real estate, for instance, to monitor many applications or systems
simultaneously or to accommodate a single application, such as a large spreadsheet,
across multiple screens. The fact that each DTU has a single frame buffer does not
limit the use of multiple screens; the administrator can set up multihead groups,
consisting of two or more DTUs, for those users who need them. Administration of
multihead groups is explained in Chapter 9.
Firmware Module
A small firmware module in each Sun Ray appliance is updated from the server. The
firmware module checks the hardware with a power–on self test (POST) and boots
the appliance. The Sun Ray appliance contacts the server to authenticate the user,
and it also handles low-level input and output, such as keyboard, mouse, and
display information. If there is a problem with the appliance, the module displays an
on–screen display (OSD) icon to make it easier to diagnose. OSD icons are described
in Appendix A.
Sun Ray server software enables user access to all Solaris applications and a variety
of X Windows and legacy (mainframe) applications, which are currently third-party
emulations. The installation of third-party applications also permits users to access
Microsoft Windows NT applications.
Authentication Manager
The Authentication Manager implements the chosen policies for identifying and
authenticating users on Sun Ray appliances. The Authentication Manager uses
pluggable components called modules to implement various site-selectable
authentication policies.
The Authentication Manager also verifies user identities and implements site access
policies. The Authentication Manager is not visible to the user.
The interaction between the Authentication Manager and the appliance works as
follows:
2. The appliance sends the user’s token information to the Authentication Manager
and requests access. If a smart card is presented to the appliance, the smart card’s
type and ID are the token. If not, the appliance’s Ethernet address is sent.
3. If the Authentication Manager runs through the entire list of modules and no
module takes responsibility for the request, the user is denied.
Normally, the Sun Ray appliance looks for the Authentication Manager DHCP
option and contacts that address. If that field has not been supplied, or if the server
does not respond, the appliance sends a broadcast request for any authentication
manager on the subnet.
The site administrator can construct a combination of the different modules and
their options to implement a policy tailored to the site’s needs.
Session Manager
The Session Manager interacts with the Authentication Manager and directs services
to the user. The Session Manager is used at start up for services, for managing screen
real estate, and as a rendezvous point for the Authentication Manager.
Module 1
Authentication
Module 2
Manager
Module 3
Session 1
Session
Sun Ray Manager Session 2
Appliance
User’s
Session 3
Desktop
Smart Card
The steps below describe how the process starts and ends:
2. When services are started, they explicitly join the session by contacting the
Session Manager.
3. The Authentication Manager informs the Session Manager that the session
associated with the token is to be connected to a specific Sun Ray appliance. The
Session Manager then informs each service in the session that it should connect
directly to the appliance.
4. The Authentication Manager determines that the session associated with a token
should be disconnected from an appliance. The Authentication Manager notifies
the Session Manager which, in turn, notifies all the services in the session to
disconnect.
5. The Session Manager mediates control of the screen real estate between
competing services in a session and notifies the services of clip region changes.
Tip – Use xhost username@system to enable only those people you specify to
access the display and the user’s appliance.
The Session Manager is consulted only if the state of the session changes or if other
services are added. When a user’s token is no longer mapped to an appliance (for
example, when a card is removed), the Session Manager disconnects the services
from the appliance, but the services remain active on the server. For example,
programs attached to the X server continue to run although their output is not
visible.
Note – The Session Manager daemon must continue running all the time. To verify
that it is running, use the ps command and look for utsessiond.
If the Authentication Manager quits, the Session Manager disconnects all the
sessions it authorized and tells them that they have to be re-authenticated. The
services are disconnected but still active. If the Session Manager is disrupted, it
restarts automatically. Each service contacts the Session Manager to request
reattachment to a particular session.
Each managed object is monitored separately and has independent alarm settings.
Sun Management Center software also monitors Sun Ray Server Software daemons
that authenticate users, start sessions, manage devices, and handle DHCP services.
Chapter 8 describes how to use the SunMC to monitor a Sun Ray system. For
problems with the SunMC, see “Troubleshooting the Sun Management Center” on
page 199.
Data Store
In place of the old Sun Directory Service (Sun DS), Sun Ray Server Software 2.0
provides a private data store service, the Sun Ray Data Store (SRDS). No port
conversion is required unless there is a need to continue to run SunDS on a recently
upgraded 2.0 server.
Controlled Browser
For publicly accessed Sun Ray appliances, Sun Ray Server Software provides a
browser environment with minimal risk of server security compromise. The browser
is set up to provide a controlled and secure environment. In this context, Netscape
Navigator functions normally with the exception of disabled downloads and a new
GUI print interface to the command-line print interface. The controlled browser is
described in some detail in Appendix B.
Network Components
The Sun Ray system offers simplified administration by relying on the most
advanced developments in client-server computing. Centralized computing and
administration, inexpensive hardware components, and innovative use of smart card
technology make Sun Ray the platform of choice in an increasing range of network
configurations.
In addition to the servers, server software, appliances, smart cards, and peripheral
devices, such as local printers, the Sun Ray system needs a well-designed network,
configured in one of several possible ways, including:
Interconnect Fabric
VLAN Implementation
VLANs logically partition a single physical interconnect into two or more broadcast
domains. VLANs are commonly configured to implement virtual subnets in a shared
physical interconnect. However, because VLANs must share backplane and link
bandwidth, they are not true dedicated interconnects.
Sun Ray
Server
VLAN 1 VLAN 2
VLAN 1
VLAN 1
VLAN 2
VLAN 1
Since switch manufacturers configure their products differently, please refer to the
documentation provided with your switch and refer all questions relating to setting
up or configuring VLANs to your switch manufacturer.
LAN Implementation
Sun Ray Server Software 2.0 is the first release to support LAN implementations.
With Sun Rays deployed on a LAN, users can exercise session mobility across a
much larger “domain”—a huge convenience. Although it is beyond the scope of this
DHCP
For certain large-scale implementations, and especially where they already exist on a
network that will support Sun Ray appliances, it may be desirable to use separate
dynamic host configuration protocol (DHCP) servers for tasks such as assigning IP
addresses and network parameters to the appliances. The use of separate DHCP
servers is not required, but where they already exist, they can be used to reduce the
load on dedicated Sun Ray servers and provide better overall performance. These
questions are discussed in Chapter 7 and Appendix C.
Physical Connections
The physical connection between the Sun Ray server and Sun Ray clients relies on
standard switched Ethernet technology.
To boost the power of the interconnect and shield Sun Ray appliance users from the
network interaction taking place at every display update, 100 Mbps switches are
preferred.
Either type of switch can be used in the interconnect. They can be managed or
unmanaged; however, some managed switches may require basic configuration to be
used on a Sun Ray network.
Dedicated
Interconnect
LAN
Switch
Deployment Examples
There is no physical or logical limit to the ways that a Sun Ray system can be
configured. The following sections offer some typical examples.
Workgroup Scenario
For small workgroups with between five and 50 Sun Ray appliances, the Sun Ray
server uses a single 100BASE-T card to connect to a 100BASE-T switch. This switch,
For example, in FIGURE 1-2 a Sun Enterprise™ server with a Sun card 10/100BASE-T
card and a 24-port 10/100BASE-T switch can easily support 23 users.
Department Scenario
For departments with groups consisting of 100 or more Sun Ray appliances, the Sun
Ray server uses one or more gigabit Ethernet cards to connect to large
10/100BASE-T switches.
LAN Sun
Enterprise
Server
When a server in a failover group goes down, whether for maintenance, a power
outage, or any other reason, each Sun Ray appliance connected to it reconnects to
another server in the failover group. The appliance connects to a previously existing
Public Switches
Network
Interconnect
FIGURE 1-6 Simple Failover Group
Security Considerations
Using switched network gear for the last link to the appliances makes it very
difficult for a malicious PC user or network snooper at one of the network ports to
obtain unauthorized information. Because switches send packets only to the proper
output port, a snooper plugged into another port receives no unauthorized data. If
the server and wiring closet are secure, the last step is switched, and the appliance is
plugged directly into the wall jack, then it is virtually impossible to intercept
communications between the server and the appliance.
Before release 2.0, the Sun Ray system did not encrypt its communications; thus,
anyone who gained access to the data had access to what was typed and displayed
at each Sun Ray appliance. This potential security flaw has been corrected for the 2.0
release. For more information, see Chapter 6.
Command-Line Interface
Supported Commands
Commands that can be executed from the command line are listed in TABLE 2-1, and
a few of the most important commands are documented in this chapter. For further
information on executing these commands, see the man page for the command in
question.
15
To view any of the specific commands for the Sun Ray system, type:
or type:
% setenv MANPATH=/opt/SUNWut/man
% man command
Command Definition
utaction The utaction program provides a way to execute commands when a Sun Ray appliance
session is connected or disconnected.
utadm The utadm command manages the private network and DHCP (Dynamic Host Configuration
Protocol) configuration for the Sun Ray interconnect.
utcapture The utcapture command connects to the Authentication Manager and monitors packets sent
and packets dropped between the Sun Ray server and the Sun Ray appliances.
utcard The utcard command allows configuration of different types of smart cards in the Sun Ray
administration database
utconfig The utconfig command performs the initial configuration of the Sun Ray server and
supporting administration framework software.
utcrypto The utcrypto command is a utility for security configuration.
utdesktop The utdesktop command allows the user to manage Sun Ray appliance desktop units
connected to the Sun Ray server that the command is run on.
utdetach The utdetach command disconnects the current non-smart card mobile session or
authenticated smart card session from its respective Sun Ray appliance. The session is not
destroyed but put into a detached state. The session can be accessed if the same user token
(user name) is presented to the Sun Ray server.
utdssync The utdssync command converts the port number for the Sun Ray Data Store service to the
new default port on servers in a failover group, then forces all servers in the group to restart
Sun Ray services.
utfwadm The utfwadm command manages firmware versions on the Sun Ray appliances.
utfwsync The utfwsync command refreshes the firmware level on the Sun Ray appliances to what is
available on the Sun Ray servers in a failover group. It then forces all the Sun Ray appliances
within the group to restart.
Command Definition
utglpolicy The utglpolicy command, which gets or sets group utpolicy options, is deprecated as of
the 2.0 release. Please use utpolicy, which sets group policy automatically, then follow it with
a reset or restart of services.
utgroupsig The utgroupsig command sets the failover group signature for a group of Sun Ray servers.
The utgroupsig command also sets the Sun Data Store rootpw used by Sun Ray to a value
based on the group signature. Although utgroupsig sets the rootpw in the utdsd.conf
file., it does not set the admin password in the Admin database.
utgstatus The utgstatus command allows the user to view the failover status information for the local
server or for the named server. The information that the command displays is specific to that
server at the time the command is run.
utinstall The utinstall utility installs, upgrades, and removes Sun Ray Server Software. All software
required to support the Sun Ray server is installed, including the administration framework,
any patches required by the framework, and Solaris operating environment patches.
utkiosk The utkiosk script is used to import/export kiosk configuration information into the LDAP
database.
utmhadm The utmhadm command provides a way to administer Sun Ray server multihead terminal
groups. The information that utmhadm displays and that is editable is stored in the Sun Ray
administration database.
utmhconfig The utmhconfig tool allows an administrator to list, add, or delete multiheaded groups easily.
utmhscreen The utmhscreen tool draws a window displaying the current session on each screen, with the
current screen highlighted for easy identification. This tool is automatically launched for users
during the X server startup process (session creation).
utpolicy The utpolicy command sets and reports the policy configuration of the Sun Ray
Authentication Manager, utauthd(1M). In the 2.0 and subsequent releases, this command’s -
i and -t options are deprecated. Please continue to use the utpolicy command for policy
changes, but use the utrestart command instead of utpolicy -i, and use utreader
instead of utpolicy -t.
utpreserve The utpreserve command saves existing Sun Ray Server Software configuration data to the
/var/tmp/SUNWut.upgrade directory.
utpw The utpw command changes the Sun Ray administrator password (also known as the UT
admin password) used by the Web-based and command-line administration applications.
utquery The utquery command collects DHCP information from the Sun Ray appliances.
utrcmd The utrcmd program provides a way to run Sun Ray administrative commands remotely. The
utrcmd program contacts the in.utrcmdd daemon on the remote hostname and executes the
specified command with the specified arguments, args (if any).
utreader The utreader command is used to add, remove, and configure token readers.
utreplica The utreplica command configures the Sun Ray Data Store server to enable replication of
administered data from a designated primary server to each secondary server in a failover
group. The new -z option is useful for updating the port number.
Command Definition
utresadm The utresadm command allows an administrator to control the resolution and refresh rate of
the video monitor signal (persistent monitor settings) produced by the Sun Ray unit.
utresdef The utresdef command lists the monitor resolutions and refresh rates that can be applied to
Sun Ray units through the utresadm command.
utrestart This command is highly recommended as a substitute for the old utglpolicy and
utpolicy -i commands. Use utrestart instead of utpolicy -i.
utselect The utselect command presents the output of utswitch -l in a window and allows
mouse-based selection of a Sun Ray server to which the Sun Ray appliance in use is
reconnected.
utsession The utsession command lists and manages Sun Ray sessions on the local Sun Ray server.
utset Use utset to view and change Sun Ray appliance settings.
utsettings The utsettings command opens a Sun Ray Settings dialog box that allows the user to view
or change audio, visual, and tactile settings for the Sun Ray appliance.
utsunmc The utsunmc command adds the Sun Ray Server Software 2.0 module to the Sun Management
Center (SunMC) and loads it to permit monitoring of Sun Ray Server Software. The utsunmc
command can also remove the Sun Ray Server Software 2.0 module from SunMC.
utsunmcinstallUse utsunmcinstall to install and uninstall the Sun Ray module for SunMC on a SunMC
server where Sun Ray Server Software is not installed.
utswitch The utswitch command allows switching a Sun Ray appliance among Sun Ray servers in a
failover group. It can also list the existing sessions for the current token.
utsvc The utsvc script restarts the Sun Ray Server Software and, due to its location in
/etc/init.d, is executed upon startup of the actual server. Use utrestart instead of
utsvc.
utuser The utuser command allows the administrator to manage Sun Ray users registered on the
Sun Ray server that this command is run on. It also provides information on the currently
inserted token (smart card) for a specified DTU that is configured as a token reader.
utwall The utwall utility sends a message or an audio file to users having an Xsun (X server unique
to Sun Ray) process. The messages can be sent in email and displayed in a pop-up window.
utxconfig The utxconfig program provides X server configuration parameters for users of Sun Ray
appliance sessions.
utxset The utxset command changes mouse acceleration and screen blank characteristics of the Sun
Ray appliance. It is generally used internally by an X11 server to implement changes initiated
by the xset(1) command.
# /etc/init.d/utsvc stop
# /opt/SUNWut/sbin/utrestart
This procedure starts Sun Ray services without clearing existing sessions.
Or
● Type:
# /opt/SUNWut/sbin/utrestart -c
This procedure starts Sun Ray services and clears existing sessions.
Session Redirection
In addition to automatic redirection after you authenticate yourself, you can use the
utselect graphical user interface (GUI) or the utswitch command to redirect
your session to a different server.
% /opt/SUNWut/bin/utselect
In FIGURE 2-1, the Server column lists the servers accessible from the appliance. The
Session column reports the DISPLAY variable X session number on the server if one
exists. In the Status column, Up indicates that the server is available. The first server
in the list is highlighted by default. You can either select a server from the list or
enter the name of a server in the Enter server: field. If a server without an existing
session is selected, a new session is created on that server.
Note – If only one server in the failover group is up, it is displayed in the utselect
GUI. However, if you set selectAtLogin to true in the
/etc/opt/SUNWut/auth.props file, the GUI is not displayed, because there
appears to be only one server in the failover group.
% /opt/SUNWut/bin/utswitch -l
% /opt/SUNWut/bin/utswitch -t
The appliance is redirected to the server with the latest session connect time.
Changing Policies
The utglpolicy command and the utpolicy options -i and -t are deprecated in
release 2.0. Consequently, please:
■ Use the utrestart command instead of the -i option to utpolicy.
■ Use the utreader command instead of the -t option to utpolicy.
■ Use the utpolicy command to make policy changes.
When you set a policy with utpolicy, the group policy is set automatically, so all
you need to do at that point is to reset or restart services. This eliminates the need
for utglpolicy.
Command/Option Result
Note – If the IP addresses and DHCP configuration data are not set up properly
when the interfaces are configured, then the failover feature will not work as
expected. In particular, configuring the Sun Ray server’s interconnect IP address as a
duplicate of any other server’s interconnect IP address may cause the Sun Ray
Authentication Manager to throw “Out of Memory” errors.
▼ To Add an Interface
● Type:
# /opt/SUNWut/sbin/utadm -a interface_name
hme[0-9], qfe[0-3]
▼ To Delete an Interface
● Type:
# /opt/SUNWut/sbin/utadm -d interface_name
This command deletes the entries that were made in the hosts, networks, and
netmasks files and deactivates the interface as a Sun Ray interconnect.
# /opt/SUNWut/sbin/utadm -p
For each interface, this command displays the hostname, network, netmask, and
number of IP addresses assigned to Sun Ray units by DHCP.
# /opt/SUNWut/sbin/utadm -A subnet_number
# /opt/SUNWut/sbin/utadm -D subnet_number
# /opt/SUNWut/sbin/utadm -l
# /opt/SUNWut/sbin/utadm -r
This command removes all of the entries and structures relating to all of the Sun Ray
interfaces and subnets.
Note – If you define the DHCP version variable, then when you plug in a new
appliance, the appliance’s firmware is changed to the firmware version on the server.
# /opt/SUNWut/sbin/utfwadm -A -a -n interface
# /etc/init.d/utsvc stop
# /etc/init.d/utds stop
# /opt/SUNWut/sbin/utrestart
2. To make this feature the default, add the command to the end of the .dtprofile
file in the user’s home directory.
2. To make this feature the default, add the command to the end of the .xinitrc
file in the user’s home directory.
#!/bin/ksh
#
# Turn on screen-lock on disconnect for Sun Ray sessions
#
if [ "$DTUSERSESSION" != "" -a "$SESSIONTYPE" != "altDt" ]
then
/opt/SUNWut/lib/utaction -d ’/usr/dt/bin/dtaction LockDisplay’ \
2>/dev/null >/dev/null &
else
/opt/SUNWut/lib/utaction -d \
’/usr/openwin/bin/xlock -delay 1000000 -mode blank’ \
2>/dev/null >/dev/null &
fi
Settings selected through utsettings apply only to the DTU where utsettings is
run; hot desking to another DTU does not bring the new timing along as part of the
session. However, the selected timing is retained and used again if a user hot desks
back to the original DTU.
If your policy is for all appliances to use a standard hot key, use the system-wide
mandatory defaults file to specify this standard key. This prevents users from
specifying their own hot key preferences.
The format of the hot key entry in these properties files is:
<utility_name>.hotkey=value
TABLE 2-4 Sun Ray Server Software 2.0 Specific Hot Key Values
Use this procedure to modify the settings GUI for all users on a server.
Tip – If you want to make the change mandatory, change the value in the
/etc/opt/SUNWut/utslaunch_mandatory.properties file.
2. Locate the original hot key entry for the utdetach utility and place a # in front of
that statement.
The # comments out the first hot key property.
# utdetach.hotkey=Shift Pause
3. Type in the new hot key property after the first statement. For example,
utsettings.hotkey=Shift F8
Note – This resembles the procedure for changing the hot key for the settings GUI
except for Step 3.
2. Locate the original hot key entry for the utsettings utility and place a # in front of
it to comment it out.
# utsettings.hotkey=Shift SunProps
3. Type in the new hot key property after the first statement. For example,
utdetach.hotkey=Alt F9
2. Add a line to the .utslaunch.properties file with the value for the hot key.
For example:
utsettings.hotkey=Shift F8
4. Log out and log back in to enable the new hot key.
Smart card configuration files are available from a variety of sources, including Sun.
# cp vendor.cfg /etc/opt/SUNWut/smartcard
The additional vendor cards are displayed under the Available column in the Add
page in the Administration Tool.
In the example configuration in FIGURE 2-2, the second appliance acts as a token
reader.
Note – The token reader is not used for normal Sun Ray services, so it does not need
a keyboard, mouse, or monitor.
Server
Smart card
Token reader mode is useful when you want to determine the raw token ID of a
smart card.For example, to configure the DTU with MAC address 0800204c121c as a
token reader, issue the following utreader command:
# /opt/SUNWut/sbin/utreader -a 0800204c121c
To re-enable the DTU with MAC address 0800204c121c to recognize card movement
events and perform session mobility based on the smart card inserted into the DTU:
# /opt/SUNWut/sbin/utreader -d 0800204c121c
# /opt/SUNWut/sbin/utreader -c
where Token Reader is the MAC address of the DTU containing the token (smart card)
whose ID you want to read. Insert the token into the DTU and run the utuser
command. This command queries the DTU for the token’s ID and, if successful,
displays it. For example:
# /opt/SUNWut/sbin/utuser -r 08002086e18f
Insert token into token reader ’08002086e18f’ and press return.
Read token ID ’mondex.9998007668077709’
Option Definition
▼ To Start utcapture
From a command line, enter one of the following commands
% /opt/SUNWut/sbin/utcapture -h
This command lists the help commands for the utcapture tool
% /opt/SUNWut/sbin/utcapture
This command captures data every 15 seconds from the Authentication Manager
running on the local host and then writes it to stdout if there is any change in
packet loss for an appliance
% /opt/SUNWut/sbin/utcapture -s sunray_server5118.eng \
080020a893cb 080020b34231
This command captures data every 15 seconds from the Authentication Manager
running on server5118.eng and then writes the output to stdout if there is any
change in packet loss for the appliance with ID 080020a893cb or 080020b34231.
% /opt/SUNWut/sbin/utcapture -i raw-out.txt
This command processes the raw data from the input file raw-out.txt and then
writes to stdout only the data for those appliances that had packet loss.
Administration Tool
You can use the Administration Tool to administer Sun Ray users and appliances,
but the Command-Line Interface (CLI), documented in Chapter 2, is the
recommended interface for enabling assistive technologies.
Note – This chapter describes a standalone server. Servers in failover groups are
discussed in Chapter 11.
37
Administration Data
Sun Ray administration data comes from two sources: an internal database that
keeps persistent administration data and the Authentication Manager, which is
queried as needed for dynamic data. Sun Ray administration data is kept in its own
internal database, which grants read access to all internal database clients, but only
allows changes by those internal database clients that connect as the privileged
utadmin user. Sun Ray administration data is accessible through standard database
interfaces and applications.
Tip – To avoid operational errors, do not modify data except with the
Administration Tool.
Logging In
The Administration Tool allows you to administer Sun Ray users and appliances
from a Web browser.
2. Start a browser.
http://hostname:1660
Tip – If you chose a different port number when you configured the Sun Ray
supporting software, substitute that number for “1660” in the URL above.
4. Enter the administrator user name admin and the administration password you
specified when you configured the Sun Ray Server Software.
Note – If the session is inactive for 30 minutes, you must log in again.
1. In the navigation menu, click the arrow to the left of Admin to view the options.
Note – In failover groups, all servers must use the same password for the admin
account.
Tip – If you make a mistake, click the Reset Fields button to clear the fields and start
again.
Changing Policies
Set the same policies on all the Sun Ray servers in a given failover group. If all the
servers are configured to use the same policies and a failover occurs, all policies
remain consistent.
Changing group policies affects all Sun Ray servers in the same group.
3. Under Card Users, select either None, All Users, or Registered Users.
4. Under Non-Card Users, select either None, All Users, or Registered Users.
Registered users are those you have registered. Allow Self Registration enables users
to self-register when they insert their cards. All Users encompasses all types of users.
6. To enable multihead, click the Yes radio button next to Multihead feature enabled.
8. Restart services.
When changing the Mulihead feature, you have the option of resetting Sun Ray
services. All other changes require you to restart Sun Ray services.
2. Click Reset.
Sun Ray services are reset, and the sessions are preserved.
Note – In a failover group, you must initiate a group reset or restart from the
primary server in the group.
3. Select the desktop of the appliance you want to use as a token reader.
The Current Properties window is displayed.
3. From the Find Desktop page, enter data into the Desktop ID, Location, and Other
Info fields.
4. Click the Save Changes button to save the changes to the administration database.
The Sun Ray Settings GUI contacts the Session Manager to determine which
appliance is currently being used and connects to that unit to get the current values.
The GUI maintains a connection to the Session Manager so that the Session Manager
can notify the GUI if the user moves to another appliance by removing the smart
card and inserting it into another appliance.
2. Use the Category pull-down menu to access Audio Output, Audio Input, Display,
and Video settings.
Note – Only one instance per session of Sun RaySun Ray Settings runs in hot key
mode.
System administrators create multihead groups so that users can access them. A
multihead group, consisting of two or more appliances controlled by one keyboard
and mouse, can consist of Sun Ray 1, Sun Ray 100, Sun Ray 150, and Sun Ray 160
appliances.
3. To view the properties for this group, click the Multihead Group Name link.
The Multihead Group Properties window is displayed.
2. Choose the Log link you want to inspect: Messages, Auth Log, Admin Log, or
Archived Logs.
The appropriate Log File window is displayed. Use the scroll bar to access data to the
right and bottom of the window.
For certain vendors, the smart card may require additional software to enable the
Sun Ray Server Software to probe for it. If required, this optional software must be
supplied as Java classes in a Jar file. This file must end with a .jar suffix and must
have the same pre-suffix filename as the .cfg file that contains its configuration
information.
Note – Smart Card Frameworks, which enable custom applications to be written for
smart cards, are supported in Solaris 8 Update 7 and Solaris 9 Update 1, but not in
the initial release of Solaris 9.
From this window an administrator can see the current list of smart cards as well as
the supplier and version number for each card.
3. From the View Configured Smart Cards window, select the link for the smart card.
The main properties for the selected smart card are displayed in FIGURE 3-20.
Smart cards are probed in the order in which they appear in this list.
Options Description
Field Description
Token ID User’s unique token type and ID. For smart cards, this is a manufacturer
type and the card’s serial ID. For appliances, this is the type “pseudo” and
the appliance’s Ethernet address. Examples:
mondex.9998007668077709
pseudo.080020861234
Server Name Name of the Sun Ray server that the user is using.
Server Port Sun Ray server’s communication port. This field should generally be set to
7007.
User Name User’s name.
Other Info Any additional information you want to associate with the user (for
example, an employee or department number). This field is optional.
▼ To View Users by ID
● From the expanded Users navigation menu, click the View by ID link.
The View Users by ID window is displayed. The list of all the users in the
administration database is sorted by the Token ID field. If a user has multiple tokens,
they are listed separately.
▼ To Delete a User
Caution – This operation deletes the user and all associated tokens.
1. From the View by Name window, click the User Name of the user you want to
delete.
The Current Properties window displays information about the user, host, token,
and allows the administrator to edit the user’s properties, delete the user, and view
the user’s session.
Option Description
Current Desktop/Last Desktop Current/last appliance (desktop) where the user is or was logged in.
Desktop Location Location of the appliance (desktop).
Logged In Since/Logged Off At Date and time the user logged in or off the appliance (desktop).
▼ To Add a User
1. From the expanded menu under Users, click the Add User link.
The Add User window is displayed.
2. If you do not know the user’s Token ID and have configured a token reader:
a. Insert the user’s new card into the selected token reader.
2. If you do not know the new Token ID and have configured a token reader:
a. Insert the user’s new card into the selected token reader.
b. Choose the selected token reader from the pull-down menu of available
readers.
2. Uncheck the Enabled checkbox for any token IDs you want to disable.
▼ To Find a User
1. From the expanded menu under Users, click the Find link.
The Find User window is displayed.
3. Choose the selected token reader from the pull-down menu of available readers.
Note – The Controlled Browser menu item is displayed only if the Controlled
Browser package is installed. See Appendix B for details.
Use the link in the navigation bar to confirm before activating any changes.
From this window the administrator can configure browser behavior, home page,
and proxy to work in Controlled Access Mode.
6. To remove an application from the list of available applications, click the Remove
From List button.
4. When you have edited the text fields and selected the radio button for your
preferred launch attribute, click the Update button.
5. To add an application, fill in the text fields and click the Add New button.
6. Click Confirm in the expanded navigation menu under Controlled Access Mode.
State Description
2. From the expanded navigation menu, click the Find Sun Ray Sessions link.
3. In the text fields, enter the User Name, Token ID, or Unix Login Name.
2. From the expanded navigation menu, click the View by Server link.
Running sessions on the current server are displayed.
3. To change the state of any of the displayed sessions, use the Action pull-down
menu button to display your choices.
There are three possible actions: None, Terminate, and Suspend.
This chapter contains information about selected USB, parallel, and serial devices
and printing from Sun Ray appliances.
■ “Device Nodes and USB Peripherals” on page 79
■ “Attached Printers” on page 82
■ “PDA Synchronization” on page 84
■ “Adapters” on page 86
There are two kinds of peripherals: serial and parallel. Serial peripherals enable
RS-232-style serial connections to the Sun Ray appliance. Parallel peripherals enable
printing and come in two types: adapters and direct USB-connected printers.
Third-party adapters are useful for supporting legacy serial and parallel devices.
Sun Ray Server Software 2.0 recognizes a parallel printer with an adapter as a USB
printer.
Note – The printer naming conventions in Sun Ray Server Software differ from
those in a Solaris operating environment.
79
a representation of the logical topology of the devices connected to the appliance.
The Sun Ray devices directory contains a representation of the physical topology
of some of the devices connected to the appliance.
Note – Sun Ray Server Software does not create device nodes for every USB device.
Some USB device drivers export their device interfaces through other mechanisms
than a traditional UNIX device node.
Directories correspond to buses and hubs, and files correspond to ports. Hub
directories are named according to the port on the upstream hub into which they are
attached.
Device Nodes
In Sun Ray devices, device nodes are created for each serial or printer port on an
attached USB device. The device nodes are created in the hub directory
corresponding to the hub to which they are attached. They are named:
manufacturer_name, model_name@upstream_hub_port
If the USB device has multiple identical ports (for example, two serial ports), the
name is followed by :n where n is a numerical index, starting at 1.
/tmp/SUNWut/units/IEEE802.MACID/devices/usb@1/hub@1/\
manufacturer_name, model_name@3:1
Term Definition
physical topology The physical topology is hub@port/hub@port and so on. The port
refers to the port on the parent hub into which the device or
child hub is plugged.
printer name 1, terminal name 1 The printer and terminal name in the Sun Ray devices
directory is manufacturer, model@port with a colon separating the
numerical index when the string just described is not unique in
the directory.
printer name 2, terminal name 2 The printer and terminal name in the Sun Ray dev directory is
the manufacturer and serial number concatenated with an
alphabetic index when the serial number is not unique.
/tmp/SUNWut/units/IEEE802.080020cf428a/dev/term/manufacturer_name-67a
/tmp/SUNWut/units/IEEE802.080020cf428a/dev/printers/1608b-64
manufacturer_name-serial_numberindex
If the manufacturer name is not available, the USB vendor and product ID numbers
are used for the name of the device link.
Note – The following description of the behavior of USB devices when sessions are
connected and disconnected from an appliance applies only to USB serial and USB
parallel devices. Other device classes may have different semantics regarding
ownership and device lease times.
Changing the active session on an appliance changes the ownership of the device
nodes to the user associated with the new session. A session change occurs
whenever a user:
■ Inserts or removes a smart card from an appliance
Note – When a session is changed, any input or output in progress on a device node
opened by a non-root user is cancelled after 15 seconds. If the original session is
restored within 15 seconds, the ownership is not relinquished, and input and output
continue uninterrupted.
Attached Printers
Sun Ray Server Software 2.0 supports PostScriptTM printers connected directly to a
USB port on the Sun Ray appliance or connected through a USB-to-parallel port
adapter. For non-PostScriptTM printer support, refer to “Printers Other Than
PostScript Printers” on page 84.
Note – The lp subsystem opens the device node as superuser for each print request,
so print jobs are not affected by hot desking.
Printer Setup
Starting a print queue on a printer attached to a Sun Ray appliance, either directly or
through an adapter, is identical to starting a print queue in the Solaris operating
environment.
▼ To Set Up a Printer
1. Log in as superuser on a Sun Ray appliance.
# cd /tmp/SUNWut/units/*MAC_address
# pwd
/tmp/SUNWut/units/IEEE802.MACID/
The path to the extended MAC address for your particular Sun Ray appliance is
displayed.
# cd dev/printers
# pwd
/tmp/SUNWut/units/IEEE802.MACID/dev/printers
#ls
printer-node-name
# admintool &
8. Type in:
b. Description (optional)
c. Printer Port
Choose Other to enter the printer port path name, using the resulting directory
from Step 4.
/tmp/SUNWut/units/IEEE802.MACID/dev/printers/printer-node-name
Note – Do not use the port name under the devices directory.
e. If you are using a PostScript printer, under Printer Type choose PostScript
unless your printer is listed.
Select the printer type according to your printer model. If no option matches,
select other; then type your printer type or unknown.
f. If you are using a PostScript printer, under File Contents choose PostScript and
ASCII.
h. Click OK.
Note – Do not click OK more than once. If you do, a failure message is displayed.
# lpstat -d printername
Check with the vendors for pricing and the precise printer models supported.
PDA Synchronization
To synchronize PDAs that use the Palm OS to a Sun Ray appliance, use a USB-to-
serial adapter.
2. Get the latest Java Communications API (javax.comm api version 2.0.2 and
above) from
http://java.sun.com/products/javacomm/
# uncompress javax_comm-2_0_2-solsparc.tar.Z
# tar -xvf javax_comm-2_0_2-solsparc.tar
# cd commapi
# cp comm.jar /usr/dt/appconfig/sdtpdasync/classes
# cp libSolarisSerialParallel.so /usr/dt/appconfig/sdtpdasync/lib
# /usr/dt/bin/sdtpdasync
The Sun Ray system was designed, in part, to enable hot desking with Smart Cards,
and every Sun Ray appliance is equipped with a Smart Card reader. Sun Ray Server
Software 2.0 also includes Smart Card frameworks for developers who wish to
encode custom applications or other information in their users’ Smart Cards. This
enhancement requires no additional administration. For further information on
Smart Card Frameworks, see the latest version of the Solaris Smart Card
Administration Guide.
Configuring Sun Ray Server Software 2.0 with non-smart card mobile (NSCM)
sessions provides the benefits of Hot Desking without the use of smart cards. This
chapter explains NSCM sessions and how to configure them.
NSCM Session
In an NSCM session, the user types a user name and password instead of inserting a
smart card. The user types the utdetach command instead of removing the smart
card.
Tip – If you don’t want to use the NSCM session, insert a smart card. The NSCM
session is disconnected and replaced by a smart card session.
87
Sun Ray Mobile Session Login Dialog Box
When Sun Ray Server Software 2.0 is configured for NSCM sessions, the Sun Ray
Mobile Session Login dialog box is displayed on the Sun Ray appliance.
A right click on the Options button opens a panel where the user can select:
■ QuickLogin—To a new session only. Selecting Off enables the user to login with
the same options available through dtlogin. Selecting On enables the user to
bypass the option selection phase. QuickLogin is on by default.
■ Exit—Selecting Exit temporarily disables the NSCM session. An escape token
session is started, and the dialog box is replaced by the dtlogin screen. Users
without a valid username for this server group can exit so as to make a remote
login to a server where their user name is valid.
If the Sun Ray server is part of a failover group, the load-balancing algorithm may
redirect the user to another Sun Ray server, where the user types a username and
password again before an NSCM session is created.
If an NSCM session exists on a different Sun Ray server in a failover group, the user is
redirected to the server where the most current NSCM session is located.
The Sun Ray Mobile Session Login dialog box is redisplayed with the host name of
the new Sun Ray server, and the user must retype the user name and password.
Note – The user may be redirected either for server load balancing or because there
is a disconnected session on another server. For added security, each redirection
requires re-authentication, so the user must re-enter a user name and password.
Tip – The Sun Ray administrator can prevent this re-authentication behavior by
setting the acceptRedirectToken property in the
/etc/opt/SUNWut/auth.props file to true. After restarting Sun Ray services,
users do not need to re-authenticate when redirected.
If an NSCM session exists on the current Sun Ray server, the session is displayed to
the user. If a user wants to move to another location, there are two methods of
disconnecting an NSCM session:
% /opt/SUNWut/bin/utdetach
The Sun Ray Mobile Session Login dialog box is redisplayed, and the user moves to
another Sun Ray appliance.
The user can terminate the session by clicking the Exit button in the CDE panel or by
pressing the key combination Ctrl+Alt+Bksp, Bksp.
Note – The user may decide not to disconnect the session before moving to another
Sun Ray appliance. Upon repeating Step 1, the user’s session is disconnected from
the previous appliance and connected to the current appliance.
Hot Key
To disconnect a NSCM session, the user presses the key combination Shift-Pause.
● Type:
% /opt/SUNWut/bin/utdetach
● Edit the respective file and find the line with the utdetach.hotkey property.
Change the string after the equals sign to the keystrokes desired. For example, to
configure the key combination of Alt + Esc, type:
% utdetach.hotkey=Alt Escape
● As superuser, type the following command line to create an alias for all users:
1. To reconfigure the hot key combination, edit the file and find the line with the
utdetach.hotkey property.
2. Change the string after the equals sign to the keystrokes desired.
For example:
utdetach.hotkey=Alt Escape
configures the key combination of Alt+Esc.
Users accustomed to a quick switch might be annoyed that they must interact with
the NSCM GUI a second time.
Considerations
You, as the system administrator, must consider the options and consequences of
increased security versus ease of use. If you wish to maintain a highly secure and
regulated environment, set the acceptRedirectToken to false. If you want a
more open and user friendly network, set the property to true.
Note – If the IP addresses and DHCP configuration data are not set up properly at
the time that the interfaces are configured, the failover feature will not work
properly. In particular, configuring the Sun Ray server’s interconnect IP address as a
duplicate of any other server’s interconnect IP address may cause the Sun Ray
Authentication Manager to throw “ Out of Memory” errors.
3. From the task list, select Admin and click the Policy link.
The Change Policy window is displayed.
4. In the Non-Card Users column, check the Enable Mobile Sessions box.
When the policy change is complete, you are shown a confirmation window.
6. From the task list, select Admin and click the Reset Services link.
The Sun Ray Services panel is displayed.
7. Select Group if this is a failover group or Local if there is a single Sun Ray server.
8. Click Restart to restart Sun Ray services and terminate all users’ sessions.
The NSCM sessions are enabled in a moment.
1. Before changing the Authentication Manager policy, inform your users that all
active and detached sessions will be lost.
You can use the utwall command to provide them the notice of policy change. For
example:
2. As superuser, type the utpolicy command for your authentication policy with
the addition of the -M argument. For example:
# /opt/SUNWut/sbin/utrestart -c
The SunRay Server Software 2.0 release provides interconnect security. Two main
aspects of this feature are:
■ Traffic encryption between the SunRay client and server
■ SunRay server-to-client authentication
Introduction
In earlier versions of Sun Ray Server Software, data packets on the SunRay
interconnect were sent in the clear. This made it easy to “snoop” the traffic and
recover vital and private user information, which malicious users might misuse. To
avoid this type of attack, SunRay 2.0 allows administrators to enable traffic
encryption. This feature is optional; the system or network administrator can
configure it based on site requirements.
The ARCFOUR encryption algorithm, selected for its speed and relatively low CPU
overhead, supports a higher level of security between Sun Ray services and SunRay
desktop units. In the 2.0 release, only the X server traffic is encrypted.
Encryption alone does not provide complete security. It is still possible, if not
necessarily easy, to spoof a SunRay server or a SunRay client and pose as either. This
leads to the man-in-the- middle attack, in which an impostor claims to be the
SunRay server for the clients and pretends to be client for the server. It then goes
about intercepting all messages and having access to all secure data.
Client and server authentication can resolve this type of attack. This release offers
server-side authentication only, through the pre-configured public-private key pairs
in Sun Ray Server Software and firmware. The Digital Signature Algorithm (DSA) is
used to verify that clients are communicating with a valid Sun Ray server. This
97
authentication scheme is not completely foolproof, but it mitigates trivial man-in-
the-middle attacks and makes it harder for attackers to spoof Sun Ray Server
Software.
Security Configuration
When configuring the security for a Sun Ray system, you should evaluate the
security requirements. You may choose:
■ to enable encryption for upstream traffic only
■ to enable encryption for downstream traffic only
■ to enable bidirectional encryption
■ to enable server authentication (client authentication is not currently available)
Additionally, you must decide whether to enable hard security mode. To configure
your site, you can use the utcrypto command or the Sun Ray Admin GUI.
Security Mode
Hard security mode ensures that every session is secure. If security requirements
cannot be met, the session is refused. Soft security mode ensures that every client
that requests a session gets one; if security requirements cannot be met, the session is
granted but not secure.
For example, in hard security mode, if any SunRay appliance that does not support
security features (for instance, because of old firmware) connects to a Sun Ray 2.0
server, the server denies the session.
In soft security mode, given the above situation, the SunRay server grants the
appliance a non-secure session. It is now up to the user to decide whether to
continue using a non-secure session.
For more information, please see the man page for utcrypto or “Administration
Tool” on page 37.
Session Security
Use the utsession command to display session status. Its output has been
modified to included security status for a session. The State column in utsession
-p output now displays the encrypted/authenticated state of the session by using E
for encrypted and A for authenticated session types. This information is not
displayed for any session in the disconnected state.
In a multihead environment, there may be a case where the primary and the
secondary servers have different firmware. For instance, if the secondary has version
1.3 or earlier firmware, it cannot support any of the security features. In this case, the
lowest security setting is displayed. In other words, if the secondary server is
configured with 1.3 firmware and the primary server with 2.0 firmware, and
encryption and authentication are configured, neither an E or an A is displayed.
# utsession -p
Token ID Registered NameUnix IDDisp State
Payflex.0000074500000202 ??? ??? 2IEA
Micropayflex.000003540004545??????3D
One of the following icons is also displayed when a Sun Ray appliance connects to a
session. Each icon displays information about connection security status.
Locked Authenticated
100 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Unlocked Authenticated
Session Refused
Session Refused
Actions to take:
■Check the client’s firmware version. This error may occur
Network Configuration
This chapter describes the network infrastructure required to deliver Sun Ray
services to the Sun Ray clients.
Topics include:
■ “Introduction” on page 103
■ “Network Infrastructure Requirements” on page 104
■ “Network Topology” on page 105
Introduction
The Sun Ray system employs a highly network-dependent computing model in
which all actual computing is performed at a server, and display data, as well as
mouse, keyboard and other device traffic, are sent over the network.
Sun Ray Server Software 2.0 enables shared as well as dedicated network support.
The network segment between Sun Ray server and the Sun Ray clients may be any
kind of network as long as it meets the Sun Ray network infrastructure
requirements.
103
Network Infrastructure Requirements
This section describes the minimal network infrastructure needed to support a Sun
Ray implementation.
Packet Loss
Packet loss between any Sun Ray client and its server must not exceed 0.1% for any
extended period of time, such as a minute or more.
The utcapture utility reports the packet loss statistics for each of the Sun Ray
clients connected.
Latency
Latency between any Sun Ray client and its server must not exceed 25ms for any
extended period of time, such as a minute or more. The utcapture utility reports
round-trip latency statistics for each connected Sun Ray client.
Out-of-Order Packets
Sun Ray clients can handle occasional out-of-order packets, but if the network
segment generates a large number of out-of-order packets, the quality of service
delivered to the Sun Ray client suffers. Out-of-order packets are counted as dropped
packets and are reported to utcapture.
DHCP Services
Sun Ray desktop appliances are stateless, and they rely entirely on network services.
When a Sun Ray DTU is powered on and plugged into a network, it sends a
Dynamic Host Configuration Protocol (DHCP) request for a network address. At the
most basic level of operation, on a dedicated network, the Sun Ray server responds
with an IP address and some additional tags, or vendor options. If the server has a
later version than the one installed on the DTU, the Sun Ray DTU can use this
information to upgrade its firmware. It then either reconnects to an existing session
or starts a new session on a Sun Ray server.
104 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
On a shared network, the Sun Ray DTU may receive only a network address in
response to its DHCP request. It then sends a second DHCP request for network
parameters. If the DTU resides on a different subnet than the Sun Ray server, then it
needs the help of bootp forwarding to reach the Sun Ray server; the Sun Ray server
can then reply with the information the DTU needs in order to start a session.
All Sun Ray appliances must have access to at least one DHCP service for network
parameters and should also have access to Sun Ray parameters. Depending on your
physical network topology, you may need to configure a bootp forwarding agent
for each subnetwork to which Sun Ray clients are connected. If it receives no
parameters, then the DTU broadcasts a server location request.
Network Topology
Beginning with the 2.0 release, Sun Ray servers and appliances can be deployed in
shared as well as dedicated networks. The following table lists the various
configuration options based on the ease of set-up and quality of service that can be
expected. (The easiest option is listed first.)
Generally speaking, less complexity provides more reliability; however, with careful
planning, it is possible to gain the advantages of increased functionality and still
maintain a high degree of reliability.
PC Laptop
106 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Note – If you choose not to use a Sun Ray server for DHCP services, you must
provide Sun Ray parameters through a separate DHCP server. Since all the tools
provided as part of Sun Ray Server Software are written to work only with Sun Ray
servers, making this choice means you must configure and maintain the DHCP
server manually. See Appendix C for further details.
PC
subnet #1
Sun Ray Servers
bootp forwarder running Router deliver IP address,
network parameters,
and Sun Ray
parameters through
router
subnet #2
PC Laptop
The forwarder points to one of the Sun Ray servers. For better fault tolerance, you
may run multiple forwarders.
If you want to use separate DHCP servers to supply network parameters only, and
Sun Ray servers to supply Sun Ray parameters, then the Sun Ray servers must run
Sun Ray Server Software 2.0, and the Sun Ray clients must run at least version 2.0
firmware.
Sun Ray clients running firmware versions lower than 2.0 in this configuration
cannot locate a Sun Ray server. Thus, they cannot:
■ Obtain the required Sun Ray parameters
■ Download firmware updates on their own
108 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 7-4 illustrates a routed configuration with an existing DHCP server:
PC
subnet #1
DHCP Server
PC Laptop
Note – Make sure that each Sun Ray client deployed in this configuration runs the
2.0 or later version of the firmware before you install it on the shared network.
Firmware Barrier
The firmware barrier is a new feature in Sun Ray Server Software 2.0 that helps
administrators maintain extra control over Sun Ray appliance firmware versions.
Client firmware is now associated with a barrier level. When a client tries to
download firmware, the barrier levels of the current firmware and the firmware to
be downloaded are compared.
The barrier level symbol BarrierLevel is defined by default in the DHCP table of
Sun Ray servers running version 2.0 or later. If the BarrierLevel parameter is
present in the DHCP response, it is used for the comparison. If the BarrierLevel
symbol is not present, however, the client uses its internal value for the comparison.
The administrator can specify the firmware barrier level by assigning a value to
BarrierLevel.
The barrier level for firmware shipped with Sun Ray Server Software 2.0 is set to a
value of 200. Firmware shipped with previous versions of Sun Ray Server Software
had no Barrier Level, which equates to a BarrierLevel of 0. Therefore, clients running
2.0 firmware do not download firmware versions shipped with previous releases of
Sun Ray Server Software unless the DHCP BarrierLevel is set to 0.
1. Inspect the DHCP table to see whether the barrier mechanism is defined.
# dhtadm -P
The -P option displays the symbols and macros defined in the DHCP table (see
Appendix C). If the BarrierLevel symbol is not defined, go to step 2.
3. To force the Sun Ray clients in your network to downgrade from 2.0 firmware, set
the BarrierLevel value in the DHCP table for the network to 0.
As an alternative, you can simply remove the BarrierLevel symbol from the
network macro.
110 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Other Configuration Issues
■ To get the best speed and mode, connect Sun Ray clients to switches that are
capable of auto-negotiation.
■ Servers in a failover group need to be able to locate one another. If they are on the
same subnet in at least one of their interfaces, they can use subnet broadcast to
discover each other; otherwise, they can use IP multicast.
■ Every server in a Sun Ray failover group should be reachable from the Sun Ray
clients.
■ Enabling the Spanning Tree protocol in the switches causes the Sun Ray client to
take more time to connect to the server when power cycled. To avoid this
problem, disable the Spanning Tree protocol in the switches for ports that are
connected directly to Sun Ray DTUs or Sun Ray servers.
■ To reduce performance hits caused by various network issues in VLAN
implementations, assign the Sun Ray segment a higher priority.
■ IP addresses sometimes get marked as unusable during system boot if they are
perceived to be in use. If this occurs, use the dhcpmgr tool to diagnose the
problem, and release the IP addresses back into the pool.
This chapter describes how to use the Sun Management Center software to monitor
the Sun Ray System.
Topics include:
■ “Sun Management Center (SunMC) Software Features” on page 113
■ “SunMC Software Requirements” on page 115
■ “Installing the SunMC Software” on page 116
■ “Setting Up the Monitoring Environment” on page 119
■ “Setting Monitoring Guidelines” on page 126
■ “Using Other Monitoring Programs” on page 132
■ “Removing the Sun Ray Module from SunMC” on page 134
Each managed object is monitored separately and has independent alarm settings.
113
For example, in a failover configuration, the entire group as well as any part of the
group can be monitored—each server and its load, each interconnect, and each
appliance. Sun Management Center software also monitors Sun Ray Server Software
daemons that:
■ Authenticate users
■ Start sessions
■ Manage peripheral devices
■ Handle DHCP services
After you set an alarm, the Sun Management Center software notifies you when
your specified parameter value has been reached. For example, you might want to
track the number of appliances on a server so that you can monitor possible
overload scenarios. Other alarms can be set to notify you when a server,
interconnect, or appliance goes down or when a daemon is not running.
The three Sun Management Center components (TABLE 8-1) can be installed on three
separate machines.
Component Function
Console Enables you to set and view alarms and to request system information.
Requests can be automated or on demand.
Server Processes requests and passes them on to the appropriate agent. The
agent returns the requested information to the server, which then
forwards it to the console.
Agents Monitor the system. Agents return the requested information to the
server. These agents, based on SNMP (Simple Network Management
Protocol), monitor the status of the managed object (server, interface, or
appliance).
Sun Ray system monitoring consists of ten packages, which are installed as part of
Sun Ray Server Software 2.0. If you run the Sun Management Center on a non-Sun
Ray server, you must add some packages that contain localized messages and icons
to the Sun Management Center monitoring server.
This feature interfaces with the Sun Management Center software using SNMP. For
information on additional monitoring programs that interact with Sun Management
Center software, see “Using Other Monitoring Programs” on page 132.
114 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
SunMC Software Requirements
The Sun Ray system monitoring feature has the following software requirements:
■ Sun Management Center 2.1.1 or 3.0 software
The Sun Ray module adds the following requirements when added to either the Sun
Management Center server or agent component:
Component Size
RAM 8 KB
/opt/SUNWut 153 KB
/opt/SUNWsymon 12 KB
Component Size
RAM 1 MB
Swap 1 MB
/opt/SUNWut 602 KB
/opt/SUNWsymon 12 KB
/var/opt/SUNWsymon 0.5 KB
The Sun Ray module adds the following requirements to the Sun Management
Center server and agent components:
Component Size
RAM 1008 KB
Swap 1 MB
/opt/SUNWut 602 KB
/opt/SUNWsymon 12 KB
/var/opt/SUNWsymon .5 KB
If you are doing a clean installation of Sun Management Center software and Sun
Ray Server Software on the same server, it is easier to install Sun Management
Center software first.
When you install Sun Management Center software, you are given the option of
installing any of the three components on the selected server. If you want to add
only the agent to a Sun Ray server, just choose to add the agent component.
After the appropriate hardware configuration product is installed on the server, you
can choose to run the setup now or later. When you run the setup, you are prompted
for a host name of Sun Management Center server, a seed to generate security keys,
a base URL for the console, and if there is a conflict, a different port for the agent.
Tip – To monitor all the servers in a failover group, make sure every server runs Sun
Ray Server Software 1.3 or 2.0. In addition, all servers must run the Sun
Management Center agent component.
# /opt/SUNWsymon/sbin/es-start -c &
116 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Check to see if the Sun Management Center works. If not, reinstall the Sun
Management Center software. Use the Sun Management Center 3.0 Software
Installation Guide and the Sun Management Center 3.0 Software User’s Guide to install
the Sun Management Center software.
2. Use the standard Sun Ray installation script to add the Sun Ray module:
# utinstall
If the Sun Management Center agent software is running, the standard Sun Ray
install script automatically stops it, adds the Sun Ray module, and restarts the Sun
Management Center agent software.
If the Sun Management Center agent software is not running, the Sun Ray install
script adds the Sun Ray module but does not start the Sun Management Center
agent software.
# utinstall
The Sun Ray module for SunMC is installed automatically on the server when
utinstall installs Sun Ray Server Software.
2. Follow the installation instructions found in the Sun Management Center 3.0
Software Installation Guide to install the Sun Management Center software.
# /opt/SUNWut/sbin/utsunmc
# /opt/SUNWsymon/sbin/es-start -c &
Check to see if Sun Management Center works. If not, reinstall the Sun Management
Center software.
# pkginfo -l SUNWesagt
# utinstall
If the Sun Management Center agent is running, the installation process stops and
restarts the SunMC software.
Note – You can install Sun Management Center agents after Sun Ray Server
Software installation; however, you must then enable the Sun Ray module by typing
/opt/SUNWut/sbin/utsunmc to register the Sun Ray module with the SunMC.
3. Install the Sun Ray interface package on the Sun Management Center server:
If you have already mounted the Sun Ray Server Software 2.0 CD-ROM on the
SunMC server or from a remote server, or if you have extracted the ESD files to an
image directory, begin at Step c.
# cd /cdrom/cdrom0
# ./utsunmcinstall
118 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
■ Installs the parts of the Sun Ray module needed on the SunMC server.
# /opt/SUNWsymon/sbin/es-start -c &
3. Click Login.
The Sun Management Center window is displayed. If this is your first time using the
SunMC console, the Set Home Domain window is also displayed.
▼ To Create an Object
1. Expand the Sun Management Center Domains list.
4. On the Node page, enter a Node Label and Description. Then enter the Hostname
(server name), IP Address, and Port for the Sun Ray server.
The port entered here must be the same port you configured (entered) during the
installation of the Sun Management Center.
Setting Alarms
Alarms are used to notify you when errors occur or your performance needs to be
tuned. Alarms are triggered (tripped) if:
■ A server goes down.
■ An appliance is down.
These alarms are set by default, but you can change them. Base a tuning alarm on
the number of active sessions on each server in a failover group to determine if one
of the servers is overloaded. You set the thresholds that trigger this type of alarm.
▼ To Set an Alarm
1. After creating an object, bring up the Details window of the object.
120 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 8-1 Sun Management Center Details Window
6. Supply an appropriate number for the type of alarm that you choose to monitor.
In this example, the Alert Threshold alarm is set at greater than 1 to notify you when
that server in the failover group is down.
7. Click the Apply button to save the value of the alarm and continue setting other
values in the Attribute Editor
8. Click the OK button, which saves the value of the alarm and closes the window.
As soon as you set an alarm it takes effect.
10. Select the Refresh tab to set the number of seconds between pollings.
The default value is 300 seconds (5 minutes).
11. Select the History tab to view information about the log file that records
monitored values.
122 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 8-3 Alarm Window
▼ To Start Monitoring
1. Start the Sun Management Center software:
# /opt/SUNWsymon/sbin/es-start -c &
4. Expand the hierarchy in the left or right panel until it displays the level you want.
This console Details window shows the hierarchical details of your system. You can
immediately see if any alarms have been tripped. An alarm’s area and type appear
in the left panel as a colored circle with a bar. The Alert alarm also shows up on the
title bar by the server node name and at the Operating System, Sun Ray, and
Failover Group levels. Double-clicking the area where an alarm icon is present
updates the right panel with the detailed information. If you position the mouse
pointer over one of the colored circles in either panel, a pop-up window is displayed
detailing the alarm information.
If you click the Alarms tab in the Details window, a window is displayed that lists a
summary of all the current alarms. When you stop the Sun Ray services (daemons),
the alarms display as shown in FIGURE 8-5.
124 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 8-5 Alarm Summary Window
The total number of alarms set for the current server object is displayed at the top of
the alarm summary window. Critical alarms (red), alert alarms (yellow), and caution
alarms (blue) that are tripped are listed below. Details and comments are displayed
in the Message column.
indicating that the server was restarted and the alarm cleared on March 6 at 15:23:55.
Similar information is provided for Active Sessions, Desktops, Users, and Total
Sessions.
126 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
▼ To Refresh the Sun Ray System Panel
● Click the refresh button (circular arrow in the upper right corner).
The entire system panel is refreshed.
Tip – Do not set the seconds to less than 60. The load interferes with the Sun Ray
server performance.
In this panel, you set alarms to monitor the status of the server; how many sessions,
users, or appliances are active; and how many total sessions exist.
▼ To Set Alarms
1. Click the Value cell of the Property you want to set an alarm for with the right
mouse button.
5. Click OK.
Property Value
Host Name Name of server that was queried. This information is obtained when
Sun Ray System is selected or on manual refresh.
Contact Name This information is obtained when Sun Ray System is selected or on
manual refresh.
Up Time (1/100ths sec.) Number of 1/100th seconds since the last of all the daemons critical
to the Sun Ray server was started. A value of 0 means the server is
down and an alarm is tripped. The default refresh rate is 300
seconds.
Version List of version, build, and date of build of Sun Ray Server Software.
This information is obtained when Sun Ray System is selected or on
manual refresh.
Property Value
Install Date Date Sun Ray Server Software was installed. This information is
obtained when Sun Ray System is selected or on manual refresh.
Patch Information List of Sun-Ray-specific patches. This information is obtained when
Sun Ray System is selected or on manual refresh.
Active Sessions Number of sessions based on logged-in sessions with a smart card
plugged in, plus sessions for appliances logged in without smart
cards. Set an alarm here to watch for overloading of this server. The
default refresh rate is 300 seconds.
Total Sessions Number of active and suspended sessions. The default refresh rate is
300 seconds.
Active Desktops Number of connected appliances. The default refresh rate is 300
seconds.
Active Users Number of currently active users. When pseudo tokens are allowed
(this is a policy setting), this number includes appliances at the login
prompt. The default refresh rate is 300 seconds.
Policy The policy that has been set. This information is obtained when Sun
Ray System is selected or on manual refresh.
On the Sun Ray Services panel, default alarm values are set for the status of each
daemon and the number of instances. You can reset them if you want to.
128 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 8-7 Sun Ray Services (daemons) Panel
Some of the daemons have two instances, corresponding to their two functions: one
to listen and one to interact.
Note – The utscreventd daemon does not run unless third-party Smart Card
software is installed, so no alarm is triggered when the utscreventd status is 2.
If the Status is 1, the server is running. If the Status is 2, the server is down and there
is one Alert (yellow) alarm.
Interconnect Panel
The Interconnect panel lists all the network interfaces usable by the Sun Ray server.
The DHCP Table lists the interfaces that are used for the Sun Ray interconnect.
Available Addresses lists the number of addresses available for new end users. The
alarms that are set here let the system administrator know when the Sun Ray server
is running out of addresses to give to users.
The Interface Table lists all the interfaces on the Sun Ray server. The Address is the
IP address for the interface. You entered this address as the Net Mask when you first
configured your system.
If the Status is 1, the interface is up. If the Status is 2, the interface is down.
130 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
▼ To Set an Alarm for Running Out of Addresses
1. Click the Available Addresses cell in the DHCP Table using the right mouse
button.
5. Click OK.
Desktops Panel
The Desktops panel is where you can select individual appliances to monitor. The
possible values for the status of the appliances are: 1, running; 2, down; and 3,
displaying the green hourglass cursor. The default polling time is 300 seconds (5
minutes).
Appliances can be added and deleted from the Monitored Desktops list.
In a failover group, you can monitor any desktop from any server.
3. In the Add Row window, enter the MAC address of the appliance you want to
monitor in the Name field.
4. Click OK.
Property Value
132 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Packard provides the interface needed between HP OpenView™VPO and Sun
Management Center. Sun provides the interface needed between Sun Management
Center and Tivoli TMS or CA Unicenter.
# /opt/SUNWut/sbin/utsunmc -u
If the SunMC agent is running, utsunmc stops and restarts the Sun Management
Center agent software.
# /opt/SUNWut/lib/utsunmcinstall -u
134 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
CHAPTER 9
Multihead Administration
The multihead feature on Sun Ray™ appliances enables users to control separate
applications on multiple screens, or heads, using a single keyboard and pointer
device attached to the primary appliance. Users can also display and control a single
application, such as a spreadsheet, on multiple screens. System administrators create
multihead groups that may be accessed by users. A multihead group, consisting of
between two and 16 appliances controlled by one keyboard and mouse, may be
composed of Sun Ray 1, Sun Ray 100, and Sun Ray 150 appliances. Each appliance
presents an X screen of the multihead X display.
By default, when the user logs into a multihead group, the user gets a multihead
session using the number of screens available in that group. The resolution for the
group is automatically set to the largest supported resolution of the primary
appliance, which is the appliance that controls the other appliances in the group and
to which all peripherals are attached. Auto-size can be turned off and the Xserver
size can be changed using the utxconfig command. Because auto-size affects X
display dimensions as well as the initial multihead session group geometry, the user
might experience panning or black-band effects.
The user can explicitly choose not to use multiple screens for a session by executing
the utxconfig -m off command. The user can also choose a particular number of
screens in a particular geometry by executing (in the following order):
■ the utxconfig -s off command to disable autosize
135
When the user moves the mouse pointer past the edge between two screens, it
moves from one screen to the next. The geometry of the multihead group determines
which screen is displayed.
Multihead Groups
A multihead group is comprised of a set of associated Sun Ray appliances controlled
by a primary appliance to which a keyboard and pointer device, such as a mouse,
are connected. This group, which can contain a maximum of 16 appliances, is
connected to a single session.
Unless XINERAMA is enabled (see “XINERAMA” on page 141 for more details),
sessions will have a separate CDE toolbar (with separate workspaces) per screen. A
window cannot be moved between screens.
The primary appliance hosts the input devices, such as a keyboard and a pointer
device, and the USB devices associated with the session. The remaining appliances,
called the secondaries, provide the additional displays. All peripherals are attached
to the primary appliance, and the group is controlled from the primary appliance.
Multihead groups can be created easily by using a smart card to identify the
terminals with the utmhconfig GUI utility.
Tip – For best results, run utmhconfig only from a client desktop.
136 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 9-1 The Multihead Screen Display
Display Resolution
To avoid panning, all the monitors in a workgroup must support the same
resolution.
The auto-size feature sets the user’s X server display dimensions automatically to
match the preferred resolution supported by the primary appliance when the session
is created. This resolution will be the optimum resolution for the multihead group.
This feature can be turned off and on using the utxconfig command. The default
geometry, which is the number of rows and columns in the multihead group, and
the screen order are also automatically set when a session is created. This feature can
be turned off and on using the utxconfig command.
If auto-size is on when you create a session on a 2x1 multihead group, the result is a
2x1 session. If auto-size is turned off, the size of the session is whatever you
designate. For instance, if auto-size is off and the geometry is set to 3x1, then even if
you log in to a 2x1 multihead group (or even a non-multihead, 1x1 terminal), you
will get a 3x1 session with screen flipping. This might be useful if you know you are
going to Hot Desk to a 3x1 multihead group in the future and want to take full
advantage of it when you get there.
Note – If the resolutions of the monitors differ, you may have problems with
unwanted on-screen movement called panning, or large black bands around the visible
screen area.
# /opt/SUNWut/sbin/utpolicy -a -m -g your_policy_flags
# /opt/SUNWut/sbin/utrestart
This enables the multihead policy for the failover group and restarts Sun Ray Server
Software with the new policy on the local server without disrupting existing
sessions.
Tip – Issue the utrestart command on every server in the failover group.
http://hostname:1660
2. Select Admin from the navigation menu on the left side of the tool.
3. Select Policy.
# /opt/SUNWut/sbin/utmhconfig
138 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 9-2 Multihead Group List With Group Detail
The Create New Multiheaded Group pop-up dialog box is displayed. The number of
rows and the number of columns you enter are displayed as the group geometry
when the group has been created.
5. Select the appliances within the multihead group and insert a smart card in each
Sun Ray appliance in turn to establish the order of the group.
The Finish button, which was previously grayed out, is now active.
FIGURE 9-5 Completed Multihead Group List With Active Finish Button
140 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
XINERAMA
The XINERAMA extension to X11creates one single large screen displayed across
several monitors. With XINERAMA only one toolbar is displayed, and a window
can be moved smoothly from one part of the screen to the next. XINERAMA is
supported in both the Solaris 8 and Solaris 9 operating environments.
A single CDE toolbar (and set of workspaces) manages the configured monitors. A
window can span monitors, since they are still within the same screen. This includes
the CDE toolbar itself.
% /opt/SUNWut/bin/utxconfig -x on
% /opt/SUNWut/bin/utxconfig -x off
To enable as default for a single system or failover group, as superuser, type the
following command:
% utxconfig -a -x on
Authentication Manager
The TerminalGroup policy module extends the Authentication Manager to support
multihead groups. When an appliance connects to the Authentication Manager or a
new smart card is inserted, the TerminalGroup module queries its database to
determine whether the appliance is part of a multihead group and, if so, whether the
appliance is a primary or secondary appliance of that group. If it is not identified as
part of a multihead group, the appliance is treated normally.
NO
YES
YES
Connect to the
existing session
142 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
If the appliance is determined to be part of a multihead group and it is the
multihead group’s primary appliance, a normal session placement occurs. If a
session does not exist on the current server, but there is a preexisting session for the
appliance or smart card on another server in the failover group, the primary
appliance will be redirected to that server. If there is no session on any server, the
request for a session is directed to the least-loaded server and a session is created
there.
YES
YES
Connect to the
existing session
This chapter describes Controlled Access Mode (CAM) as well as how to deploy,
install, and configure your system to allow controlled, simplified access to
anonymous users without compromising the Sun Ray server’s security.
Topics include:
■ “Controlled Access Mode Functionality” on page 145
■ “Advanced Application Setup” on page 153
■ “Security and the Controlled Access Mode Environment” on page 154
CAM is a policy decision that affects system-level operations. Turn controlled access
mode on and off in the Change Policy section of the Admin function of the
Administration Tool. You can enable the CAM Policy option for smart card users,
non-smart card users, or both.
145
When controlled access mode is turned on, kiosk.start uses scripts to choose
temporary users and home directories, then uses the kiosk.conf file to configure
and populate the user’s environment and to launch enabled applications. When a
session terminates, kiosk.start cleans up all the files and entries related to the
session, then recreates the environment for a new user.
2. Select the arrow to the left of Admin to expand the navigation menu.
4. For smart card users, select the Controlled Access Mode check box in the Card
Users column.
146 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
5. For non-smart card users, select the Controlled Access Mode check box in the
Non-Card Users column.
8. Under Scope, click the Local or Group radio button, depending on the failover
scenario.
3. Click the Submit Changes button to store the action parameters in the
/var/opt/SUNWut/kiosk/kiosk.conf file, which is the controlled access mode
configuration file.
The Controlled Access Mode Configuration panel is displayed.
The default values in the maximum CPU, VM, and File Size text boxes are set with
the ulimit command. These limits contain the CAM user processes.
4. Click the Confirm link in the navigation menu to save the changes.
6. Click the arrow to the left of Admin to expand the navigation menu.
8. Select the Local or Group radio button, depending on the failover scenario.
Tip – Complete your additions and edits in the Add/Edit Apps section and your
selections in the Select Applications section before clicking the Confirm link.
148 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 10-3 Add/Edit Apps Panel
7. To enable the newly added application, go to the Select Applications panel and
add the application to the Applications to Launch list.
All applications must be accessible to all servers in the failover group. Add new
applications to all servers in a failover group.
2. Highlight the application in the All Available Applications list that you want to
change and click the Edit button.
The fields on the right are populated. If, for example, you want to change a default
application to be a critical application, you must edit the application and change the
attribute to critical.
6. If the application is enabled, click the Reset Services link in the Admin menu.
150 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE 10-4 Additional Applications Configuration Panel
2. In the Available Applications column, highlight the application that you plan to
add.
2. In the Applications to Launch list, highlight the application that you want to
make unavailable.
▼ To Remove an Application
1. From the Controlled Access Mode menu, click the Select Applications link.
2. In the Available Applications list, highlight the application that you want to
remove.
152 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Advanced Application Setup
To customize the CAM user’s environment further, you can use prototypes or
wrapper scripts to enhance application behavior. Prototypes enhance application
behavior by providing files in the user’s home directory specific to that application.
Enabling Prototypes
Note – When you add new applications, the name of the prototype directory must
match the name in the Application Profile Name field of the Administration Tool.
▼ To Enable Prototypes
1. Create a directory with the same name as the application profile name provided in
the Add/Edit Applications section of the Administration Tool:
/var/opt/SUNWut/kiosk/prototypes/application_profile_name
2. Populate the new prototype directory with files specific to that application:
/opt/SUNWut/kiosk/bin/dtsession
This example wrapper script customizes the right-click menu button to reflect
application labels for menu or default-attributed applications. The script then
launches dtsession.
● Alternatively, put the wrapper script in the directory where the Controlled Access
Mode program checks for wrapper scripts:
/opt/SUNWut/kiosk/wrappers
In this case, the wrapper scripts must have the same name as the path of the
application entered in the Add/Edit Applications tab. For an example of a wrapper
script, refer to ControlledBrowser, which is installed when cbinstall is
executed. The cbinstall script is found in the Supplemental directory on the CD-
ROM, in the /opt/SUNWut/kiosk/wrappers directory.
154 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
For example, adding an application, such as xterm, provides users with access to a
command-line interface from a Controlled Access Mode session. This would not be
desirable in a public environment and is not advised. However, using a custom
application for a call center would be an ideal situation. See Appendix A for an
example of an application modified for Controlled Access Mode.
Failover
In a failover environment, the administrative settings in the kiosk.conf file are
copied to the failover servers. Be sure that all application paths added to the
Controlled Access Mode sessions are copied across the servers in the failover group.
For example, if the Netscape application is added to the sessions with the executable
path, /usr/local/exe/netscape, make sure that the path to the binary is
available to all servers in the failover group.
Note – Applications must be installed in the same location and set up the same way
on each server in the failover group. Prototypes and wrapper scripts must also exist
on each server in the failover group.
Localization
Controlled Access Mode sessions use their server’s default locale.
LANG=new-locale
Note – Adding this line changes the locale for all users on this server.
Failover Groups
Sun Ray servers configured in a failover group provide users with a high level of
availability when one of those servers becomes unavailable because of a network or
system failure. This chapter describes how to configure a failover group.
157
Failover Group Overview
A failover group consists of two or more Sun Ray servers grouped together to
provide highly-available and scalable Sun Ray service for a population of Sun Ray
appliances. Releases earlier than 2.0 supported appliances available to the servers
only on a common, dedicated interconnect. Beginning with the 2.0 release, this
capability has been expanded to allow access across the LAN to either local or
remote Sun Ray devices. However, there is still a requirement for the servers in a
failover group to be able to reach one another, using multicast or broadcast, over at
least one shared subnet. Servers in a group authenticate (or “trust”) one another
using a common group signature. The group signature is a key used to sign
messages sent between servers in the group; it must be configured to be identical on
each server.
Failover groups that use more than one version of Sun Ray Server Software will be
unable to use all the features provided in the 2.0 release. On the other hand, the
failover group can be a heterogeneous group of Sun servers (for example, a mixture
of E250s and E450s) running various releases of the Solaris operating environment,
such as Solaris 8 and Solaris 9.
When a dedicated interconnect is used, all servers in the failover group should have
access to, and be accessible by, all the Sun Ray appliances on a given sub-net. The
failover environment supports the same interconnect topologies that are supported
by a single-server Sun Ray environment. However, switches should be multicast-
enabled.
FIGURE 11-1 illustrates a typical Sun Ray failover group. For an example of a
redundant failover group, see FIGURE 11-2.
158 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Public Sun Ray Sun Ray Sun Ray
network servers interconnect appliances
hme0 Switch
102.23.16.47
P hme1 192.168.128.10
192.168.128.1 192.168.128.11
sr47
192.168.128.32
hme0 hme1
102.23.16.48
S 192.168.128.2 192.168.128.33
192.168.128.54
sr48
hme1 192.168.128.55
S 192.168.128.3
hme0
102.23.16.49 sr49
When a server in a failover group fails for any reason, each Sun Ray appliance
connected to that server reconnects to another server in the same failover group. The
failover occurs at the user authentication level; the appliance connects to a
previously existing session for the user’s token. If there is no existing session, the
appliance connects to a server selected by the load-balancing algorithm. This server
then presents a login screen to the user and the user must relogin to create a new
session. The state of the session on the failed server is lost.
Note – The failover feature cannot work properly if the IP addresses and DHCP
configuration data are not set up properly when the interfaces are configured. In
particular, if the Sun Ray server’s interconnect IP address is a duplicate of any other
server’s interconnect IP address, the Sun Ray Authentication Manager throws “Out
of Memory” errors.
The redundant failover group illustrated in FIGURE 11-2 can provide maximum
resources to a few Sun Ray appliances. The server sr47 is the primary Sun Ray
server and sr48 is the secondary Sun Ray server; other secondary servers (sr49,
sr50... are not shown.
Switches
hme0 qfe0 192.168.128.16
102.23.16.47 192.168.128.1
P 192.168.128.xx
qfe1
192.168.128.240
sr47 192.168.129.1
qfe0 192.168.129.16
192.168.128.2 192.168.129.xx
S
qfe1 192.168.129.240
hme0
192.168.129.2
102.23.16.48 sr48
Setting Up IP Addressing
The utadm command assists you in setting up a DHCP server. The default DHCP
setup configures each interface for 225 hosts and uses private network addresses for
the Sun Ray interconnect. For more information on using the utadm command, see
the man page for utadm.
Before setting up IP addressing, you must decide upon an addressing scheme. The
following examples discuss setting up class C and class B addresses.
TABLE 11-1 describes how to configure five servers for 100 appliances,
accommodating the failure of two servers (class C) or four servers (class B).
160 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
TABLE 11-1 Configuring Five Servers for 100 Appliances
The formula for address allocation is: address range (AR) = number of
appliances/(total servers - failed servers). For example, in the case of the loss of two
servers, each DHCP server must be given a range of 100/(5-2) = 34 addresses.
Ideally, each server would have an address for each appliance. This would require a
class B network. Consider these conditions:
■ If AR multiplied by the total number of servers is less than or equal to 225,
configure for a class C network
■ If AR multiplied by the total number of servers is greater than 225, configure for a
class B network
Tip – If all available DHCP addresses are allocated, it is possible for a Sun Ray
appliance to request an address yet not find one available, perhaps because another
unit has been allocated IP addresses by multiple servers. To prevent this condition,
give each DHCP server enough addresses to serve the all the appliances in a failover
group.
Server Addresses
Server IP addresses assigned for the Sun Ray interconnect should all be unique. Use
the utadm tool to assign them.
The accepted DHCP response also contains information about the IP address and
port numbers of the Authentication Managers on the server that sent the response.
Note – For the broadcast feature enabled, the broadcast address (255.255.255.255)
must be the last one in the list. Any addresses after the broadcast address are
ignored. If the local server is not in the list, Sun Ray appliances cannot attempt to
contact it.
The Authentication Manager then sends a query to all of the other Authentication
Managers on the same subnet and asks for information about existing sessions for
the token. The other Authentication Managers respond, indicating whether there is a
session for the token and the last time the token was connected to the session.
The requesting Authentication Manager selects the server with the latest connection
time and redirects the appliance to that server. If no session is found for the token,
the requesting Authentication Manager selects the server with the lightest load and
redirects the token to that server. A new session is created for the token.
The Authentication Manager enables both implicit (smart card) and explicit
switching. For explicit switching, see “Group Manager” on page 166.
Configuring DHCP
In a large IP network, a DHCP server distributes the IP addresses and other
configuration information for interfaces on that network.
162 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Coexistence of the Sun Ray Server With Other DHCP Servers
The Sun Ray interconnect is not intended to be shared with any other network
traffic.
The Sun Ray DHCP server can coexist with DHCP servers on other subnets,
provided you isolate the Sun Ray DHCP server from other DHCP traffic. Verify that
all routers on the network are configured not to relay DHCP requests. This is the
default behavior for most routers.
Caution – If the IP addresses and DHCP configuration data are not set up correctly
when the interfaces are configured, the failover feature cannot work properly. In
particular, configuring the Sun Ray server’s interconnect IP address as a duplicate of
any other server’s interconnect IP address may cause the Sun Ray Authentication
Manager to throw “Out of Memory” errors.
# /opt/SUNWut/sbin/utadm -a <interface_name>
The default values are the same for each server in a failover group. Certain values
must be changed to be unique to each server.
3. Change the second server’s IP address to a unique value, in this case 192.168.128.2:
4. Accept the default values for netmask, host name, and net name:
5. Change the appliance address ranges for the interconnect to unique values. For
example:
164 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
6. Accept the default firmware server and router values:
The utadm script asks if you want to specify an alternate server list:
8. Stop and restart the server and power cycle the appliances to download the
firmware.
Option Definition
Group Manager
Every server has a group manager module that monitors availability and facilitates
redirection. It is coupled with the Authentication Manager.
Warning – The same policy must exist on every server in the failover group or
undesirable results might occur.
Each Group Manager creates maps of the failover group topology by exchanging
keepalive messages among themselves. These keepalive messages are sent to a
well-known UDP port (typically 7009) to all of the configured network interfaces.
The keepalive message contains enough information for each Sun Ray server to
construct a list of servers and the common subnets that each server can access. In
addition, the group manager remembers the last time that a keepalive message
was received from each server on each interface.
The keepalive message contains the following information about the server:
■ Server’s host name
■ Server’s primary IP address
■ Elapsed time since it was booted
166 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
■ IP information for every interface it can be reach
■ Machine information (number and speed of CPUs, configured RAM, and so on)
■ Load information (CPU and memory utilization, number of sessions, and so on)
Note – The last two items are used to facilitate load distribution. See “Load
Balancing” on page 168.
The information maintained by the Group Manager is used primarily for server
selection when a token is presented. The server and subnet information is used to
determine the servers to which a given appliance can connect. These servers are
queried about sessions belonging to the token. Servers whose last keepalive
message is older than the timeout are deleted from the list, since either the network
connection or the server is probably down.
Redirection
In addition to automatic redirection at authentication, you can use the utselect
graphical user interface (GUI) or utswitch command for manual redirection.
Note – The utselect GUI is the preferred method to use for server selection. For
more information, see the utselect man page.
# /opt/SUNWut/sbin/utrestart
Load Balancing
At the time of a server failure, the Group Manager on each remaining server
attempts to distribute the failed server’s sessions evenly among the remaining
servers. The load balancing algorithm takes into account each server’s capacity
(number and speed of its CPUs) and load so that larger or less heavily loaded
servers host more sessions.
When the Group Manager receives a token from a Sun Ray appliance and finds that
no server owns an existing session for that token, it redirects the Sun Ray appliance
to the server in the group with the lightest load. It is possible that a Sun Ray
appliance appears to connect twice; once on the server that answered its DHCP
request and a second time on a server that was less loaded than the first.
enableLoadBalancing = false
168 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Setting Up a Failover Group
A failover group is one in which two or more Sun Ray servers use a common policy
and share services. It is composed of a primary server and one or more secondary
servers. For such a group, you must configure Sun Ray Data Store to enable
replication of the Sun Ray administration data across the group.
The utconfig command sets up the internal database for a single system initially,
and enables the Sun Ray servers for failover. The utreplica command then
configures the Sun Ray servers as a failover group.
Primary Server
Layered administration of the group takes place on the primary server. The
utreplica command designates a primary server, advises the server of its
Administration Primary status, and tells it the host names of all the secondary
servers.
Tip – Configure the primary server before you configure the secondary servers.
# /opt/SUNWut/sbin/utreplica -s primary-server
# /opt/SUNWut/sbin/utreplica -s primary-server
# /opt/SUNWut/sbin/utreplica -u
170 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Viewing the Administration Status
▼ To Show Current Administration Configuration
● As superuser, open a shell window and type:
# /opt/SUNWut/sbin/utreplica -l
The result indicates whether the server is standalone, primary (with the secondary
host names), or secondary (with the Primary host name).
The Failover Group Status window describes the health and current state of multiple
Sun Ray servers within your failover group. This window also describes the health
of any Sun Ray servers that have responded to a Sun Ray broadcast.
The Failover Group Status window provides information on group membership and
network connectivity. The servers are listed by name in the first column. Failover
Group Status only displays public networks and Sun Ray interconnect fabrics.
In FIGURE 11-3 the information provided is from the point of view of the server in the
upper left hand of the table. In this example the server is nomad-100.
Note – Sun Ray server broadcasts do not traverse over routers or servers other than
Sun Ray servers.
Icons Description
Information is displayed from the perspective of the system performing the failover
status.
A failover group is established and functioning properly. The trusted hosts are members
of this failover group because they share the same group signature.
172 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
TABLE 11-3 Failover Group Status Icons (Continued)
Icons Description
This Sun Ray interconnect fabric is unreachable from the server performing the failover
group status. This may indicate a failure in the interconnect fabric between Sun Ray
servers if they are supposed to be on the same interconnect. In the past, this host was
reachable but is no longer from the point of view of the system performing failover
status.
The servers are unreachable. This network is unreachable from the server performing
the Failover Group Status. This could be an alert situation. Over a public network the
conditions could be normal, except for the Sun Ray broadcast information, which cannot
traverse over routers.
Servers that appear in the same group use this icon. The signature files,
/etc/opt/SUNWut/gmSignature, on those two machines are identical. This icon
identifies systems as trusted hosts. Failover occurs for any Sun Ray appliances
connected between these systems. The utgroupsig utility is used to set the
gmSignature file.
The recovery procedure depends on the severity of the failure and whether a
primary or secondary server has failed.
Note – When the primary server fails, you cannot make administrative changes to
the system. For replication to work, all changes must be successful on the primary
server.
# /opt/SUNWut/srds/lib/utldbmcat \
/var/opt/SUNWut/srds/dbm.ut/id2entry.dbb > /tmp/store
3. Follow the directions in the Sun Ray Server Software 2.0 Installation and
Configuration Guide to install Sun Ray Server Software.
# /opt/SUNWut/srds/lib/utldif2ldbm -c -n 2 -j 10 -i /tmp/store
This populates the primary server and synchronizes its data with the secondary
server.
5. Follow the configuration procedures in the Sun Ray Server Software 2.0
Installation and Configuration Guide.
# sync;sync;init 6
# /opt/SUNWut/sbin/utuser -l
174 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
▼ To Replace the Primary Server with a Secondary Server
1. On one of the secondary servers, capture the current data store to a file called
/tmp/store:
# /opt/SUNWut/srds/lib/utldbmcat \
/var/opt/SUNWut/srds/dbm.ut/id2entry.dbb > /tmp/store
3. Type:
# /opt/SUNWut/srds/lib/utldif2ldbm -c -n 2 -j 10 -i /tmp/store
# /opt/SUNWut/sbin/utreplica -u
# /opt/SUNWut/srds/lib/utldbmcat \
/var/opt/SUNWut/srds/dbm.ut/id2entry.dbb > /tmp/store
2. Install and configure a Sun Ray server according to the procedures in the Sun Ray
Server Software 2.0 Installation and Configuration Guide.
# sync;sync;init 6
5. Type:
# /opt/SUNWut/srds/lib/utldif2ldbm -c -n 2 -j 10 -i /tmp/store
# utreplica -u
176 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
▼ To Change the Group Manager Signature File
1. As superuser of the Sun Ray server, open a shell window and type:
# /opt/SUNWut/sbin/utgroupsig
3. For each Sun Ray server in the group, repeat the steps, starting at step 1.
Note – It is important to use the utgroupsig command, rather than any other
method, to enter the signature. utgroupsig also ensures that internal database
replication occurs properly.
# /opt/SUNWut/sbin/utadm -f
# /opt/SUNWut/sbin/utadm -n
Troubleshooting
Understanding OSD
Sun Ray Server Software 2.0 uses a different, larger set of on-screen displays (OSD)
than earlier releases, to help administrators and others identify problems visually.
The most important information about the Sun Ray appliance and its current state is
displayed on the screen.
179
To help you locate problems, the OSD icons display a numeric icon code followed by
an alphabetic DHCP state code. You can look up the meaning of the numeric OSD
message codes in TABLE A-1 and the alphabetic DHCP state codes in TABLE A-2.
Encryption and authentication information is also displayed when appropriate.
OSD icon messages and codes are summarized in the following tables:
180 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
TABLE A-1 Icon Messages
Off Check to see if the appliance is plugged in. Replace the appliance.
Amber Hardware fault. Replace the appliance.
Blinking PROM is corrupted. Check that firmware downloads are properly
configured and enabled. Then power cycle the appliance.
Card reader LED remains on even Card reader hardware problem. Replace the appliance.
when smart card is removed
Appendix 181
Sun Ray Desktop Unit Startup
The first display a user should see is OSD 1: Waiting for the Interconnect.
Definition: The appliance has passed the power-on self
test but has not detected an Ethernet signal yet. This
icon is displayed as part of the normal startup phase
and is usually displayed for only a few seconds.
A link light on the switch or hub indicates that the connection is alive.
2. If the appliance is connected through a hub or a switch, make sure that the hub or
switch is powered on and configured correctly.
After the Sun Ray desktop unit has verified its network connection, the user should
see the DHCP Pending display.
Definition: The appliance has detected the Ethernet
carrier but has not yet received its initial parameters or
IP address from DHCP. This icon is displayed as part of
the normal startup phase and is usually displayed for
only a few seconds.
2. Verify that your DHCP server is configured properly for network parameters.
At this point, depending on whether you have configured your Sun Ray servers to
run on a LAN or a dedicated interconnect, one of the following icons may display:
182 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Startup Wait for DHCP Information
▼ Actions to take:
1. For LAN configurations with other (non-Sun Ray) DHCP services but no bootp
proxy agent, verify the DHCP server and the Sun Ray vendor tags.
2. For routed configurations, verify that the bootp proxy agent is configured
correctly in the Sun Ray appliance’s subnet and that it points to one of the Sun
Ray servers in the failover group.
3. For non-routed private interconnect configurations, the Sun Ray server also
performs the functions of a DHCP server. Verify that it is configured properly for
DHCP services.
When DHCP has finished, the Sun Ray appliance tries to connect to a Sun Ray server
and the authentication manager that is running on that server.
Appendix 183
Waiting to Connect to Authentication Manager
Definition: The appliance has received its initial
parameters from DHCP but has not yet connected to the
Sun Ray Authentication Manager. This icon is displayed
as part of the normal startup phase and is usually
displayed for only a few seconds.
2. Make sure that the authentication manager can be reached from the IP address
assigned to the appliance.
The utquery command displays the parameters a Sun Ray appliance has received.
If utquery fails to display an AuthSrvr parameter, the DHCP server for Sun Ray
parameters may not be reachable or may not be configured properly. Confirm that
the DHCPServer and INFORMServer values are appropriate. If not, look at your
bootp relay configurations and DHCP server configurations for network and Sun
Ray parameters. For details of these parameters, see the utquery man page.
# /opt/SUNWut/sbin/utdesktop -l -w
184 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
▼ To Kill a Hung Session
● As superuser, type:
# /opt/SUNWut/sbin/utsession -k -t token
Firmware Download
Downloading PROM Software
▼ Actions to take:
1. Wait until the download is complete.
Downloading and saving the new PROM software usually takes less than a minute.
If you interrupt the download, the appliance has to download new PROM software
the next time it reboots.
If the firmware download fails, the following syslog message indicates that the
barrier level has been set to prevent Sun Ray appliances with 2.0 firmware from
automatically downloading an earlier version of the firmware:
Note – For LAN configurations, the minimum barrier level is 200. For more
information on barrier levels, see “Firmware Barrier” on page 109.
Appendix 185
Saving PROM Software
Definition: The appliance has just downloaded new
PROM software from the Sun Ray server and is saving it
to the appliance’s PROM.
Icon 3
▼ Actions to take:
● Wait until the download is done.
Downloading and saving the new PROM software usually takes less than a minute.
If you interrupt the download, the appliance has to download new PROM software
the next time it reboots.
▼ Actions to take:
1. Check the messages file /var/opt/SUNWut/log to verify the version number.
Bus Busy
Sun Ray USB Bus Busy
186 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
No Ethernet
No Ethernet Connection
▼ Actions to take:
1. Check that the Ethernet cable is correctly plugged in to the back of the appliance
and the other end is plugged into the correct switch or network outlet.
2. If the appliance is connected through a hub or switch, make sure that the hub or
switch is on and configured correctly.
Ethernet Address
Definition: This OSD, shows the Ethernet address, the
currently assigned IP address, the currently connected
server, the encryption status, and the DHCP state. To
display it, press the three audio volume keys
simultaneously.
Tip – To get the same effect on non-Sun keyboard, disconnect and reconnect the
Ethernet wire.
Link speed is also indicated (for example, 10F, 10H,100F, 100H). F stands for full
duplex, and H stands for half duplex. 10 stands for 10 Mbps, and 100 for 100 Mbps.
FIGURE A-1 Ethernet Address OSD with Different Encryption and Authentication States
Appendix 187
Session Connection Failures
The following icons are displayed when there might be a security breach.
Session Refused
Session Refused
▼ Actions to take:
1. Check the client’s firmware version.
This error may occur with firmware versions earlier than 2.0 if the server is
configured for hard security mode.
Definition: The Card Read Error OSD icon appears whenever the
firmware is unable to read the card due to one of the following
causes:
188 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
■ The card is malfunctioning.
■ The card is of a type that the firmware is not configured to read.
■ There is an error in the configuration for reading this type of card.
▼ Actions to take:
1. Upgrade the firmware.
Definition: The Access Denied OSD icon appears when the current
authentication policy denies access to the presented token.
Specifically, this icon is displayed if a disabled card has been
inserted into an appliance.
The Sun Ray administration model has seven user session types:
■ Default—Normal user login
■ Register—User self-registration
■ Kiosk—Anonymous user operation
■ Insert card—User smart card required
■ Card error—Unrecognized user smart card type
■ No entry—User’s smart card token is blocked
■ Session Refused—The server refuses to grant a session to a client that does not
meet the server’s security requirements
The first three session types have normal login processes. When there is a problem,
the administrator should examine:
■ Sun Ray Server configuration files
Appendix 189
Caution – Sun Ray Server Software modifies certain system configuration files. In
most cases, these changes are identified with SRSS-specific comments. Please do not
change these modifications.
Although the last four session types display icons on the Sun Ray appliance, they do
not have login processes at all. The icons indicate that the user must take steps
before a successful login is possible. If the user immediately removes and reinserts
the smart card, the icon disappears, but the Wait for Session OSD remains.
These last four session types and their OSDs should not cause alarm. The user can:
■ Insert a recognized smart card in the correct orientation
■ Ask the Sun Ray administrator to grant access
■ Ask the Sun Ray administrator to download the correct firmware
This OSD represents the transition state for the Sun Ray
appliance. If it is displayed for an extended period, there
is probably no X Window server running.
Note – The current wait icon is a white “X” cursor. In earlier releases, the wait icon
was displayed as a green newt cursor.
Tip – If you suspect that the configuration files have been corrupted, please see “To
Determine the Integrity of the Configuration Files” on page 49 in the Sun Ray Server
Software 2.0 Installation and Configuration Guide.
190 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
The Xsun server is indirectly started by the dtlogin daemon. In the process of
starting the Xsun server, the dtlogin daemon reads two configuration files:
■ /etc/dt/config/Xservers
■ /etc/dt/config/Xconfig
If, after several retries, the Xsun process does not start, the dtlogin daemon just
gives up. The problem can usually be traced back to an older version of the
dtlogin daemon or the configuration files for the dtlogin daemon.
The dtlogin daemon has been part of the Solaris operating environment since long
before Sun Ray Server Software existed. The Sun Ray administration model uses the
dtlogin daemon in new ways, and certain bugs in the dtlogin daemon have
become apparent. Patches to fix these bugs in the dtlogin daemon are available.
Patches
For the latest information regarding Sun Ray Server Software patches, check:
http://www.sun.com/products/sunray/patches.html
Solaris operating environment patches and other software patches are available at:
http://access1.sun.com
For example:
Appendix 191
Message components are defined as follows:
■ timestamp format:
year.month.day hours:minutes:seconds
■ thread_name
There are several different types of threads. The most common thread handles
appliance authentication, access control, and session monitoring. These threads
are named “worker” plus number. The Worker# thread names are reused when a
connection terminates. Other threads are:
■ SessionManager#—Communicate with utsessiond on behalf of a Worker#
thread.
■ AdminJobQ—Used in the implementation to wrap a library that would not
otherwise be thread-safe.
■ CallBack#—Communicate with applications such as utload.
■ WatchID—Used to poll data/terminals from connections
■ Terminator—Cleans up terminal sessions
■ Group Manager—Main group manager thread
■ message_class
Messages with the same thread name are related. The exception occurs when a
Worker# thread disconnects an appliance and then purges the connection
information from memory. After a Worker# DESTROY message, the next use of
that Worker# thread name has no relation to previous uses of the thread name (in
other words, the thread names are reused).
■ CLIENT_ERROR—Indicates unexpected behavior from an appliance. These
messages can be generated during normal operation if an appliance is
rebooted.
■ CONFIG_ERROR—Indicates a system configuration error. The Authentication
Manager generally exits after one of these errors is detected.
■ NOTICE—Logs normal events.
■ UNEXPECTED—Logs events or conditions that were not anticipated for normal
operation but are generally not fatal. Some of these errors should be brought to
the attention of the Sun Ray product development team.
■ DEBUG—Only occurs if explicitly enabled. Beneficial to developers. Debug
messages can reveal session IDs, which must be kept secret to ensure proper
security.
192 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
TABLE A-4 Error Message Examples
Appendix 193
Audio
Each time a user logs in to a Sun Ray appliance, a script automatically assigns the
$AUDIODEV environment variable to that session. One utaudio(1)real-time process
is assigned to each session. Refer to the audio(7i)man page for more information.
If your application uses /dev/audio, the Sun Ray server software reroutes the
audio signal appropriately.
Audio Malfunction
If audio features are malfunctioning:
2. Bring up utsettings:
% utsettings
3. Verify that audio output is selected properly, e.g., for headphones or speakers.
194 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
5. Verify that Mute is not selected.
Some applications are hard-coded to use /dev/audio for output. Sun Ray System
Software provides a redirection library that you can use to correct this behavior.
1. Get the latest Java Communications API (javax.comm api version 2.0.2 and
above) from
http://java.sun.com/products/javacomm/
4. Click OK.
Tip – If the ports are not shown correctly in the Serial Port drop-down menu, close
the application and hot plug the device, then start the application again.
Appendix 195
Performance Tuning
Some applications, such as intensive 3-D visual simulations, may run very slowly on
Sun Ray. Other applications, such as pseudo-stereo viewers using double-buffering,
or high-frequency dynamic color table flips on 8-bit visuals, do not produce the
expected visual result.
General Configuration
You can usually improve performance by configuring /etc/system shared memory
segment parameters. The exact settings depend on application demands and the
number of Sun Ray users, but a convenient starting point is:
Due to the nature of the Xinerama (single virtual X display) mode of multihead, the
system shared memory requirements may be even higher. To get reasonable
performance, the shmsys:shminfo_shmmax parameter must be at least:
Applications
Placing the user’s interactive applications, such as Netscape or StarOffice, or PC
interoperability tools, such as Citrix or Tarantella, on the Sun Ray server usually
helps performance by reducing network load. The applications benefit from faster
transport of commands to the Sun Ray’s X server.
196 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Sluggish Performance
Sluggish Sun Ray server performance or excessive disk swapping is an indication
that the Sun Ray server is under-provisioned. Under these circumstances, there is
not enough virtual memory available to start an X Window server instance for a
user’s session.
The solution in this situation is to add more memory or increase the size of the swap
partition. In other situations, network load or packet loss may be too high. In very
rare cases, network cables or switch equipment may be defective.
# vmstat 5
If the Sun Ray appliance is unable to read DDC data from the monitor, then it
defaults to 640 x 480 pixels.
4. Use the utresadm to set persistent display setting to override the default.
Appendix 197
Old Icons (Hourglass with Dashes Underneath)
Appear on Display
If the old, pre-2.0 icons appear on the display, either the DTU’s firmware has not
been upgraded or it is failing.
2. Follow the procedure to upgrade the firmware. See the Sun Ray Software 2.0
Installation and Configuration Guide.
1. Download the latest Java Communications API (javax.comm API version 2.0.2 and
above)
3. Click the Change Synchronization Settings icon and select the appropriate port (to
which the Palm cradle should be connected), then click OK.
4. If the ports are not correctly shown in the Serial Port drop down menu, close the
application and hot plug the device.
Design Tips
■ Avoid drawing into off-screen memory and then copying large areas to the screen.
This technique produces slow Sun Ray performance.
■ GXcopy mode is usually the fastest drawing mode.
■ To display large images, use shared memory pixmaps, if possible.
■ Opaque stipple patterns are faster than transparent stipples.
■ Opaque (image) text is faster then other text.
198 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Troubleshooting the Sun Management
Center
Usually, if all the software is installed, the agent for Sun Ray monitoring starts
automatically.
Appendix 199
2. If the Sun Ray module is listed, highlight it and then click the Load button.
This loads the module and moves it to the Modules with Load Status list.
3. If the Sun Ray module is disabled, highlight it and then click the Enable button.
# /opt/SUNWut/sbin/utsunmc
This command adds the module to the Sun Management Center and restarts the
agent if it is active.
If the Sun Management Center agent is running, wait then rcheck the Detail window.
# /opt/SUNWsymon/sbin/es-start -a
200 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
APPENDIX B
Controlled Browser
201
▼ To Install the Controlled Browser
1. If you have already mounted the Sun Ray Server Software 2.0 CD-ROM locally or
from a remote server or if you extracted the ESD files to an image directory, begin
at Step 4.
# cd /cdrom/cdrom0
# cd Supplemental/Controlled_Browser/Solaris_8+/Packages
# ./cbinstall
The controlled browser is installed and set as a critical application for CAM sessions.
Note – When you remove Sun Ray Server Software, you must first remove the
controlled browser if it has been installed.
1. If you have already mounted the Sun Ray Server Software 2.0 CD-ROM locally or
from a remote server or if you extracted the ESD files to an image directory, begin
at Step 4.
202 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
3. Insert the Sun Ray Server Software 2.0 CD-ROM.
If a file manager window opens, close it. The file manager CD-ROM window is not
necessary for this procedure.
# cd /cdrom/cdrom0
# cd Supplemental/Controlled_Browser/Solaris_8+/Packages
# ./cbinstall -u
To maintain security, since these users are not authenticated, they have access only
to specified applications confined to the directory tree below the chroot directory.
The chroot environment is analogous to a Web server’s document root in that users
of the environment are confined to the directory tree below the chroot directory.
The chroot environment creates a subdirectory that appears as the root directory
for a given process or set of processes. The browser and all subprocesses that it may
spawn are run in this restricted environment.
Note – This controlled browser does not address general network security, Java
applet security, or plug-in security.
Appendix 203
▼ To Setup the Controlled Browser in Control
Access Mode Administration
1. Start the Administration Tool.
2. Click the arrow to the left of Controlled Access Mode to expand the navigation
menu.
Note – This menu selection appears only after a Controlled Browser is installed.
204 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
■ If you select default, the session starts with this application but does not restart if
it dies. This application is also available on the menu. A user can restart the
application by using the menu.
5. In the Home Page text box, type the URL to be accessed when the browser first
starts.
6. In the Browser Window Location text field, displays the screen location in pixels.
7. The Browser Window Size text field displays the size in pixels.
8. If a proxy server is being used, click the Manual Proxy Configuration button and
set the proxy values for the controlled browser by typing the values in the text
boxes.
9. Click the Submit Changes button to save your selections in the kiosk.conf file.
Appendix 205
Browser Printing
This browser implementation has replaced the command-line print interface with a
graphical interface.
206 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
FIGURE B-4 Graphical Printing Interface
3. If there is no printer name in the Printer text box or if you wish to send your print
job to a printer other than the one listed in the Printer text box, press the Select
button.
The Select Printer dialog box, which contains a list of configured printers for your
server, is displayed.
5. Once a printer has been selected, press the Status button on the Print dialog box
to view the status of the printer.
The Printer Status dialog shows the printer name, the number of jobs queued for this
printer, and details of each of the print jobs including print job number, size of file to
print, and date stamp for this job. This information helps the user determine if
whether to print to a different printer in cases where print queues are too long or
individual print jobs on the print queue are too big.
Appendix 207
6. Enter the number of print copies required in the Copies text box.
7. If the printer selected is configured to print banners before each print job, enter a
banner name in the Banner Title text box.
The Location field cannot be edited and may contain information regarding the
location of the selected printer.
8. To print the page, press the Print button or the Cancel button to cancel print
operations
Some plug-ins, such as Macromedia Flash Player plug-in, need only to be installed
into the browser’s plug-in directory. Others require more work to install files into the
Control Access Mode user’s home directory, add lines to the browser’s mimetype
file, and setup environment variables needed before the browser is executed.
Some scripts installed for plug-ins may try to use Solaris commands under such
directories as /usr/bin and /bin. In chroot, however, these directories are not
available. To solve this problem, copy the needed commands to the
/var/opt/SUNWbb/root/bin directory.
chroot also has an automated setup mechanism to support the creation of dynamic
user environments. A UNIX user ID is selected dynamically for every new CAM
session. The home directory is created and populated with a configured set of files at
the start of the session and destroyed upon reset or exit of a session or critical
application. The sections below discuss to set the files up to populate the home
directory with respect to plug-ins and their associated helper applications.
208 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Set Up Considerations
For plug-ins and helper applications to work properly, the following might be set
up:
1. Mime types
2. Environment variables
Mime Types
The restricted runtime environment provides an interface to register mime types
with the restricted browser. A plug-in usually registers its mime type through the
plug-in API, but helper applications use the .mimetype and .mailcap files.
To register its mime types, a helper application installs a file helper.mimedef into the
/opt/SUNWbb/mime.d/ directory.
helper;flags;extentsions;mime-type;description
Note – A line may take the form of the line above, or be either empty or a comment,
in which case it begins with #. Each mime type definition must be contained in a
single line. A mime type definition cannot contain a new line.
Variable Definition
Appendix 209
TABLE B-1 Mime Type Definition Syntax (Continued)
Variable Definition
extensions exts="ext0 ext1" list of possible extensions for files of this mime type
mime-type type=mimetype/subtype
description desc="......."
Environment Variables
To provide environment variables to helper applications or plug-ins, the restricted
runtime environment uses files located in/opt/SUNWbb/appschr.d/.
These files define variables exported by the controlled browser. A line in these files
can either be empty, a comment (start with #), or can have exactly one assignment of
the following form:
VARIABLE=value
These files can be bourne or korn shell scripts that are sourced and run with the
permissions of the selected user. The following environment variables are available:
Variable Definition
This is the path seen when the browser executes the helper application or plug-in.
210 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Sometimes the install procedure puts the install path into the installed helper
application or plug-in configuration files or scripts. Then, at run-time, it tries to find
components in /var/opt/SUNWbb/root/bb/apps/helper-plugin-dir, which does not
exist in the restricted runtime environment.
# cd /var/opt/SUNWbb/root/var/opt/SUNWbb/root
# ln -s /bb bb
Tip – For setup and testing purposes, it might be a good idea to temporarily
configure xterm as an application on the CAM desktop. This aids in the testing and
configuration of the plug-ins and their helper applications, many of which use the
home directory for configuration files and directories. To avoid potential security
problems, remove xterm from the CAM desktop before the Sun Ray appliances are
ready for use.
Note – The download file names, version numbers, and installation conventions of
the plug-ins referenced may change over time.
# mkdir /var/opt/SUNWbb/root/bb/apps/Flash
2. Download the Macromedia Flash Player plug-in for the Solaris operating
environment from the Macromedia Web site and save it in the following directory:
/var/opt/SUNWbb/root/bb/apps/Flash
Appendix 211
3. Change directory, uncompress the file, and untar the file by typing:
# cd /var/opt/SUNWbb/root/bb/apps/Flash
# /usr/bin/gunzip flash_solaris.tar.gz
# tar xvf flash_solaris.tar
4. Copy the resulting files into the Netscape plug-ins directory by typing:
# cp libflashplayer.so /var/opt/SUNWbb/root/bb/apps/netscape/plugins
# cp ShockwaveFlash.class /var/opt/SUNWbb/root/bb/apps/netscape/plugins
# mkdir /var/opt/SUNWbb/root/bb/apps/temp
2. Download the Adobe Acrobat Reader for Solaris from the Adobe Web site and
save in the following directory:
/var/opt/SUNWbb/root/bb/apps/temp
3. Change directory, uncompress the file, untar the file, and install by typing:
# cd /var/opt/SUNWbb/root/bb/apps/temp
# /usr/bin/gunzip sunsparc-rs-405.tar.gz
# tar xvf sunsparc-rs-405.tar
# cd SSOLRS.install
# ./INSTALL
4. Follow the installation instructions. When prompted for the installation directory,
enter:
/var/opt/SUNWbb/root/bb/apps/Acrobat4
Note – After installation is complete, you can delete the temp directory.
212 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
5. Copy the Acrobat Reader plug-in library into the Netscape plug-in directory by
typing:
# cd /var/opt/SUNWbb/root/bb/apps/Acrobat4/Browsers/sparcsolaris
# cp nppdf.so /var/opt/SUNWbb/root/bb/apps/netscape/plugins
# /opt/SUNWbb/init.d/bbnsinit
8. Copy the following executable commands into the /bin directory of the chroot
directory by typing:
# cp -p /usr/bin/basename /var/opt/SUNWbb/root/bin
# cp -p /usr/bin/cat /var/opt/SUNWbb/root/bin
# cp -p /usr/bin/dirname /var/opt/SUNWbb/root/bin
# cp -p /usr/bin/expr /var/opt/SUNWbb/root/bin
# cp -p /usr/bin/uname /var/opt/SUNWbb/root/bin
# cp -p /usr/bin/ksh /var/opt/SUNWbb/root/bin
The executable for the helper application acroread is a script. In the script,
executable commands are used to launch the application. Since this script is
launched from the browser running under the chroot environment, these
executable commands have to be explicitly copied into the /bin directory of the
chroot directory
9. Determine what default files need to be copied into the CAM user’s home
directory by running the browser and plug-in once to see what files are copied
into the users directory.
In the case of Acrobat Reader, the files .acrorc and .acrosrch are created. The
default files can be created by having the CAM user access a PDF file through the
Controlled Browser. Once the Acrobat Reader brings up the PDF file, exit Acrobat
Reader. This writes out the .acrorc and .acrosrch file into the home directory of
the CAM user (/var/opt/SUNWbb/root/home/CAM_user_name).
Appendix 213
10. Copy the resulting files into a permanent directory by typing:
# cp .acrorc /opt/SUNWbb/config/acrobat4.acrorc
# cp .acrosrch /opt/SUNWbb/config/acrobat4.acrosrch
# chmod 644 /opt/SUNWbb/config/acrobat4.*
cp /opt/SUNWbb/config/acrobat4.acrorc $BBHOME/.acrorc
chmod 644 $BBHOME/.acrorc
cp /opt/SUNWbb/config/acrobat4.acrosrch $BBHOME/.acrosrch
chmod 644 $BBHOME/.acrosrch
# mkdir /var/opt/SUNWbb/root/bb/apps/temp
2. Download the RealPlayer for the Solaris operating environment from the Real
Web site and save it in the following directory:
/var/opt/SUNWbb/root/bb/apps/temp
3. Change directory, make the binary file executable, and execute by typing:
# cd /var/opt/SUNWbb/root/bb/apps/temp
# chmod 755 rp8_solaris27_sparc_cs2.bin
# ./rp8_solaris27_sparc_cs2.bin
4. Follow the installation instructions. When you are prompted for the installation
directory, enter:
# /var/opt/SUNWbb/root/bb/apps/RealPlayer
214 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Tip – After installation is complete, you can delete the temp directory.
5. Copy the RealPlayer plug-in libraries into the Netscape plug-in directory by
typing:
# cd /var/opt/SUNWbb/root/bb/apps/RealPlayer
# cp raclass.zip /var/opt/SUNWbb/root/bb/apps/netscape/plugins
# cp rpnp.so /var/opt/SUNWbb/root/bb/apps/netscape/plugins
/bb/apps/RealPlayer/realplay %u;;exts="ra,rm,ram";type=audio/x-pn-realaudio;desc="Realaudio"
/bb/apps/RealPlayer/realplay %u;;exts="ra,rm,ram";type=audio/vnd.rn-realaudio;desc="Realaudio"
/bb/apps/RealPlayer/realplay %u;;exts="smi";type=application/smil;desc="Realaudio"
bbhelper /bb/apps/RealPlayer/realplay %s m3u;;exts="m3u";type=audio/x-mpegurl;desc="streaming Mpeg audio"
bbhelper /bb/apps/RealPlayer/realplay %s m3u;;exts="m3u";type=audio/mpegurl;desc="streaming Mpeg audio"
7. To execute the following script to update the browser’s mime information, type:
# /opt/SUNWbb/init.d/bbnsinit
REALPLAYER_HOME=/bb/apps/RealPlayer
9. Determine what default files need to be copied into the CAM user’s home
directory by running the browser and plug-in once to see what files are copied
into the user’s directory.
In the case of RealPlayer, the files .RealNetworks_RealMediaSDK_60,
.RealNetworks_RealPlayer_60, and .RealNetworks_RealShared_00 are
created.
The ideal user session should be set up at this point. Default settings, such as
transport protocol used, proxy settings, and so on, should be set.
Appendix 215
10. Copy the resulting files to a permanent directory by typing:
# cp .RealNetworks_RealMediaSDK_60
/opt/SUNWbb/config/realplayer.RealNetworks_RealMediaSDK_60
# cp .RealNetworks_RealPlayer_60
/opt/SUNWbb/config/realplayer.RealNetworks_RealPlayer_60
# cp .RealNetworks_RealShared_00
/opt/SUNWbb/config/realplayer.RealNetworks_RealShared_00
# chmod 644 realplayer.*
cp /opt/SUNWbb/config/realplayer.RealNetworks_RealMediaSDK_60 $BBHOME/.RealNetworks_RealMediaSDK_60
chmod 644 $BBHOME/.RealNetworks_RealMediaSDK_60
cp /opt/SUNWbb/config/realplayer.RealNetworks_RealPlayer_60 $BBHOME/.RealNetworks_RealPlayer_60
chmod 644 $BBHOME/.RealNetworks_RealPlayer_60
cp /opt/SUNWbb/config/realplayer.RealNetworks_RealShared_00 $BBHOME/.RealNetworks_RealShared_00
chmod 644 $BBHOME/.RealNetworks_RealShared_00
216 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
APPENDIX C
Sun Ray relies on DHCP to obtain network parameters and Sun Ray parameters.
Network parameters include IP address, subnet mask, and router.
Sun Ray parameters enable Sun Ray devices to function normally in a Sun Ray
environment.For Sun Ray appliances to be able to discover the Sun Ray server on the
network, they need to have at least the AuthSrvr parameter delivered through
DHCP.
For a more comprehensive treatment of DHCP, see the Dynamic Host Configuration
Protocol RFC at http://www.ietf.org/rfc/rfc2131.txt?number=2131.
TABLE C-1 lists the Sun Ray parameter symbol values defined in the DHCP table. The
remainder of this appendix describes the encapsulated options.
217
TABLE C-1 Sun Ray Parameter Symbol Values (as defined in the DHCP table)
Mandatory/
Parameter Name Vendor ID Code Type Optional Comments
Intf Vendor=SUNW.NewT.SUNW, 33, ASCII, 1,0 Optional Interface used for Sun
Ray service
NewTDispIndx Vendor=SUNW.NewT.SUNW, 32, NUMBER, 4,1 Optional
LogVid Vendor=SUNW.NewT.SUNW, 28, NUMBER, 1,1 Optional Log level for video
LogUSB Vendor=SUNW.NewT.SUNW, 27, NUMBER, 1,1 Optional Log level for USB
LogNet Vendor=SUNW.NewT.SUNW, 26, NUMBER, 1,1 Optional Log level for network
LogKern Vendor=SUNW.NewT.SUNW, 25, NUMBER, 1,1 Optional Log level for kernel
LogHost Vendor=SUNW.NewT.SUNW, 24, IP, 1,1 Optional Log level for host
Sun Ray parameters are encapsulated vendor-specific options; that is, the value for
the standard DHCP vendor-specific information is an encapsulated set of options
that only the vendor equipment—the Sun Ray server, in this case—knows how to
interpret.
218 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Encapsulated Options
For each parameter name, there is a vendor ID, an option code, an option type, and
an indication as to whether the parameter is mandatory.
2b 4a 17 1d 32 2e 30 .......: .+J..2.0
0140 5f 31 39 2e 63 2c 52 45 56 3d 32 30 30 32 2e 30 _19.c,RE V=2002.0
0150 39 2e 30 36 2e 31 35 2e 35 34 21 04 68 6d 65 30 9.06.15. 54!.hme0
0160 1f 04 81 92 3a 88 15 04 81 92 3a 88 1d 01 06 1c ....:... ..:.....
0170 01 06 1b 01 06 1a 01 06 19 01 06 18 04 81 92 3a ........ .......:
0180 88 16 02 1b 61
The example begins with 0x2b=43, the DHCP option for vendor-specific
information. It has a length of 0x4a=74 bytes, which is the total number of bytes
that follow. These bytes contain the encapsulated vendor options.
Appendix 219
The next byte is 0x1f=31, which represents the FWSrvr parameter, whose function
is to indicate the IP address of the firmware TFTP server. The next byte is the length,
4, which is always be true for an IP address. The hexadecimal value is
0x81 0x92 0x3a 0x88, which corresponds to the IP address 129.146.58.136.
220 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Glossary
B
backplane bandwidth Sometimes also referred to as switch fabric. A switch’s backplane is the pipe
through which data flows from an input port to an output port. Backplane
bandwidth usually refers to the aggregate bandwidth available amongst all
ports within a switch.
barrier mechanism To prevent clients from downloading firmware that is older than the firmware
they already have, the administrator can set a barrier mechanism. The barrier
mechanism symbol BarrierLevel is defined by default in the DHCP table of
Sun Ray servers running version 2.0 or later of Sun Ray Server Software.
C
CAM Controlled access mode, also known as kiosk mode.
category 5 The most common type of wiring used in LANs. It is approved for both voice
and data (at up to 100Mhz). Also called cat 5.
client-server A common way to describe network services and the user processes
(programs) of those services.
cut-through switches The switch begins forwarding the incoming frame onto the outbound port as
soon as it reads the MAC address, while it continues receiving the remainder
of the frame.
Glossary-221
D
DHCP Dynamic Host Configuration Protocol, which is a means of distributing IP
addresses and initial parameters to the appliances.
domain A set of one or more system boards that acts as a separate system capable of
booting the OS and running independently of any other board.
E
Ethernet Physical and link-level communications mechanism defined by the IEEE 802.3
family of standards.
Ethernet address The unique hardware address assigned to a computer system or interface
board when it is manufactured. See MAC address.
Ethernet switch A unit that redirects packets from input ports to output ports. It can be a
component of the Sun Ray interconnect fabric.
F
failover The process of transferring processes from a failed server to a functional server.
FTP File Transfer Protocol. The name of the Internet protocol and the program used
to transfer files between hosts.
Glossary-222 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
G
GEM Gigabit Ethernet.
H
head Colloquial term for a screen, or display, or monitor, especially in a context
where more than one is used in conjunction with the same keyboard and
mouse, as in “multihead” feature.
hot desking The ability for a user to remove a smart card, insert it into any other appliance
within a server group, and have the user’s session “follow” the user, thus
allowing the user to have instantaneous access to the user’s windowing
environment and current applications from multiple appliances.
hot key A pre-defined key that causes something to appear on your screen. A hot key
is used to bring up the Settings screen on the Sun Ray appliance.
I
interconnect fabric All the cabling and switches that connect a Sun Ray server’s network interface
cards to the Sun Ray appliances.
Internet The largest internet in the world consisting of large national backbone nets
(such as MILNET, NSFNET, and CREN) and a myriad of regional and local
campus networks all over the world. It is a global collection of networks
connecting a wide range of computers using a common protocol to
communicate and share services.
Glossary-223
intranet Any network that provides similar services within an organization to those
provided by the Internet but which is not necessarily connected to the Internet.
IP address A unique number that identifies each host or other hardware system on a
network. An IP address is composed of four integers separated by periods.
Each decimal integer must be in the range 0-255 (for example, 129.144.0.0).
IP address lease The assignment of an IP address to a computer system for a specified length of
time, rather than permanently. IP address leasing is managed by the Dynamic
Host Configuration Protocol (DHCP). Sun Ray appliance IP addresses are
leased.
K
kiosk mode Same as CAM.
L
LAN Local area network. A group of computer systems in close proximity that can
communicate with one another through some connecting hardware and
software.
layer 2 The data link layer. In the OSI (Open Standards Interconnection) model, there
are a total of seven layers. Layer 2 is concerned with procedures and protocols
for operating the communication lines between networks as well as clients and
servers. Layer 2 also has the ability to detect and correct message errors.
local server From the client’s perspective, the most immediate server in the LAN.
login name The name by which the computer system knows the user.
Glossary-224 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
M
MAC address Media Access Control. A MAC address is a 48-bit number programmed into
each local area network interface card (NIC) at the time of manufacture. LAN
packets contain destination and source MAC names and can be used by
bridges to filter, process, and forward packets. 8:0:20:9e:51:cf is an
example of a MAC address. See also Ethernet address.
mobility For the purposes of the Sun Ray Server Software, the property of a session that
allows it to follow a user from one appliance to another within a server group.
On the Sun Ray system, mobility requires the use of a smart card or other
identifying mechanism.
multicasting The process of enabling communication between Sun Ray servers over their
Sun Ray network interfaces in a failover environment.
N
namespace A set of names in which a specified ID must be unique.
network Technically, the hardware connecting various computer systems enabling them
to communicate. Informally, the systems so connected.
network interface
card NIC. The hardware that links a workstation or server to a network device.
Glossary-225
network latency The time delay associated with moving information through a network.
Interactive applications such as voice, video displays and multimedia
applications are sensitive to these delays.
network mask A number used by software to separate the local subnet address from the rest
of a given Internet protocol address. An example of a network mask for a class
C network is 255.255.255.0.
network protocol
stack A network suite of protocols, organized in a hierarchy of layers called a stack.
TCP/IP is an example of a Sun Ray protocol stack.
non-smart card
mobility A mobile session on a Sun Ray appliance that does not rely on a smart card.
O
OSD On-screen display. The Sun Ray appliance uses small OSD icons to alert the
user of potential start-up problems.
P
patch A collection of files and directories that replace or update existing files and
directories that prevent proper execution of the software on a computer
system. The patch software is derived from a specified package format and can
only be installed if the package it fixes is already present.
port (1) A location for passing data in and out of a computer system. (2) The
abstraction used by Internet transport protocols to distinguish among multiple
simultaneous connections to a single destination host.
Glossary-226 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
S
screen flipping The ability to pan to individual screens on an appliance with a single head that
were originally created by a multihead group.
service For the purposes of the Sun Ray Server Software, any application that can
directly connect to the Sun Ray appliance. It can include audio, video, X
servers, access to other machines, and device control of the appliance.
session mobility The ability for a session to “follow” a user’s login ID or a token embedded on
a smart card.
spanning tree The spanning tree protocol is an intelligent algorithm that allows bridges to
map a redundant topology and eliminates packet looping in Local Area
Networks (LAN).
store-and-forward
switches The switch reads and stores the entire incoming frame in a buffer, checks it for
errors, reads and looks up the MAC addresses, and then forwards the complete
good frame out onto the outbound port.
subnet A working scheme that divides a single logical network into smaller physical
networks to simplify routing.
T
TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is a networking
protocol that provides communication across interconnected networks,
between computers with diverse hardware architectures and operating
systems.
thin client Thin clients remotely access some resources of a computer server, such as
compute power and large memory capacity. The Sun Ray appliances rely on
the server for all computing power and storage.
Glossary-227
time-out value The maximum allowed time interval between communications from an
appliance to the Authentication Manager.
token In the Sun Ray system, a token must be presented by the user. It is required by
the Authentication Manager to consider allowing a user to access the system. It
consists of a type and an ID. If the user inserted a smart card, the smart card’s
type and ID are used as the token. If the user is not using a smart card, the
appliance’s built-in type (pseudo) and ID (the unit’s Ethernet address) are
supplied as the token.
U
URL Uniform Resource Locator. A standard for writing a textual reference to an
arbitrary piece of data in the World Wide Web (WWW). The syntax of a URL is
protocol://host/localinfo where protocol specifies a protocol to use
to fetch the object (like HTTP or FTP), host specifies the Internet name of the
host on which to find it, and localinfo is a string (often a file name) passed
to the protocol handler on the remote host.
user name The name a computer system uses to identify a particular user. Under UNIX
this is a text string of up to eight characters composed of letters (a-z and A-Z),
digits (0-9), hyphens (-), and underscores (_) (for example, jpmorgan). The first
character must be a letter.
V
virtual frame buffer A region of memory on the Sun Ray server that contains the current state of a
user’s display.
Glossary-228 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
W
work group A collection of associated users who exist in near proximity to one another. A
set of Sun Ray appliances that are connected to a Sun Ray server provides
computing services to a work group.
X
X server A process which controls a bitmap display device in an X window system. It
performs operations on request from client applications.
Glossary-229
Glossary-230 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
Index
231
monitoring, 123 C
setting, 120
C, 23
Tool Tip window, 125
values, 121 Cabling
fiber-optic, 12
AltAuth, 218
CAM, 22, 148
Applet
security, 203 CDE
locking the screen, 27
appliance, 34
adding to be monitored, 131 CDE toolbar, 136, 141
deleting to be excluded, 131 central registration, 5
Hot Desking to a multihead group, 142 chroot, 208
multihead feature, 135 Citrix, 196
multihead group, 136 client
Application authentication, 97
adding, 149 code
critical, 204 DHCP option, 219
default, 204 command
menu, 204 utadm, 160, 166
ARCFOUR, 97 utcapture
attacks data elements, 34
man-in-the-middle, 98 utconfig, 135, 169, 176
Attribute Editor, 127 utmhconfig, 136
AUDIODEV environment variable, 194 utreplica, 169
authentication, 97 utswitch, 21
server, 98 utxconfig, 135
Authentication Manager, 4, 34, 38, 142, 162, 166 commands
configuration file, 167 utadm, 22
flowchart for primary appliance, 142, 143 utadm -r, 24
interacting with Session Manager, 5 utaudio, 194
restarting, 168 utdetach, 89, 91
utfwadm, 25
AuthPort, 218
utpolicy, 96
AuthSrvr, 184, 217, 218 utpolicy -i clear, 22
Automatic restart, 204 utrestart -c, 22
auto-size feature, 137 utwall, 94, 96
configuration
B security, 98, 99
bandwidth configuration data
limited backplane, 10 DHCP, 22, 93, 159, 163
barrier console, 114
firmware, 109, 185 controlled access mode
BarrierLevel, 218 adding or editing applications, 73
bidirectional encryption, 98 configuring, 71
bootp, 105, 108 selecting additional applications, 72
Browser Critical application, 204
proxy settings, 205 crontab, 169
cursor
232 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
green newt, 190 E
X, 190
encapsulated options, 219
D encryption
algorithm, 97
daemons bidirectional, 98
Sun Ray Service panel, 129 downstream only, 98
Data Store, 169 upstream only, 98
DCHP errors
state codes, 181 out of memory, 22, 93, 159, 163
Default application, 205 escape tokens, 93
departments, 13 Ethernet switch, 11
desktopID, 35
desktops F
displaying current properties, 48 Failover
editing a single desktop’s properties, 50 controlled access mode, 155
searching for, 49
failover
viewing, 48
address allocation formula, 160
viewing properties of current user, 49
configuring DHCP, 162
Desktops panel, 131 group, 113, 157
device primary server, 169
directory, 79 removing replication configuration, 170
links, 81 secondary server, 170
node ownership, 81 Group Manager module, 159
nodes, 80 principle components needed, 159
USB, 80 server IP addresses, 161
DHCP, 160, 184 setting up group, 169
configuring for failover, 162 taking servers offline, 177
parameters, 217 failover group, 13, 111
DHCP configuration data, 22, 93, 159, 163 administration status, 171
DHCP server, 163 monitoring servers, 116
DHCP servers, 159 recovery procedures, 173
viewing status, 171
DHCPACK, 219
failover groups, 159
dhcpmgr, 111
filling station, 109
DHCPServer, 184
firmware barrier, 109
dhtadm, 110
firmware module, 3
dhtadm -R, 23
PROM version management, 25
display resolution
FWSrvr, 218, 220
auto-size feature, 137
on workgroup monitors, 137
G
DSA, 97
dtlogin, 191 gmSignature, 173, 176
dtlogin screen, 4, 88 green newt cursor, 190
dtprofile file, 27 green newt icon, 190
duplicate IP addresses, 22, 93, 159, 163 Group Manager
Dynamic Host Configuration Protocol (DHCP), 3 keepalive message, 166
Index-233
load balancing, 2, 168 Internal database, 169
redirection, 19, 167 Intf, 218
using Authentication Manager properties, 167 IP address
Group manager, 166 duplicate, 22, 93, 159, 163
group manager
keepalive message, 166 K
group manager module, 166 keepalive message, 166
group signature, 17, 172 key combination, 91
setting up, 176
kiosk.conf, 146, 147, 155
GXcopy, 198
kiosk.start, 146
H L
hacking
layer 2 switch, 11
man-in-the-middle attacks, 98
LDIF, 174, 175
hard security mode, 98
load balancing, 2, 168
Hot Desk, 137, 142
turning off, 168
Hot Desking, 81, 87, 194
log files
hot key, 28 examining, 55
changing setting, 31 viewing messages logs, 56
changing setting site-wide, 30
LogAppl, 218
detaching a mobile session, 90
entry, 29 LogHost, 218
values, 29 LogKern, 218
hotkey key combination, 91 LogNet, 218
LogUSB, 218
I LogVid, 218
icon messages
OSD, 180
M
IEEE802.MACID directory, 79 managed object, 113
INFORMServer, 184 desktops, 131
Interconnect panel, 130
Interconnect, 11
monitoring, 126
interconnect, 11, 163
Sun Ray system, 126
boost power of, 11
man-in-the-middle attack, 98
implementing a Sun Ray, 10
Menu application, 204
interconnect fabric, 9
adding an interface, 23 message_class, 192
deleting an interface, 23 modules, 4
departments, 13 Registered, 5
failover group, 13 StartSession, 5
managing, 22 monitoring programs
printing configuration, 24 CA Unicenter, 132
removing an interface, 25 HP OpenView VPO, 132
workgroups, 12 Tivoli TMS, 132
interconnect IP address, 22, 93, 159, 163 monitors
Interconnect panel, 130 display resolution, 137
multicast
234 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
IP, 111 P
multihead, 196 packet loss
administration tool, 137 utcapture, 34
creating a new group, 138
packets
group, 136, 143
out-of-order, 104
Hot Desking to an appliance, 142
screen display, 136, 137 panel
auto-size feature, 137 Desktops, 131
turning on policy from command line, 138 Interconnect, 130
turning on policy with administration tool, 138 Sun Ray System, 127
multihead feature, 135 panning, 137
multihead groups parallel peripherals, 79
viewing all, 52 PDA synchronization, 84
PDASync, 195
N peripherals
Netscape, 196 parallel, 79
serial, 79
network
adding an interface, 23 persistent settings (monitor), 18
deleting an interface, 23 policies, 4
removing an interface, 25 removing old, 22
Network security, 203 power cycle, 3
NewTBW, 218 power–on self test (POST)
NewTDispIndx, 218 firmware module, 3
NewTFlags, 218 Primary server, 169
NewTVer, 218 printer
printing to attached, 82
non-secure session, 98
printers
NSC mobile session, 87, 96
non-PostScript, 84
NSC mobile session login, 88 setting up, 82
NSCM session, 88 printing, 82
disconnecting, 90
PROM, 25
enabling from Administration Tool, 94
enabling from command line, 96 protocol
logging in to, 89 Spanning Tree, 111
ps, 7
O pseudo-token, 93
openGL, 196
Q
option code, 219
options QuickLogin, 88
encapsulated, 219
vendor-specific, 218 R
OSD rdate, 169
icon messages, 180 redirection
understanding, 179 Group Manager, 19, 167
out of memory error, 22, 93, 159, 163 redundant failover group, 160
out-of-order packets, 104 Registered module, 5
Index-235
Remove replication, 170 changing the probe order, 59
restart, 138 deleting, 60
restricted runtime environment viewing or listing configured, 57
chroot, 208 viewing the probe order, 58
runtime environment Smart Card Frameworks, 56
chroot, 208 SNMP, 114
soft security mode, 98
S Spanning Tree protocol, 111
screen flipping, 142 spoofing, 98
Secondary server, 169 StarOffice, 196
secure session, 98 StartSession module, 5
security state codes
configuration, 98, 99 DHCP, 181
interconnect, 97 status
session, 99 security, 100
security mode subnet broadcast, 111
hard, 98 Sun Directory Services (SunDS) daemon, 26
soft, 98 Sun Management Center (Sun MC), 113
security status, 100 Sun MC
selectAtLogin, 20 additional modules, 119
self-registration, 5, 96 additional requirements with Sun Ray
serial peripherals, 79 module, 115
server components, 114
authentication, 97, 98 creating an object, 120
installing, 116
Server addresses, 161
notifying when parameter reached, 114
Server-to-switch bandwidth, 12 setting up monitoring environment, 119
service, 5 Sun Ray
session, 5 Data Store, 169
changes, 7 Sun Ray administration data, 38
connection failures, 101 changing, 40
finding, 75
Sun Ray administration database
managing, 75
users
secure vs non-secure, 98
adding a token ID, 68
viewing, 77
adding a user with token ID, 66
session change, 82 deleting, 63
Session Manager, 1, 5 deleting a token ID, 69
settings displaying current properties, 65
monitor editing properties, 67
persistent, 18 enabling or disabling a token ID, 69
shared memory, 196 finding, 69
Short Cut, 91 getting a token ID from a token reader, 70
simple failover group, 159 viewing by ID, 62
viewing by name, 63
Simple Network Management Protocol, 114
viewing current, 65
smart card, 26
Sun Ray appliance, 1, 2, 34
adding, 59
236 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003
finding sessions, 75 refreshing, 127
firmware module, 3 setting alarms, 127
locking the screen, 26 SunMC, 113
managing sessions, 75 Health Monitor module, 119
multihead feature, 135 Process Monitoring, 119
multihead group, 136 SUNWesagt package
shield users, 11 to verify installation on Sun Ray, 118
starting a print queue, 82 SUNWsynom, 119
updating and upgrading, 25
SUNWutesa package
viewing sessions, 77
removing, 134
Sun Ray daemons, 128
Switch
Sun Ray interconnect, 163 high-capacity, 11
server IP addresses, 161 low-capacity, 11
Sun Ray module switch
activating for troubleshooting, 200 basic types of 100 Mbps, 11
loading, 199 layer 2, 11
requirements, 115
syslog, 185
troubleshooting, 199
Sun Ray node
T
creating, 113
Sun Ray server, 1, 34 Tarantella, 196
device directory, 79 TCP, 162
installing software, 116 TerminalGroup policy, 142
installing the software, 116 TFTP, 220
monitoring with CA Unicenter, 132 thread_name, 192
monitoring with HP OpenView VPO, 132
token reader
monitoring with Tivoli TMS, 132
creating, 44
network interfaces, 12
getting a token ID from, 70
performing standard software installation, 118
locating, 44
software, 3
troubleshooting
software daemons, 114
activating the Sun Ray module, 200
viewing all multihead groups, 52
loading the Sun Ray module, 199
Sun Ray Services
resetting, 43
U
restarting, 43
Sun Ray services, 113 ulimit, 148
Sun Ray Services panel Uplink ports, 12
daemons, 129 utaction, 16
Sun Ray Settings utadm, 16, 23, 108
changing, 51 utadm command, 22, 160
Sun Ray system, 113 available options, 166
computing model, 1 utadm -r command, 24
monitoring feature, 114 utaudio command, 194
security, 14 utauthd, 193
software requirements, 115
utcapture, 16, 104
Sun Ray System panel
utcapture command
displaying, 126
data elements, 34
Index-237
utcard, 16, 32 utslaunch.properties files, 91
utconfig, 16 utsunmc, 18, 134
utconfig command, 135, 169, 176 install, 117
utcrypto, 16, 98 utsunmcinstall, 18, 134
utdesktop, 16 utsvc, 18
utdetach, 16, 29 utswitch, 18, 19, 82
utdetach command, 89, 91 utswitch command, 21
utdsd daemon, 26 utuser, 18
utdssync, 16 utwall, 18
utfwadm, 16 utwall command, 94, 96
utfwadm command, 25 utxconfig, 18, 137
utfwsync, 16 utxconfig command, 135
utglpolicy, 21 utxset, 18
utglpolicy (decremented in 2.0), 17
utgroupsig, 17, 177 V
utgstatus, 17 vendor-specific options, 218
utidle, 193 virtual frame buffer, 2
utinstall, 17 VLAN, 12
utkiosk, 17 implementing a Sun Ray interconnect, 10
utload, 193 multiple configuration, 10
utmhadm, 17, 135
W
utmhconfig, 17, 135
utmhconfig command, 136 workgroups, 12
utmhscreen, 17
X
utpolicy, 17, 21, 22, 148
utpolicy command, 96 X cursor, 190
utpolicy -i clear command, 22 Xconfig, 191
utpreserve, 17 XINERAMA, 136, 141
utpw, 17 Xinerama, 196
utquery, 17, 184 xinitrc file, 27
utrcmd, 17 Xservers, 191
utreader, 17, 21 Xsun, 191
utreplica, 17, 169 xterm, 211
utreplica command, 169
utresadm, 18, 28
utresdef, 18
utrestart, 18, 21, 138
utrestart -c, 22
utselect, 18, 19, 82, 167
utsession, 18
utsessiond, 7, 192
utset, 18
utsettings, 18, 28, 29, 31
238 Sun Ray Server Software 2.0 Administrator’s Guide • February 2003