Sun Ray Server Software 4.2 Administration Guide
Sun Ray Server Software 4.2 Administration Guide
2 Administration Guide
Contents
Sun Ray Server Software supports LAN and low-bandwidth WAN deployment, integrated VPN capability, and many USB peripheral devices, even
when the Sun Ray DTU is located behind a NAT gateway.
The Sun Ray Connector for Windows Operating Systems manages connections from Sun Ray DTUs to user sessions running on Microsoft Windows
Terminal Servers, including enhancements for improved video playback. It is described in the Sun Ray Connector for Windows OS, Version 2.2
Information Center.
When used in conjunction with both the Sun Ray Connector for Windows and the Sun Virtual Desktop Connector, Sun Ray Server Software helps to
enable access to multiple virtual desktops from Sun Ray DTUs. This capability is described in the Sun Virtual Desktop Connector Installation and
Administration Guide.
Computing Model
Other client-server models typically use combinations of remote and local operating systems, applications, memory, and storage, but the Sun Ray
computing model moves all computing to a server. Instead of running applications, storing data, and doing computation on a desktop device like a
PC, the Sun Ray model simply passes input and output data between Sun Ray DTUs and the Sun Ray server, where the operating system and
applications are located.
Almost any Sun server with sufficient capacity can be configured as a Sun Ray server as long as it runs a supported version of the Solaris operating
system or one of the supported flavors of Linux. See the SRSS 4.2 Release Notes for the current list of supported operating systems and versions.
Every Sun Ray DTU includes a smart card reader. The industry standard PC/SC-lite API is included for developers who want to encode custom
applications or other information in their users' smart cards. Custom applications are frequently used to provide the following solutions:
Sun Ray DTUs have no local disks, applications, or operating systems and are therefore considered stateless. This setup is what makes them true thin
clients. Stateless devices are inexpensive to maintain because they do not require administrators or technicians to install, upgrade, or configure
software or to replace mechanical components on the desktop.
Note
The Sun Ray DTU contains a firmware module that performs a small set of tasks: it sends keyboard and mouse events and displays
pixel data. If a desktop device contains an operating system that can execute code at the request of a user, it has state and it is not
a true thin client. This type of device requires updating and maintenance at the desktop rather than server level and it is
susceptible to viruses. Sun Ray DTUs update their firmware without user or administrator intervention.
Sun Ray DTUs are also extremely secure. For instance, managing USB mass storage devices, that is, controlling the ability to enable or disable their
use, is done at the server or group level. This ability enables sites with particular security or intellectual property concerns to eliminate many of the
risks imposed by PCs and other fat clients, which rely on local operating systems, local applications, and local data caches. Critical data can be
compromised or lost when the physical device hosting the "fat" client is stolen or damaged.
A Sun Ray session is a group of services controlled by the Session Manager and associated with a user through an authentication token. The sessions
reside on a server rather than on the desktop. Because Sun Ray DTUs are stateless, a session can be directed or redirected to any Sun Ray DTU on the
appropriate network or subnetwork when a user logs in or inserts a smart card. Although the session continues to reside on a server, it appears to
follow the user to the new DTU. This functionality, called session mobility, enables hotdesking, the ability of users to access their sessions from any
DTU on their network. Hotdesking, including non-smart card session mobility (NSCM), is discussed in About Hotdesking. In addition, regional
hotdesking promotes hotdesking among server groups, letting users access their sessions across a wider domain. A new security enhancement, called
Remote Hotdesk Authentication (RHA), requires SRSS-based authentication before users can reconnect to existing sessions.
Most large Sun Ray implementations include at least one failover group to ensure uninterrupted service whenever a server is off-line. When a failover
group is configured, Sun Ray Server Software optimizes performance by spreading the computing load among the servers in the group. Failover
groups and related concepts are discussed in About Failover Groups.
Security Considerations
Using switched network gear for the last link to the DTUs makes it difficult for a malicious PC user or network snooper at one of the network ports
to obtain unauthorized information. Because switches send packets only to the proper output port, a snooper plugged into another port receives no
unauthorized data. If the server and wiring closet are secure, the last step is switched, and the DTU is plugged directly into the wall jack, then
intercepting communications between the server and the DTU is very difficult.
Sun Ray Server Software encryption features also help to protect sensitive data by providing options to encode keyboard input and display traffic. In
addition, Remote Hotdesk Authentication (RHA), requires SRSS-based authentication before users can reconnect to existing sessions.
24-bit, 2-D accelerated graphics up to 1920 x 1200 resolution at 70 Hz (640 x 480 at 60 Hz is the lowest resolution)
Multichannel audio input and output capabilities
Accelerated video output, handled by the Sun Ray Server Software for Sun Ray 1 series DTUs and by DTU hardware in newer Sun Ray 2
series DTUs
Smart card reader
USB ports that support hot-pluggable peripherals
Serial port for the Sun Ray 170 and later models
NAT gateway device support
Integrated, routerless VPN capability on Sun Ray 2, 2FS, 270 and later models
EnergyStar compliance
No fan, switch, or disk
Very low power consumption
The DTU acts as a frame buffer on the client side of the network. Applications run on the server and render their output to a virtual frame buffer.
The Sun Ray Server Software formats the rendered output and sends it to the appropriate DTU, where the output is interpreted and displayed.
From the point of view of network servers, Sun Ray DTUs are identical except for their Ethernet MAC address. If a DTU ever fails, it can easily be
replaced.
An IP address is leased to each Sun Ray DTU when it is connected and can be reused when the DTU is disconnected. IP address leasing is managed by
the Dynamic Host Configuration Protocol (DHCP). In cases where separate DHCP servers already exist on a network that supports Sun Ray DTUs,
these servers can be used for tasks such as assigning IP addresses and network parameters to the DTUs. Separate DHCP servers are not required,
however, because they require static IP addresses, Sun Ray servers cannot be DHCP clients. These considerations are discussed in Sun Ray DTU
Initialization Requirements Using DHCP.
Multihead Displays
Sun Ray Server Software supports the use of multiple displays connected to a single keyboard and mouse. This functionality is important for users
who need to monitor many applications or systems simultaneously or to accommodate a single application, such as a large spreadsheet, across
multiple screens. To use multiple screens, the administrator sets up multihead groups, consisting of two or more DTUs, for those users who need
them. Administration of multihead groups is explained in Managing Multihead Configurations.
Firmware Module
A small firmware module in each Sun Ray DTU can be updated from the server. The firmware module checks the hardware with a power-on self test
(POST) and initializes the DTU. The DTU contacts the server to authenticate the user, and it also handles low-level input and output, such as
keyboard, mouse, and display information. If a problem occurs with the DTU, the module displays an on-screen display (OSD) icon to make it easier
to diagnose. OSD icons are described in SRSS Troubleshooting Icons.
An enhanced version of the DTU firmware enables configuration parameters to be entered and modified locally through a user interface, as
described in How to Set DTU Configuration Parameters (Pop-up GUI). This new functionality can be especially useful in implementations such as Sun
Ray at Home, which allows employees to connect remotely to the same sessions they use in their offices. Because this feature is not suitable for
certain other implementations such as public libraries or secure government sites, it must be downloaded explicitly and enabled by the administrator.
The default version of the DTU firmware cannot be configured locally.
Sun Ray Server Software enables direct access to all Solaris X11 applications. The Sun Ray Connector for Windows software enables Sun Ray users to
access applications on remote Windows Terminal Servers. See the Sun Ray Connector for Windows OS, Version Information Center. Third-party
applications running on the Sun Ray server can also provide access to Microsoft Windows applications and a variety of legacy (mainframe)
applications.
Authentication Manager
The Authentication Manager implements chosen policies for identifying and authenticating users on Sun Ray DTUs using pluggable components
called modules to verify user identities, and implements site access policies defined by the administrator. It also supplies an audit trail of the actions
of users who have been granted administrative privileges for Sun Ray services. The Authentication Manager is not visible to users.
The interaction between the Authentication Manager and the DTU is depicted in the following figure and works as follows:
The Sun Ray DTU contacts the AuthSrvr DHCP option's address. If that address has not been supplied or if the server does not respond, the DTU
sends a broadcast request for any Authentication Manager on its subnet. As an alternative, the administrator can supply a list of servers and only
addresses on the list are checked. The addresses are tried in list order until a connection is made.
The site administrator can construct a combination of the different modules and their options to implement a policy tailored to the site's needs. The
following table describes the commonly used modules.
Module Description
StartSession Any type of token is accepted. Users see the login window. This module is designed primarily for implementations in which
Sun Ray DTUs replace workstations or PCs.
StartxlationSession Any type of token is accepted. A temporary, transitional session is created for authentication purposes. This module is used
for login and hotdesking with Non-Smart Card Mobility (NSCM) and for hotdesking when a Remote Hotdesk Authentication
(RHA) policy is used.
Registered The token is accepted only if the token has been registered in the Sun Ray Data Store and the token is enabled. If the token
does not meet these two conditions, it is rejected. If the token is accepted, users see the login window. This module is
designed for sites that want to restrict access to only certain users or DTUs.
Users can be registered in two ways, reflecting two possible policy decisions for the administrator:
Central Registration - The administrator assigns smart cards or DTUs to authorized users and registers users' tokens
in the Sun Ray Data Store.
Self-Registration - Users register themselves in the Sun Ray Data Store. If this mode is enabled and the
Authentication Manager is presented with an unregistered token, the user is prompted with a registration window.
The user provides the same information as the information requested by a site administrator.
If self-registration is enabled, users can still be registered centrally. If a token has been registered but disabled, the
user cannot re-register the token. The user must contact the site administrator to re-enable the token.
A session consists of a group of services controlled by the Session Manager. The session is associated with a user through an authentication token.
A service is any application that can connect directly to the Sun Ray DTU. Such applications can include audio, video, Xservers, and device control of
the DTU. For example, dtmail is not a service because it is accessed through an Xserver rather than directly.
Session Manager
The Session Manager interacts with the Authentication Manager and directs services to the user. The Session Manager is used at startup for services,
for managing screen space, and as a rendezvous for the Authentication Manager.
The Session Manager keeps track of sessions and services by mapping services to sessions and binding and unbinding related services to or from a
specific DTU. The Session Manager takes authentication only from authorized Authentication Managers listed in the
/etc/opt/SUNWut/auth.permit file.
The following sequence describes how the process starts, ends, and restarts:
1. After a user's token is authenticated, the Authentication Manager determines whether a session exists for that token. If a session does not
exist, the Authentication Manager asks the Session Manager to create a session and then starts the appropriate services for the session
according to the authentication policy decisions taken by the administrator. Creating a session usually requires starting an Xserver process
for the session.
2. When services are started, they join the session explicitly by contacting the Session Manager.
3. The Authentication Manager informs the Session Manager that the session associated with the token is to be connected to a specific Sun Ray
DTU. The Session Manager then informs each service in the session that it must connect directly to the DTU.
4. The user can then interact with the session. The Session Manager mediates control of the screen space between competing services in a
session and notifies the services of changes in screen space allocation.
5. When the user removes the smart card, or presses Shift+Pause in an NSCM session, or power cycles the DTU, or is inactive for longer than
the screen lock idle timeout interval, the Authentication Manager determines that the session associated with that token must be
disconnected from that DTU. The Authentication Manager notifies the Session Manager, which in turn notifies all the services in the session
and any USB devices to disconnect.
6. When the user re-inserts the smart card, or logs in again to get access to an NSCM session, the Authentication Manager requests the Session
Manager to create a new temporary session and then uses it to authenticate the user. This is known as Remote Hotdesk Authentication
(RHA). After the user has been authenticated, the Sun Ray DTU is connected directly to the user's session.
Note
RHA does not apply to anonymous Kiosk Mode or to token readers. Sun Ray Server Software can be configured to turn this
security policy feature off.
The Session Manager is consulted only if the state of the session changes or if other services are added. When a user's token is no longer mapped to
a DTU, for example, when a card is removed, the Session Manager disconnects the services from the DTU, but the services remain active on the
server. For example, programs attached to the Xserver continue to run although their output is not visible. The Session Manager daemon must
continue running. To verify that the Session Manager daemon is running, use the ps command and look for utsessiond.
If the Authentication Manager quits, the Session Manager disconnects all the authorized sessions and requires them to be reauthenticated. These
services are disconnected but still active. If the Session Manager is disrupted, it restarts automatically. Each service contacts the Session Manager to
request reattachment to a particular session.
Xserver
Sun Ray Server Software includes the Xserver process, Xnewt, as the default Xserver. Xnewt, which supports all the latest multimedia enhancements,
is based on release 7.2 of the Xorg Community source.
Xnewt also includes the capability to use the X Rendering Extension (Render), which enables clients to use a new rendering model based on
Porter-Duff compositing. See How to Enable or Disable XRender for more details.
For information about how to configure different Xservers, see the utxconfig(1) man page.
The Sun Management Center (SunMC) software monitors managed objects in the Sun Ray system. Objects that can be managed by default include
the Sun Ray system itself, Sun Ray services, failover groups, interconnects, and desktops. Each managed object is monitored separately and has
independent alarm settings.
Sun Management Center software also monitors Sun Ray Server Software daemons that authenticate users, start sessions, manage devices, and
handle DHCP services. About Sun Ray System Monitoring describes how to use SunMC to monitor a Sun Ray system. For information about problems
with SunMC, see Troubleshooting Sun Management Center (Solaris).
Sun Ray Server Software has both a command-line interface (CLI) and an Admin GUI for administrative functions. The GUI presents a clear view of
administrative functions, with a tab-based navigational model and context-sensitive help.
Data Store
Sun Ray Server Software provides a private data store service, the Sun Ray Data Store (SRDS), for access to SRSS administration and configuration
data. The data store is useful for maintaining consistency across failover groups.
Kiosk Mode
Kiosk Mode can provide anonymous users with limited access to specific applications on Sun Ray DTUs.
Network Components
In addition to the servers, server software, DTUs, smart cards, and peripheral devices such as local printers, the Sun Ray system needs a well-designed
network, configured in one of several possible ways. Possible configurations include the following:
Dedicated interconnect
LAN (Local Area Network), with or without network routers
VLAN (Virtual Local Area Network)
VPN (Virtual Private Network)
WAN (Wide Area Network), low-bandwidth (less than 2 Mbps)
For detailed descriptions of the types of network configuration and instructions on configuring each network type, see About Sun Ray System
Networks.
Physical Connections
The physical connection between the Sun Ray server and Sun Ray clients relies on standard switched Ethernet technology. To boost the power of the
interconnect and to shield users from the network interaction taking place at every display update, 100 Mbps switches are preferred. The two basic
types of 100 Mbps switches are:
Low-capacity switches – These switches have 10/100 Mbps interfaces for each port.
High-capacity switches – These switches have 10/100 Mbps interfaces for each terminal port, and also have one or more gigabit interfaces
for attaching to the server.
Either type of switch can be used in the interconnect. These switches can be managed or unmanaged, however, some managed switches might
require configuration to be used on a Sun Ray network.
Server-to-switch bandwidth must be scaled based on end-user multiplexing needs so that the server-to-switch link does not become saturated.
Gigabit uplink ports on the switch provide high-bandwidth connections from the server, increasing the number of supportable clients. The distance
between the server and the switch can also be extended using gigabit fiber-optic cabling.
The interconnect can be dedicated and private, or a VLAN, or it can be part of the corporate LAN. For private interconnects, the Sun Ray server uses
at least two network interfaces: one for the corporate LAN and the other interface for the Sun Ray interconnect.
Even in a LAN deployment, two server network interfaces are recommended: one to connect to the general LAN and one to connect the server to
back-end services, such as file servers, compute grids, and large databases.
http://blogs.sun.com/ThinkThin
http://blogs.sun.com/ThinGuy
http://blogs.sun.com/GoThinCity
http://blogs.sun.com/bobd
Small Deployments
For smaller deployments, such as those with between 5 and 50 Sun Ray DTUs, the Sun Ray server uses a single 100BASE-T card to connect to a
100BASE-T switch. This switch, in turn, connects to the Sun Ray DTUs. With five or fewer DTUs, a wireless interconnect works acceptably at 10
Mbytes.
A 100-user departmental system, for example, consisting of a Sun Enterprise(TM) server, one gigabit Ethernet card, and two large (48-port and
80-port) 10/100BASE-T switches delivers services to the 100 Sun Ray DTUs. See the following figure.
Regional Hotdesking
Enterprises with multiple failover groups and users who move from one location to another, such as between corporate headquarters and various
branch offices, might want to configure regional hotdesking. This feature provides users with access to their sessions across a wider domain and
longer distance than a single failover group. It is described in Managing Hotdesking With Smart Cards(All Topics).
Contents
Detects the presence of other Sun Ray servers belonging to the same group
Monitors the availability (liveness) of the other servers
Exchanges information about allocation of sessions and server load for load balancing purposes
Facilitates the redirection of clients to other servers when needed
If you have Sun Ray dedicated interconnects, all services required by Sun Ray clients should be provided by multiple, redundant servers to ensure
continuity of Sun Ray service in the case of a network or system failure. For example, you must configure DHCP (IP address assignment and
configuration) or DNS (name resolution) on all servers.
Note
The failover feature cannot work properly if the IP addresses and DHCP configuration data are not set up properly when the
interfaces are configured. In particular, if any Sun Ray server's interconnect IP address is a duplicate of any other server's
interconnect IP address, the Sun Ray Authentication Manager will fail to operate properly.
Network Topologies
A failover group can consist of servers in either a common, dedicated interconnect or servers within a LAN. However, the servers in a failover group
must still be able to reach one another, using multicast or broadcast, over at least one shared subnet. Servers in a group authenticate (or "trust") one
another using a common group signature. The group signature is a key used to sign messages sent between servers in the group. This key must be
configured to be identical on each server.
When a dedicated interconnect is used, all servers in the failover group should have access to, and be accessible by, all the Sun Ray DTUs on a given
sub-net. Routers should not be attached to a dedicated interconnect. The failover environment supports the same interconnect topologies that are
supported by a single-server Sun Ray environment; however, switches should be multicast-enabled.
If multicast does not work in your network, you may use broadcast instead. To disable multicast, use the enableMulticast property in the
auth.props file. In special cases, you may configure an explicit list of group servers using utgmtarget. For example, you would use utgmtarget
to integrate servers on a different subnet into a failover group. Communication to these servers use unicast. Note that adding such a server to the
group will require a restart of the entire server group.
When a server in a failover group fails for any reason, each Sun Ray DTU connected to that server reconnects to another server in the same failover
group. The failover occurs at the user authentication level: the DTU connects to a previously existing session for the user's token. If session exists, the
DTU connects to a server selected by the load-balancing algorithm. This server then presents a login screen to the user, and the user must relogin to
create a new session. The state of the session on the failed server is lost.
Note
When multiple versions of Sun Ray Server Software are used in a failover group, the primary server should run the oldest of the
versions in use. Otherwise, the presence of a newer feature on the primary server might prevent proper replication of the Sun Ray
Data Store to secondary servers that are running older versions.
Authentication Requirements
All of the servers in a failover group should use the same authentication mechanism and name service. For example, a failover group should not use
one server with NIS authentication and other servers with NIS+ authentication.
If a failover group does have different authentication mechanisms, the servers might fail to obtain their existing non-smart card mobile (NSCM)
sessions if a username contains the same characters but the case is different, for example, ps121664, PS121664, or Ps121664.
The utconfig command sets up the Data Store for a single system initially, and enables the Sun Ray servers for failover. The utreplica command
then configures the Sun Ray servers as a failover group.
For more information about how to set up multiple failover groups that use regional hotdesking, see Managing Hotdesking.
Group Manager
Every server has a group manager module that monitors availability and facilitates redirection. It is coupled with the Authentication Manager.
In setting policies, the Authentication Manager uses the selected authentication modules and decides what tokens are valid and which users have
access.
Caution
The same policy must exist on every server in the failover group or undesirable results might occur.
The Group Managers create maps of the failover group topology by exchanging keepalive messages among themselves. These keepalive
messages are sent to a UDP port (typically 7009) on all of the configured network interfaces. The keepalive message contains enough information
for each Sun Ray server to construct a list of servers and the common subnets that each server can access. In addition, the Group Manager tracks the
last time that a keepalive message was received from each server on each interface.
The keepalive message contains the following information about the server:
The last two items are used to facilitate load distribution. For more information, see Load Balancing.
The information maintained by the Group Manager is used primarily for server selection when a token is presented. The server and subnet
information is used to determine the servers to which a given DTU can connect. These servers are queried about sessions belonging to the token.
Servers whose last keepalive message is older than the timeout are deleted from the list, because either the network connection or the server is
probably down.
Redirection
In addition to automatic redirection at authentication, you can use the utselect or utswitch command for manual redirection.
Note
The utselect GUI is the preferred method to use for server selection. For more information, see the utselect man page.
gmport
gmKeepAliveInterval
enableGroupManager
enableLoadBalancing
enableMulticast
multicastTTL
gmSignatureFile
gmDebug
gmTarget
Note
These properties have default values that are rarely changed. Only very knowledgeable Sun support personnel should direct
customers to change these values to help tune or debug their systems. Any properties that are changed must be changed for all
servers in the failover group because the auth.props file must be the same on all servers in a failover group.
Property changes do not take effect until the Authentication Manager is restarted, which you can do by performing a warm restart of the Sun Ray
Services.
Load Balancing
When a server in a failover group fails, the Group Manager on each remaining server distributes the failed server's sessions among the remaining
servers.
When the Group Manager receives a token from a Sun Ray DTU for which no server owns an existing session, it redirects the DTU. This redirection is
determined according to the result of a load-sensitive session placement lottery conducted among the servers in the group, based on each server's
capacity (number and speed of its CPUs), load, number of sessions, and other factors.
Note
Load balancing is handled automatically, as described. The administrator may choose to turn load balancing off but cannot assign
values or otherwise modify the algorithm.
Initial Configuration
1 Set up server addresses and client addresses, and how to configure DHCP. Set Up IP Addressing
2 Use the utreplica command to designate a primary server, advise the server of its How to Configure a Primary Server
administration primary status, and designate the host names of all the secondary servers.
3 Use the utreplica command to advise each secondary server of its secondary status and How to Add a Secondary Server
the host name of the primary server for the group.
4 Synchronize secondary servers with their primary server to make troubleshooting easier. Use How to Synchronize Primary and Secondary
crontab to schedule this command to execute periodically. Sun Ray Servers
5 Change the group manager signature. How to Change the Group Manager
Signature
Related Tasks
Task Description
How to Take a Server Offline and Online Explains how to take servers offline to make maintenance easier.
How to Show the Current SRDS Replication Configuration Explains how to display the current SRDS configuration.
How to Remove the Replication Configuration Explains how to remove the replication configuration.
How to View Network (Failover Group) Status Explains how to view failover group status.
Recovery Issues and Procedures Explains how to recover primary and secondary servers if they fail.
Setting Up IP Addressing
You can use the utadm command to set up a DHCP server. The default DHCP setup configures each interface for 225 hosts and uses private network
addresses for the Sun Ray interconnect. For more information, see the utadm man page.
Before setting up IP addressing, you must decide upon an addressing scheme. The following examples discuss setting up class C and class B
addresses.
The following table lists configuration settings used to configure 5 servers for 100 Sun Ray DTUs, accommodating the failure of two servers (class C)
or four servers (class B).
Servers Interface Address DTU Address Range Interface Address DTU Address Range
The formula for address allocation is: address range (AR) = number of DTUs/(total servers - failed servers). For example, in the case of the loss of two
servers, each DHCP server must be given a range of 100/(5-2) = 34 addresses.
Ideally, each server would have an address for each DTU. This setup requires a class B network. Consider these conditions:
If AR multiplied by the total number of servers is less than or equal to 225, configure for a class C network
If AR multiplied by the total number of servers is greater than 225, configure for a class B network
Note
If all available DHCP addresses are allocated, a Sun Ray DTU could request an address and still not find one available, perhaps
because another unit has been allocated IP addresses by multiple servers. To prevent this condition, provide each DHCP server with
enough addresses to serve all the Sun Ray DTUs in a failover group.
Server Addresses
Server IP addresses assigned for the Sun Ray interconnect should all be unique. Use the utadm tool to assign them.
When the Sun Ray DTU boots, it sends a DHCP broadcast request to all possible servers on the network interface. One or more servers respond with
an IP address allocated from its range of addresses. The DTU accepts the first IP address that it receives and configures itself to send and receive at
that address.
The accepted DHCP response also contains information about the IP address and port numbers of the Authentication Managers on the server that
sent the response.
The DTU then tries to establish a TCP connection to an Authentication Manager on that server. If it is unable to connect, it uses a protocol similar to
DHCP, in which it uses a broadcast message to ask the Authentication Managers to identify themselves. The DTU then tries to connect to the
Authentication Managers that respond in the order in which the responses are received.
Note
For the broadcast feature to be enabled, the broadcast address (255.255.255.255) must be the last one in the list. Any addresses
after the broadcast address are ignored. If the local server is not on the list, Sun Ray DTUs cannot attempt to contact it.
Once a TCP connection to an Authentication Manager has been established, the DTU presents its token. The token is either a pseudo-token
representing the individual DTU (its unique Ethernet address) or a smart card. The Session Manager then starts an X Window/X server session and
binds the token to that session.
The Authentication Manager then sends a query to all the other Authentication Managers on the same subnet and asks for information about
existing sessions for the token. The other Authentication Managers respond, indicating whether a session for the token exists and the last time the
token was connected to the session.
The requesting Authentication Manager selects the server with the latest connection time and redirects the DTU to that server. If no session is found
for the token, the requesting Authentication Manager selects the server with the lightest load and redirects the token to that server. A new session is
created for the token.
The Authentication Manager enables both implicit (smart card) and explicit switching. For information about explicit switching, see Group Manager.
Configuring DHCP
In a large IP network, a DHCP server distributes the IP addresses and other configuration information for interfaces on that network.
The Sun Ray DHCP server can coexist with DHCP servers on other subnets, provided that you isolate the Sun Ray DHCP server from other DHCP
traffic. Verify that all routers on the network are configured not to relay DHCP requests, which is the default behavior for most routers.
If the IP addresses and DHCP configuration data are not set up correctly when the interfaces are configured, the failover feature
cannot work properly. In particular, configuring the Sun Ray server's interconnect IP address as a duplicate of any other server's
interconnect IP address may cause the Sun Ray Authentication Manager to issue "Out of Memory" errors.
How to Set Up IP Addressing on Multiple Servers, Each with One Sun Ray Interface
1. Log in to the Sun Ray server as superuser and, open a shell window. Type:
# /opt/SUNWut/sbin/utadm -a <interface_name>
where interface_name is the name of the Sun Ray network interface to be configured; for example, hme[0-9], qfe[0-9], or ge[0-9].
You must be logged on as superuser to run this command. The utadm script configures the interface (for example, hme1) at the subnet (in
this example, 128).
The script displays default values, such as the following:
The default values are the same for each server in a failover group. Certain values must be changed to be unique to each server.
3. Change the second server's IP address to a unique value, in this case 192.168.128.2:
4. Accept the default values for netmask, host name, and net name:
5. Change the DTU address ranges for the interconnect to unique values. For example:
The utadm script asks if you want to specify an authentication server list:
These servers are specified by a file containing a space-delimited list of server IP addresses or by manually entering the server IP addresses.
The newly selected values for interface hme1 are displayed:
Selected values for interface "hme1"
host address: 192.168.128.2
net mask: 255.255.255.0
net address: 192.168.128.0
host name: serverB-hme1
net name: SunRay-hme1
first unit address: 192.168.128.50
last unit address: 192.168.128.83
auth server list: 192.168.128.1
firmware server: 192.168.128.2
router: 192.168.128.2
8. Stop and restart the server and power cycle the DTUs to download the firmware.
The table below lists the options available for the utadm command. For additional information, see the utadm man page.
Available Options
Option Definition
-A <subnetwork> Configure the subnetwork specified as a Sun Ray sub-network. This option only configures the DHCP service to allocate IP
address and/or to provide Sun Ray parameters to Sun Ray clients. It also will automatically turn on support for LAN
connections from a shared subnetwork.
-D <subnetwork> Delete the subnetwork specified form the list of configured Sun Ray subnetworks.
-l Print the current configuration for all the Sun Ray subnetworks, including remote subnetworks.
The term primary server reflects the replication relationship, not the failover order.
Adding or removing secondary servers requires services to be restarted on the primary server. In large failover groups, and significant loads may be
pushed onto the primary server from various sources. In addition, runaway processes from user applications on the primary can degrade the health
of the entire failover group. Failover groups of more than four servers should have a dedicated primary server devoted to solely serving the Sun Ray
Data Store, i.e., not hosting any Sun Ray sessions.
Configure the primary server before you add the secondary servers.
The purpose of a dedicated primary server is to serve the Sun Ray Data Store. Specifying a dedicated primary server enables secondary
servers to be added or removed without disturbing user sessions. To specify a dedicated primary server, do not run utadm on the server.
(Linux Only) If a common home directory is mounted on machines with different GNOME versions, conflicts between or among the versions
cause unpredictable behavior. Do not try to use multiple GNOME versions with a common home directory.
Steps
where <secondary_server1> [<secondary_server2>...] is a space-separated list of unique host names of the secondary servers.
/var/adm/log/utreplica.<year><month><date><hour>:<minute>:<second>.log
For Linux:
/var/log/SUNWut/utreplica.<year><month><date><hour>:<minute>:<second>.log
Next Steps
Use the utreplica command to advise each secondary server of its secondary status and also the host name of the primary server for the group.
where <secondary_server1> [<secondary_server2>...] is a space-separated list of unique host names of the secondary servers.
2. Become superuser on the secondary server.
3. Add the secondary server.
# /opt/SUNWut/sbin/utreplica -s <primary-server>
# rdate <primary-server>
The location can be changed in the gmSignatureFile property of the auth.props file.
To form a fully functional failover group, the signature file must meet the following criteria:
Note
For slightly better security, use long passwords.
Steps
1. As superuser of the Sun Ray server, open a shell window and type:
# /opt/SUNWut/sbin/utgroupsig
Note
Be sure to use the utgroupsig command rather than any other method to provide the signature. utgroupsig also ensures
proper internal replication.
# /opt/SUNWut/sbin/utadm -f
# /opt/SUNWut/sbin/utadm -n
# /opt/SUNWut/sbin/utreplica -l
The result indicates whether the server is stand-alone, primary (with the secondary host names), or secondary (with the primary host name).
# /opt/SUNWut/sbin/utreplica -u
Sun Ray server broadcasts do not traverse routers or servers other than Sun Ray servers.
Command-Line Step
To view the failover group status for the local Sun Ray server:
# utgstatus
When the primary server fails, you cannot make administrative changes to the system. For replication to work, all changes succeed
on the primary server.
Use this procedure to rebuild the primary server's data store from a secondary server. This procedure uses the same host name for the replacement
server.
Be sure to set umask appropriately before running utldbmcat. Otherwise, unprivileged users can gain access to the utadmin
password.
Steps
1. On one of the secondary servers, capture the current data store to a file called /tmp/store.
1.
# /opt/SUNWut/srds/lib/utldbmcat
/var/opt/SUNWut/srds/dbm.ut/id2entry.dbb > /tmp/store
This command provides an LDIF format file of the current data store.
2. Use FTP to send this file to the /tmp directory on the primary server.
3. Follow the SRSS installation instructions.
4. After running utinstall, configure the server as a primary server for the group.
Make sure that you use the same admin password and group signature.
# utconfig
:
# utreplica -p <secondary-server1> [<secondary-server2>...]
5. Shut down the Sun Ray services, including the data store.
# /etc/init.d/utsvc stop
# /etc/init.d/utds stop
# /opt/SUNWut/srds/lib/utldif2ldbm -c -j 10 -i /tmp/store
This command populates the primary server and synchronizes its data with the secondary server. The replacement server is now ready for
operation as the primary server.
# utrestart -c
# /opt/SUNWut/sbin/utuser -l
Note
This procedure is also known as promoting a secondary server to primary.
Steps
1. Choose a server in the existing failover group to be promoted and configure it as the primary server.
# utreplica -u
# utreplica -p <secondary-server1> [<secondary-server2>...]
2. Reconfigure each of the remaining secondary servers in the failover group to use the new primary server:
# utreplica -u
# utreplica -s new-primary-server
This command resynchronizes the secondary server with the new primary server.
Note
This process may take some time to complete, depending on the size of the data store. Since Sun Ray services will be offline
during this procedure, you may want to schedule your secondary servers' downtime accordingly. Be sure to perform this
procedure on each secondary server in the failover group.
Contents
Note
If you are using a Linux platform, library mapping for the 32-bit platform should be /opt/SUNWutref/amgh/lib, as shown
below, and library mapping for the 64-bit platform should be /opt/SUNWutref/amgh/lib64.
# /opt/SUNWut/sbin/utamghadm -l /opt/SUNWutref/amgh/lib/libutamghref_token.so
# /opt/SUNWut/sbin/utamghadm -l /opt/SUNWutref/amgh/lib/libutamghref_username.so
How to Configure a Script-based Back-end Mapping
# /opt/SUNWut/sbin/utamghadm -s /opt/SUNWutref/amgh/lib/utamghref_script
Key Value
insert_token pseudo.MAC_address
token TerminalId.MAC_address
If a registered policy is in place, use the insert_token key instead of the token key, which is not globally unique.
Note
The RHA security feature does not affect token readers. It is assumed that token readers are deployed in physically secure
environments.
To create the back-end database file under /opt/SUNWutref/amgh/back_end_db on the Sun Ray server, do the following:
username=XXXXX host=XXXXX
Note
Disabling the RHA feature may present a security risk under some circumstances.
# utpolicy -a -z both -g -D
# utrestart -c
# utpolicy -a -z both -g
# utrestart -c
Contents
For information about Regional Hotdesking or Remote Hotdesk Authentication, which NSCM can utilize, see About Hotdesking.
NSCM Session
In an NSCM session, the user can:
If a user does not want to use the NSCM session, inserting a smart card causes the session to be disconnected and replaced by a smart card session.
Right clicking the Options button displays a panel with the following options:
QuickLogin - Applicable only to a new session only. Selecting Off enables the user to log in with the same options available through
dtlogin. Selecting On enables the user to bypass the option selection phase. QuickLogin is on by default.
Exit - Selecting Exit temporarily disables the NSCM session. An escape token session is started, and the dialog box is replaced by the
dtlogin screen. A user without a valid account in this server group can exit to the dtlogin dialog and attempt a remote X (XDMCP)
login to some other server where that user has a valid account.
Load Balancing Between Servers - If server A is heavily loaded when a user logs into it with the NSCM GUI, the server redirects the user to
server B.
Switching Between Servers - A user with a session on server A who wants to switch to a session on server B invokes the utselect GUI to
access the other session. In doing so, the user is required to log in with the NSCM GUI. Users familiar with the ease of the utselect GUI
might be displeased that another login is necessary.
Escape Token Sessions - The user bypasses the NSCM GUI by clicking the Exit button and logs into server A using dtlogin. The user now
has a standard escape token session and invokes the utselect GUI to switch to server B, causing the NSCM GUI to be presented again. The
user must click Exit again to get to the escape token session on server B. Users accustomed to switching rapidly might find this behavior
annoying.
For example:
For example:
2. As superuser, type the utpolicy command with the -M argument for your authentication policy.
For example:
This example configures the Authentication Manager to allow self-registration of users both with or without smart cards, and NSCM sessions
are enabled.
3. Initialize Sun Ray services by restarting the Authentication Manager on the server, including each secondary Sun Ray server if in a failover
group.
# /opt/SUNWut/sbin/utrestart -c
If no NSCM session exists for this user, the Authentication Manager creates an NSCM session token with the format: mobile.IEE802-MACID.
Session Redirection
The user might be redirected to another server for the following reasons:
If the Sun Ray server is part of a failover group, the load-balancing algorithm might redirect the user to another Sun Ray server.
If the user has an NSCM session on a different Sun Ray server in a failover group, the user will be redirected to the server with the most
current NSCM session.
The Sun Ray Mobile Session Login dialog box is redisplayed with the host name of the new Sun Ray server. The user must retype the user name and
password.
Note
NSCM and RHA sessions are disconnected if the screen lock idle time interval is exceeded. See Mass Storage Devices (Linux) and
Mass Storage Devices (Solaris).
You can disconnect a DTU session through any of the following three methods:
% /opt/SUNWut/bin/utdetach
Press Shift+Pause.
To change the disconnect hot key combination, see Sun Ray DTU Hot Keys.
Note
The hot key combination does not work with a full-screen Windows session.
Connect to your session through another DTU, either by inserting your smart card and authenticating to RHA or by logging in through
NSCM.
Contents
You can use the Admin GUI to configure Kiosk Mode. On the Kiosk Mode tab, accessed from the under Advanced tab, you can choose a predefined
session type. You can also specify other general properties that control kiosk mode behavior, such as Timeout, Maximum CPU Usage, and Maximum
VM Size.
Some session types allow additional Kiosk applications to be launched. Not all session types support this ability. For example, a Kiosk full-screen web
browser session does not need to have this capability. The applications table on the Kiosk Mode page is displayed or hidden depending on what
session type is selected.
You can add a new Kiosk application by clicking the New button in the applications table and specify it using either a predefined application
descriptor file or by specifying the path to an executable or an application descriptor on the server. All predefined application descriptors are located
in the /etc/opt/SUNWkio/applications directory.
For a detailed explanation of Kiosk Mode functionality, see the kiosk man page.
For example, adding an application such as xterm provides users with access to a command-line interface from a Kiosk Mode session. This access is
not desirable in a public environment and is not advised. However, using a custom application for a call center is perfectly acceptable.
In a failover environment, the Kiosk Mode administrative settings are copied from the primary server to the secondary, that is, failover servers. Be
sure that all application descriptors and executable paths added to the Kiosk Mode sessions are copied across the servers in the failover group. For
example, if the Mozilla application is added to the sessions with the executable path /usr/sfw/bin/mozilla, make sure that the path to the
binary is available to all servers in the failover group. One way to ensure that sessions and applications are available on all servers in a failover group
is to put them into a shared network directory, which is available on all hosts in the failover group.
How to Configure Kiosk Mode Explains how to initially configure the Kiosk Mode feature.
How to Configure a Kiosk Mode Explains how to configure the Kiosk Mode session type.
Session Type
How to Enable and Disable Kiosk Explains how to specify what types of session types are available to users, based on policy choices for
Mode different types of users and usage scenarios.
How to Override the Default Kiosk Explains how to override the default Kiosk Mode policy or Kiosk Mode session type by using the
Mode Policy utkioskoverride command.
How to Add an Application to a Explains how to add applications to a Kiosk Mode session type to extend the Kiosk Mode functionality.
Kiosk Session Type
This procedure describes how to configure a Kiosk Mode session type, which determines what type of session is launched in Kiosk Mode. For
information about Kiosk Mode security and failover considerations, see About Kiosk Mode.
Note
Kiosk session and application configuration data created with the Admin GUI is stored as the default Kiosk session type under the
name session. To store non-default Kiosk session types, use the utkiosk command on the command line.
Value Description
Timeout Indicates the number of seconds after which a disconnected session will be terminated. If you provide no value for this
setting, termination of disconnected sessions will be disabled.
Maximum Indicates the maximum number of CPU seconds per process for Kiosk sessions. By default, the system default is applied to
CPU Time all Kiosk sessions.
Maximum Indicates the maximum Virtual Memory size per process for Kiosk sessions. By default, the system default is applied to all
VM Size Kiosk sessions.
Maximum Indicates the maximum number of open files per process for Kiosk sessions. By default, the system default is applied to all
Number of Kiosk sessions.
Files
Maximum Indicates the maximum file size per process for Kiosk sessions. By default, the system default is applied to all Kiosk sessions.
File Size
Locale Indicates the locale to be used by the Kiosk session. By default, the system default is applied to all Kiosk sessions.
Arguments Indicates a list of arguments that should be passed to Kiosk sessions as they start. This setting is specific to the Kiosk
session. For more information about supported arguments, consult the session-specific documentation for your selected
session.
KIOSK_SESSION=uttsc
KIOSK_SESSION_LIMIT_VMSIZE=20000
KIOSK_SESSION_ARGS=-h -- -r sound:low -E theming winserver.example.org
To import your session settings and application list as the default session configuration:
Note
Kiosk session and application configuration data created with the Admin GUI is stored as the default Kiosk session type under the
name session. To store non-default Kiosk session configurations, use the utkiosk command.
Note
Individual Kiosk sessions may handle the various application start modes and arguments differently. For precise details on these
differences, consult the session-specific documentation of your selected Kiosk session.
Command-Line Steps
Refer to steps 2 and 3 in the How to Configure a Kiosk Mode Session Type procedure.
If you use the command line, you must manually determine if a session type supports applications. This is done automatically by the Admin GUI.
1.
1. List the session types configured in SRSS.
Kiosk Mode can be enabled as the default session type for smart card users, non-smart card users, or both. When Kiosk is enabled for a class of
tokens, this choice can be overridden for individual tokens. For example when Kiosk Mode is enabled for card users, regular non-Kiosk session access
can be configured for individual cards. Alternatively a kiosk session other than the default kiosk session can be configured for individual tokens.
Enabling and disabling Kiosk Mode for individual tokens is described in How to Override the Default Kiosk Mode Policy.
Before enabling Kiosk Mode, you must configure the Kiosk Mode. See Task Map - Managing Kiosk Mode for details.
Kiosk Mode functionality can be enabled and disabled from the System Policy section of the Advanced tab, and administered from the Kiosk Mode
section, which provides options to enable Kiosk Mode for smart card users, non-smart card users, or both. See Administration Tool (Admin GUI) for
more information.
Command-Line Steps
The following options determine whether access to the Sun Ray server is granted to certain tokens:
-z both/pseudo/card
or
The -k both/pseudo/card option determines whether some or all of the granted sessions are Kiosk sessions.
Examples
The examples below demonstrate how to enable Kiosk Mode from the command line.
How to Enable Kiosk Mode for All Users (Smart Card and Non-Smart Card)
All sessions are in Kiosk Mode and available only to smart card users unless you specify overrides.
How to Enable Regular Sessions for Smart Card Users and Kiosk Sessions for Non-Smart Card Users
Smart card sessions are non-Kiosk (ordinary login) sessions. Non-smart card sessions are Kiosk sessions.
How to Enable Regular Sessions for Registered Smart Cards and Kiosk Sessions for Non-Smart Card Users
Non-Kiosk smart card sessions are allowed only for registered tokens. Non-smart card sessions are Kiosk sessions.
How to Enable Kiosk Sessions for Registered Smart Cards and Regular Sessions on Registered DTUs:
Smart card sessions are Kiosk sessions, non-smart card sessions are non-Kiosk (ordinary login) sessions. Users can self-register smart card tokens and
DTUs.
All sessions are in Kiosk Mode and available only to smart card users unless you specify overrides.
Note
The Edit Token Properties page does not show whether a non-default Kiosk session has been assigned to a token. If you use the
Admin GUI to assign a Kiosk session type to a token, the default Kiosk session configuration is used for that token.
Command-Line Steps
/opt/SUNWut/sbin/utkioskoverride
The following examples demonstrate how to override the Kiosk Mode policy from the command line. For more detailed information about
overriding Kiosk Mode policy, see the utkioskoverride man page.
How to Enable Kiosk Sessions Regardless of the Kiosk Mode Policy for a Registered Smart Card
To enable Kiosk sessions regardless of the Kiosk Mode policy for the registered smart card MicroPayFlex.12345678:
How to Disable Kiosk Session Regardless of the Kiosk Mode Policy for a Registered Smart Card
To disable Kiosk sessions regardless of the Kiosk Mode policy for the registered smart card MicroPayFlex.12345678:
How to Disable Kiosk Sessions Regardless of the Kiosk Mode Policy for a Logical Token
To disable Kiosk sessions regardless of the Kiosk Mode policy for the logical token user.12345678:
To assign and enable the non-default kiosk session MySession2, stored using utkiosk, to the logical token user.12345678, regardless of the
Kiosk Mode policy:
Contents
The Sun Ray 2FS is designed to run a single display across two screens without additional configuration. It uses a single frame buffer for two
displays, always treating two attached heads as a single, unified display surface to be controlled with a single mouse and keyboard, and
always presenting itself to the X server as a single screen
H264 and VC-1 streams are synchronized with the audio stream on the DTU. In a multihead group, the audio stream is directed only to the
primary DTU, so audio/video synchronization can be performed only on the primary DTU. When video is displayed on secondary DTUs, the
application must perform the A/V synchronization.
Regional hotdesking is not enabled for multihead groups.
Multihead Groups
A multihead group is comprised of a set of associated Sun Ray DTUs controlled by a primary DTU to which a keyboard and pointer device, such as a
mouse, are connected. This group, which can contain a maximum of 16 DTUs, is connected to a single session.
Unless XINERAMA is enabled, sessions will have a separate CDE toolbar with separate workspaces per screen. See How to Enable and Disable
XINERAMA for more details. A window cannot be moved between screens. However, as noted, the Sun Ray 2FS DTU treats two attached screens as a
single display, based on a single frame buffer and controlled with a single keyboard and pointer device.
The primary DTU hosts the input devices associated with the session. The remaining DTUs, called the secondaries, provide the additional displays. All
peripherals are attached to the primary DTU, and the group is controlled from the primary DTU.
Multihead groups can be created by using a smart card to identify the terminals with the utmhconfig GUI utility.
If you disconnect the secondary DTUs without deleting the multihead group to which they belong, the screens are not displayed on the single
primary DTU. The primary DTU is still part of the multihead group, and the mouse cursor can appear to get lost when it goes to the disconnected
secondary DTU.
To recover from this situation, you can do one of the following actions:
For CDE desktop sessions, a single CDE toolbar and set of workspaces manages the configured monitors. A window including the CDE toolbar itself
can span monitors, because the monitor displays are still within the same screen.
Session Groups
If you hotdesk from a multihead group to a Sun Ray DTU that is not part of a multihead group, that is, a DTU with a single head, you can view all the
screens created in the original multihead group on the single screen, or head, by panning to each screen in turn. This action is called "screen
flipping."
Authentication Manager
The TerminalGroup policy module extends the Authentication Manager to support multihead groups. When a DTU connects to the Authentication
Manager or a new smart card is inserted, the TerminalGroup module queries its database to determine whether the DTU is part of a multihead group
and, if so, whether the DTU is a primary or secondary DTU of that group. If the DTU is not identified as part of a multihead group, it is treated
normally.
Full Size
If the DTU is recognized to be part of a multihead group and it is the multihead group's primary DTU, a normal session placement occurs. If a session
does not exist on the current server but a pre-existing session is found for the DTU or smart card on another server in the failover group, the
primary DTU will be redirected to that server. If no session exists on any server, the request for a session is directed to the least-loaded server and a
session is created there.
If a DTU is recognized to be part of a multihead group and it is a multihead group secondary DTU, the TerminalGroup module determines whether
the multihead group primary DTU is locally attached to a session. If so, it tells the Session Manager to allow the secondary DTU to attach to that
session also. If the primary DTU is not attached locally, the TerminalGroup module determines whether the primary DTU is attached to another
server in the failover group (if any), and if the DTU is attached, the module redirects the secondary DTU to that server.
Full Size
If the primary DTU is not perceived to be attached to any server in the failover group at that moment, a Waiting for Primary icon is displayed on the
DTU. Further activity is blocked on that DTU until the primary DTU is discovered. The secondary DTU is redirected to the server to which the primary
DTU is attached.
Initial Configuration
1 How to Create a New Multihead Group Explains how to use the Multihead Administration Tool to create a new multihead group.
2 How to Enable Multihead Policy Explains how to enable new multihead policy.
Additional Tasks
Task Description
How to Manually Set Multihead Display Explains how to manually set screen dimensions for the multihead group.
Dimensions
How to Manually Set the Multihead Display Explains how to manually set how the screens are arranged in the multihead group.
Geometry
How to Disable Multihead Displays for a Explains how to disable multiple displays for a session.
Session
How to Enable and Disable XINERAMA Explains how to enable or disable XINERAMA, a feature that creates a single large screen displayed
across several monitors.
# /opt/SUNWut/sbin/utmhconfig
5. Select the DTUs within the multihead group and insert a smart card in each Sun Ray DTU in turn to establish the order of the group.
The Finish button, which was previously grayed out, is now active.
6. Click the Finish button.
7. Exit the session or disconnect by removing your card.
Command-Line Steps
The following command enables the multihead policy for the failover group and restarts the Sun Ray Server Software with the new policy on the
local server without disrupting existing sessions.
# /opt/SunWut/sbin/utpolicy -a -m -g <your_policy_flags>
# /opt/SUNWut/sbin/utrestart
Note
Issue the utrestart command on every server in the failover group.
To override the automatic sizing of screen dimensions, use the -r option of utxconfig.
Note
If explicit screen dimensions are chosen, or if the resolutions of the monitors differ, you may have problems with unwanted
on-screen movement called panning, or large black bands around the visible screen area.
% utxconfig -r <width>x<height>
For example:
% utxconfig -r 1280x1024
% utxconfig -r auto
When the mouse pointer is moved past the edge between two screens, it moves from one screen to the next. The geometry of the multihead group
determines which screen is displayed at that moment.
You can use the -R option to utxconfig to manipulate the automatic geometry.
% utxconfig -R <columns>x<rows>
% utxconfig -R auto
% utxconfig -m off
How to Enable and Disable XINERAMA
Users can enable or disable XINERAMA as part of their X preferences. The utxconfig command handles this setting on an individual token basis.
The user must log off for the changes to take effect.
Note
XINERAMA tends to consume noticeable amounts of CPU, memory, and network bandwidth. For optimal performance, set the
shmsys:shminfo_shmmax parameter in the /etc/system file to at least LARGEST_NUMBER_OF_HEADS * width * height * 4.
% utxconfig -x on
% utxconfig -x off
% utxconfig -a -x on
Note
H264 and VC-1 support on the DTU is not available for XINERAMA sessions. In XINERAMA sessions, video windows may be dragged
from one DTU to another or may span multiple DTUs, but audio/video synchronization of H264 and VC-1 support is limited to the
primary DTU. The videos cannot be synchronized between DTUs. H264 and VC-1 videos may still be rendered by the application in
the same manner they would be rendered on Sun Ray 1 DTUs.
Multihead Video
The H264 and VC-1 streams are synchronized with the audio stream on the DTU. In a multihead group, the audio stream is directed only to the
primary DTU, so audio/video synchronization can only be performed on the primary DTU. When video is displayed on secondary DTUs, the
application must perform the A/V synchronization.
The monitor was powered off when the Sun Ray DTU was started
A bad cable
An older monitor
How To Reset the Screen Resolution
utresadm
Contents
About Security
Encryption and Authentication
Security Modes
Client Key Management
Key Fingerprint
Task Map - Managing Security for a Sun Ray System
DTU Keys
Security Status and Access
Client Authentication
How to Display Security Status for a DTU
How to Display Security Status for All Sessions
How to Confirm DTU Keys
How to Confirm a Specific DTU Key
How to Confirm All Unconfirmed DTU Keys
How to Display a DTU's Fingerprint Key from the DTU
How to Display DTU Keys
How to Display All DTU Keys
How to Display All Keys for a Specific DTU
How to Delete DTU Keys
How to Delete a Specific DTU Key
How to Delete All DTU Keys for a Specific DTU
How to Disable Client Authentication
How to Force Client Authentication From All DTUs
How to Deny Access to Clients With Unconfirmed Keys
Troubleshooting Authentication
Authentication Error Messages
Error Message Examples
About Security
Sun Ray Server Software (SRSS) provides interconnect security. The main aspects of this feature are:
See Task Map - Managing Security for a Sun Ray System for the list of tasks used to manage SRSS security.
The ARCFOUR encryption algorithm, selected for its speed and relatively low CPU overhead, supports a higher level (128-bit) of security between Sun
Ray services and Sun Ray desktop units.
However, encryption alone does not provide complete security. Spoofing a Sun Ray server or a Sun Ray client and posing as either is still possible, if
not necessarily easy. Here are some examples:
A man-in-the-middle attack, in which an impostor claims to be the Sun Ray server for the clients and pretends to be the client for the server.
The imposter then intercepts all messages and has access to all secure data.
Manipulating a client to pretend to be another client in order to gain access to sessions connected to the spoofed client.
Server and client authentication provided by SRSS can resolve these types of attacks. Server authentication uses pre-configured, public-private key
pairs in the SRSS and firmware, and client authentication uses an automatically generated public-private key pair in every client.
SRSS uses the Digital Signature Algorithm (DSA) to verify that clients are communicating with a valid Sun Ray server and that the server is
communicating with a legitimate client. This authentication scheme is not completely foolproof, but it mitigates trivial man-in-the-middle attacks and
makes spoofing SRSS or Sun Ray clients harder for attackers.
Enabling encryption and authentication is optional. The system or network administrator can configure it based on site requirements. By default only
client authentication is enabled.
Security Modes
When you configure encryption and client authentication, you must decide between hard and soft security modes. Security mode can be configured
separately for encryption requirements including server authentication and for client authentication requirements. Security mode settings are
intended for compatibility with older firmware, which did not support the affected security feature.
Hard Security Mode - Hard security mode ensures that every session is secure. If security requirements cannot be met, the session is refused.
Soft Security Mode - Soft security mode ensures that connection requests are granted even for desktop units that don't support the
configured security requirements. If security requirements cannot be met, the session is granted but not secure.
By default, the security modes for encryption and client authentication are both set to soft, which allows unauthenticated and unencrypted access to
desktop units running older firmware.
Note
Security mode settings don't apply to software clients. Software clients will always be treated as if hard security mode for
encryption or authentication is in effect.
The following table describes what happens when the different security modes are used.
Encryption - The Sun Ray DTU does not support Sun Ray server Sun Ray server grants the DTU a non-secure session. The user must
encryption or server authentication because of old denies the then decide whether to continue using a non-secure session.
firmware session.
Client Authentication - The Sun Ray DTU does not Sun Ray server Sun Ray server grants the DTU a non-secure session.
support client authentication because of old firmware denies the
session.
Client Authentication - The client supports Sun Ray server Sun Ray server denies the session.
authentication but authentication fails denies the
session.
Note
Older versions of firmware or the firmware that is preinstalled on DTUs delivered from the factory do not generate keys and do
not support client authentication. To help you identify preinstalled firmware, note that versions of preinstalled firmware start with
MfgPkg. You must provision the DTUs with firmware that is delivered with SRSS in order to have keys generated.
When a client connects to a server and client authentication is enabled, the client sends its public key and a client identifier to the server. For a DTU,
the client identifier is the MAC address. Initially the server can verify only that the client is the owner of the submitted key, but it cannot verify that
the client legitimately uses the submitted client ID.
The Sun Ray server stores a list of known clients and their public keys in the Sun Ray data store. A stored key can be marked as confirmed to indicate
that authenticity of the key for the given DTU has been confirmed through human intervention. As long as no key has been marked confirmed for a
DTU, the client authentication feature can ensure only that a DTU identifier is not used by multiple different clients with different keys. Only when
the key has been verified and marked confirmed can the client authentication actually authenticate the identity of the DTU.
Note
Keys for software clients are not stored in the data store and they are not displayed by the utkeyadm command or Admin GUI.
Instead, a software client uses its key fingerprint as a client identifier so that the authenticity of the key for the given ID is
established automatically. For more information, see the Key Fingerprint section.
By default, a DTU with an unconfirmed key is granted a session unless the identity of the DTU has been used with a different key. Multiple keys
submitted for a client might indicate an attack on sessions for this client, so session access is denied for this client. A user needs to explicitly confirm
one of the keys as being authentic to re-enable access for the client.
You can select a stricter policy that requires authenticated client identities and denies access to any DTU whose key is not verified and confirmed by
using the utpolicy command or the Admin GUI. If you choose to use this policy, you must explicitly mark the key for every new client as
'confirmed' before the client can be used. To use this policy to full effect, you should also set the client authentication mode to 'hard' in the security
configuration.
You can use the utkeyadm command to manage client identities and their associated keys. All keys that are used for a DTU are listed by the key
management tools.
With the utkeyadm command, you can perform the following actions:
You can also view, confirm, or delete associated keys for a DTU through the DTU's Desktop Properties page in the Admin GUI.
Key Fingerprint
A key fingerprint is a name for a key and is what the user can see. A key fingerprint is generated as an MD5 hash over the public key data.
You can view the key fingerprint for a DTU in the key panel. To display the key panel, press Stop+K on a Sun keyboard or Ctrl+Pause+K on a
non-Sun or PC keyboard. To verify the authenticity of a DTU key, you can compare key fingerprint displayed in the DTU's key panel with the one
shown by the utkeyadm command for the same client.
Additionally, you must decide whether to enable hard security mode for encryption and client authentication.
You can use the utcrypto command or the Admin GUI to configure the encryption option, authentication option, and security mode.
DTU Keys
Task Description
How to Confirm DTU Keys Describes how to confirm a specific DTU key or to confirm all unconfirmed DTU keys.
How to Display a DTU's Fingerprint Key from the DTU Describes how to display a DTU's fingerprint key from the DTU.
How to Display DTU Keys Describes how to display all the currently registered DTU keys.
How to Delete DTU Keys Describes how to delete a specific DTU key or all the DTU keys for a specific DTU.
Task Description
How to Display Security Status for a DTU Describes how to display a DTU's security status from the DTU.
How to Display Security Status for All Sessions Describes how to display the security status for all sessions on a Sun Ray server.
Client Authentication
Task Description
How to Disable Client Authentication Describes how to disable client authentication for performance or upgrade reasons.
How to Force Client Authentication From All DTUs Describes how to force all DTUs to authenticate by setting the hard security mode.
How to Deny Access to Clients With Unconfirmed Keys Describes how to set policy to deny access to clients with unconfirmed keys.
For a description of OSD icons and their respective codes, see SRSS Troubleshooting Icons.
# utsession -p
State Description
Column
Value
E Encrypted session
A Server is authenticated
C Authenticated client with confirmed identity, including software clients with automatically confirmed keys
U Authenticated clients with unconfirmed identity. Such connections might not have regular session access if the current policy requires a
confirmed identity.
X Clients that have successfully authenticated with an unconfirmed key, but that key is in conflict with other equally unconfirmed keys that
have been used with the same client ID. Clients that have a conflicting key will not be granted session access and you need to confirm
one of the known keys as authentic in order to admit the affected clients again.
Note
A multihead group might have DTUs at different firmware levels. The utsession output shows the lowest security level across
the set of all DTUs participating in the multihead group. For example, if at least one of the DTUs does not support encryption or
authentication, the session will be marked as not encrypted or not authenticated.
View the unconfirmed keys (key fingerprints) for all or specific DTUs.
To determine whether an unconfirmed DTU key really belongs to that DTU, display the key fingerprint for the DTU by pressing STOP+K.
Command-Line Steps
# utkeyadm -a -c IEEE802.000000ee0d6b
1 key confirmed .
# utkeyadm -a -c IEEE802.00000f85f52f -k 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3
1 key confirmed .
# utkeyadm -l -H
For example:
# utkeyadm -l -H
CID TYPE KEY-FINGERPRINT STATUS
IEEE802.00000adc1a7a DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e confirmed
IEEE802.00000f85f52f DSA* 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 unconfirmed
IEEE802.00000f85f52f DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e unconfirmed
IEEE802.00000fe4d445 DSA* 13:d0:d4:47:aa:7f:00:ba:db:ad:26:3a:17:25:11:24 unconfirmed
IEEE802.000000ee0d6b DSA* d0:d7:d0:57:12:18:00:ba:db:ad:b7:0f:5a:c0:8b:13 unconfirmed
# utkeyadm -a -U
Skipping cid=IEEE802.00000f85f52f: Multiple (2) keys found.
2 keys confirmed.
Using the previous example, the unconfirmed DTU keys for IEEE802.00000fe4d445 and IEEE802.000000ee0d6b are confirmed.
If the key panel does not display, the DTU might have old firmware installed that doesn't support client authentication.
If the message No key available is displayed, the DTU still has preinstalled MfgPkg firmware or a bug exists.
# utkeyadm -l -H
For example:
# utkeyadm -l -H
CID TYPE KEY-FINGERPRINT STATUS
IEEE802.00000adc1a7a DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e confirmed
IEEE802.00000f85f52f DSA* 1c:d4:b9:31:9d:f0:00:ba:db:ad:65:6c:8e:80:4d:b3 unconfirmed
IEEE802.00000f85f52f DSA* 4f:98:25:60:3b:fe:00:ba:db:ad:56:32:c3:e2:8b:3e unconfirmed
IEEE802.00000fe4d445 DSA* 13:d0:d4:47:aa:7f:00:ba:db:ad:26:3a:17:25:11:24 unconfirmed
IEEE802.000000ee0d6b DSA* d0:d7:d0:57:12:18:00:ba:db:ad:b7:0f:5a:c0:8b:13 unconfirmed
The Client Key Status column indicates whether the DTU has a key in a confirmed or unconfirmed status, whether the DTU has multiple
unconfirmed keys creating a conflict, or whether a key exists for the DTU. The possible Client Key Status values are None, Unconfirmed,
Confirmed, Conflict, Automatic, or Invalid.
Command-Line Steps
where <cid> is the desktop ID of the DTU and -L displays additional auditing information.
Example
The following example displays all keys for the IEEE802.0003ba0d93af DTU with additional auditing information.
# utkeyadm -L -c IEEE802.0003ba0d93af -H
CID TYPE KEY-FINGERPRINT STATUS CREATED
CONFIRMED CONFIRMED BY
IEEE802.0003ba0d93af DSA* 4f:98:25:60:3b:fe:d6:f8:fb:38:56:32:c3:e2:8b:3e unconfirmed 2009-06-01
05:08:50 UTC -
The Client Keys table shows the known keys and their status for the DTU.
# utkeyadm -d -c <cid>
where <cid> is the desktop id of the desktop to which the keys belong.
For example:
# utkeyadm -d -c IEEE802.00000f85f52f
2 keys deleted.
Reduce administrative overhead - At the cost of security, disabling client authentication saves time required to manage client keys on the
servers.
Eliminate log messages during upgrade - If you upgrade a Sun Ray server in a failover group with older servers, the upgraded server will
repeatedly produce log messages indicated that it cannot store key data and the server will treat all keys as unconfirmed. Client
authentication should be enabled once the entire group is upgraded.
Caution
Disabling client authentication creates a security risk. Make sure you understand the consequences before disabling client
authentication. See About Security for details.
Disabling client authentication applies to all future connections without restarting the Sun Ray server.
Command-Line Steps
# utcrypto -a auth_up_type=none
Command-Line Steps
The following procedure sets the policy that a confirmed key is required before access to a client is granted. To enact a stronger policy, you should
also set up the security policy to require client authentication from all DTUs, as described in How to Force Client Authentication From All DTUs.
Command-Line Steps
# utpolicy
Current Policy:
-a -g -z both -k pseudo -u pseudo
# utrestart
1. On the Advanced-System Policy tab page, select the Client Key Confirmation Required option in the Client Authentication section.
2. Restart all servers in the server group.
Troubleshooting Authentication
Authentication Error Messages
Errors in authentication are reported in the following log files:
Installation logs:
/var/adm/log (Solaris only)
/var/log (Linux only)
Configuration logs:
/var/adm/log (Solaris only)
/var/log/SUNWut (Linux only)
General log files:
/var/opt/SUNWut/log
/var/opt/SUNWut/srds/log
/var/opt/SUNWut/srds/replog
Messages logged into /var/opt/SUNWut/log/messages are delivered through the syslog service described in the syslogd man page. The
general format of these messages is:
For example:
May 7 15:01:57 e47c utauthd: [ID 293833 user.info] Worker3 NOTICE: SESSION_OK pseudo.080020f8a5ee
CLIENT_ERROR ...Exception ... : cannot send Error encountered while attempting to send a keep-alive message to a DTU.
keepAliveInf
...keepAlive timeout A DTU has failed to respond within the allotted time. The session is being disconnected.
duplicate key: DTU does not properly implement the authentication protocol.
invalid key: DTU does not properly implement the authentication protocol.
NOTICE "discarding response: " + No controlling application is present to receive DTU response.
param
UNEXPECTED "CallBack: malformed Bad syntax from a user application such as utload or utidle.
command"
.../ ... read/1: ... Exception ... Error encountered while reading messages from the DTU.
.../... protocolError: ... Various protocol violations are reported with this message. This error condition is also a way for
utauthd to force the DTU to reset.
Contents
Note
Throughout the SRS documentation, the term "Sun Ray DTU" is used to refer to the hardware-based thin client. With the addition
of the Sun Desktop Access Client, a majority of the Sun Ray DTU references also apply to the new Sun Desktop Access Clients. As
the documentation evolves, the generic term "client" will refer to all clients supported by the Sun Ray system, where appropriate.
Product Requirements
The Sun Desktop Access Client requires the usage of at least Sun Ray Server Software 4.2.
Note
You must enable access to Sun Desktop Access Clients before you can use them. See How to Enable Access for Sun Desktop Access
Clients for details.
User Information
For detailed information about using the Sun Desktop Access Client application, refer to the Sun Desktop Access Client 1.0 User Guide.
Client ID Differences Between Sun Desktop Access Clients and Sun Ray DTUs
If you have existing scripts using the SRSS commands or you plan to create scripts, you should be aware of the client ID differences between Sun
Desktop Access Clients and Sun Ray DTUs.
All Sun Ray clients are represented in the SRSS administration tools by a client ID, also called "CID," "terminal CID," or "client identifier.". A client ID
has both a full ID and short ID version:
The namespace value is a tag that determines the format of the id-part value. Short client IDs are usually used and accepted because the current
namespaces, one for DTUs and one for Desktop Access Clients, use different id-part formats. The full client ID is used to help distinguish between
these different types of clients more easily.
Desktop Access Client MD5 MD5 hash of client key 32 hex digits
The client key is part of a Sun Desktop Access Client profile, so every Desktop Access Client profile has its own Client ID.
0003badc1b9d IEEE802.0003badc1b9d
00144f85f52f IEEE802.00144f85f52f
080020b5ca55 IEEE802.080020b5ca55
1bd97b44ea9458fac256a7a778a282fe MD5.1bd97b44ea9458fac256a7a778a282fe
d8b3a4eb29497e0c6fbb0f2a810267f5 MD5.d8b3a4eb29497e0c6fbb0f2a810267f5
Note
The following procedure uses a warm restart of Sun Ray services. If you disable access for Sun Desktop Access Clients, use a cold
restart.
Command-Line Steps
# utpolicy
Current Policy:
-a -g -z both -M
Note
(Solaris only) To use the Sun Desktop Access Clients with mobile sessions, use the -M option to enable non-smartcard
mobile sessions.
# utrestart
A restart of Sun Ray services in the server group is required after enabling or disabling access for Desktop Access Clients.
Note
To install the Sun Desktop Access Client, you must have administrator privileges on the client computer.
1. Copy the Sun Desktop Access Client Windows install program, setup.exe, to the client computer.
2. Double-click setup.exe and follow the instructions.
The Sun Desktop Access Client software is installed on the client computer and entries for the Sun Desktop Access Client are added to the
Windows Start Menu.
For detailed information about using the Sun Desktop Access Client, refer to the Sun Desktop Access Client 1.0 User Guide.
See How to Enable Access for Sun Desktop Access Clients for details of the required configuration.
Client computers – Ensure that firewall settings on the client computers allow the Sun Desktop Access Client to access the Internet.
Sun Ray servers – See Ports and Protocols for information on the ports used by the Sun Desktop Access Client.
See Sun Ray Icons for more details about the available icons and messages used by SRSS.
To set the MTU, either change the setting on the Network tab or run the following command:
where bytes is the maximum packet size, in bytes and server-name is the name of the Sun Ray server.
Level Description
0 No logging
1 Critical messages
2 Warnings
3 Informational messages
To set the logging level, either change the setting on the Logging tab or run the following command:
where num is the logging level and server-name is the name of the Sun Ray server.
Log messages are written to a .log text file on the client computer. The .log file is named after the profile used. For example, the log file for the
default profile is called default.log.
The location of the log file depends on the installation platform, as follows:
Supported Platforms
The following operating systems are supported:
Known Issues
Exit Key Combination Might Not Work on Some Client Computers (CR 6876016)
Problem
An exit key combination selected using the Hot Key tab does not work on the client computer.
Workaround
Choose an alternative exit key combination that works on the client computer.
Contents
In most cases, the firmware on Sun Ray DTUs are synchronized with the Sun Ray server as part of the post-installation or post-upgrade configuration
steps. However, sometimes you might have to find out a DTU's firmware version or to specifically manage a DTU's firmware.
Access Control
To accommodate customers with differing requirements with respect to flexibility and security, two versions of the DTU software are provided.
The default version of Sun Ray DTU firmware is installed at /opt/SUNWut/lib/firmware. This firmware does not enable the Pop-up
GUI.
The Pop-up GUI-enabled version of the firmware is installed at /opt/SUNWut/lib/firmware_gui. To make the Pop-up GUI available,
the administrator must run utfwadm -f to install the firmware.
Non-DHCP network configuration for standalone operation, when configuring local DHCP operation is impossible
Local configuration of Sun Ray specific parameters, such as server list, firmware server, MTU, and bandwidth limits
DNS servers and domain name for DNS bootstrapping
IPsec configuration
Wireless network configuration, which is used in Tadpole laptops
To protect the use of stored authentication information, the VPN configuration includes a PIN entry. This feature enables two-factor authentication
for Sun Ray at Home VPN deployments.
If you are using a non-Sun keyboard, you can press one of the following key combinations:
Ctrl+Pause+S
Ctrl+Pause+M
The arrow at the lower right corner indicates that the menu can be scrolled with the Up and Down arrow keys.
Network
Servers
Server list - A list of comma-separated server names or IP addresses
Firmware server - Name or IP address of firmware/config server
Log host - IP address of syslog host
TCP/IP
DHCP - MTU
Static - IP address, netmask, router, broadcast address, MTU
DNS
Domain name - One only
DNS server list - List of IP addresses
VPN/IPsec
Enable/Disable switch
Port number
Advanced
Download Configuration
Keyboard Country Code
Bandwidth Limit (in bits per second)
Session Disconnect (STOP-Q)
Force Compression
Lossless Compression
Disallow utload
Force Full Duplex
Enable Fast Download
Video (set blanking timeout)
Video Input Disable
On success, the user is prompted to save the values. Otherwise, the previous menu is displayed. No other error indications are
given.
Some of the menus have an Exit entry, but the Escape key always invokes one level higher than the current menu. Escape at the
top level prompts for any changes to be saved or discarded. If changes have been written to the flash memory, the Escape key
resets the DTU.
Keyboard A keyboard country code that is applied to a keyboard that returns a country code of 0, for use with non-U.S. keyboards that do
Country not report a country code.
Code
Bandwidth The maximum amount of network bandwidth in bits per second that a given client will use.
Limit
Session Enables or disables the ability to terminate a session by pressing STOP-Q. This feature is useful when you want to terminate a VPN
Disconnect connection and leave the Sun Ray in an inactive state. Pressing the Escape key after the session has terminated reboots the Sun
Ray DTU.
Force Sets a tag sent from the Sun Ray DTU to the Xserver telling it to enable compression regardless of available bandwidth.
Compression
Sun Ray 270 (Video Input Disable) Sun Ray 2, 2FS, 270, and later models
Disallow Disables the ability to explicitly force a firmware load into a DTU. In this way, firmware can be tightly controlled using .parms files
utload or DHCP parameters.
Force Full Allows the DTU to operate correctly when the network port that it is connected to does not auto-negotiate. In that case, the
Duplex auto-negotiation results in the Sun Ray running at half duplex, which significantly impacts network performance. This setting allows
the Sun Ray to operate with better performance in this situation.
Enable Fast If set, the DTU uses the maximum TFTP transfer size if the TFTP server supports it. Over a high latency connection, this setting
Download typically doubles the speed of firmware downloads. There are no disadvantages to enabling fast downloads on low latency LANs.
This parameter is disabled by default and the transfer size is set at 512-byte packets. It is disabled by default for backwards
compatibility with TFTP servers that might not support the more advanced protocol. If this parameter were on by default and a
firmware download were to fail, there would be no way to recover.
Video
Blanking Timeout - The time until the screen is put to sleep, in minutes. (specify zero to disable).
OSD Quiet Display - If set, disables most of the OSD icons except when error conditions are detected. |
Video Input Sun Ray 270 only. If set, turns off the input selector on the front of a Sun Ray 270 and locks the monitor so that it displays only the
Disable Sun Ray output. This feature prevents users from connecting a PC to the VGA video input connector on a Sun Ray 270 and using it
as a monitor.
The following keywords correspond to configuration values that can be set from the Pop-up GUI menus. To group items that are logically related,
some of the keywords take the form family.field.
DNS Submenu
Servers Submenu
Security Submenu
password Set administrator password
TCP/IP Submenu
ip.ip Static IP
ip.mtu MTU
Advanced Submenu
The format of the file is a set of key=value lines, each terminated by a newline character, which are parsed and the corresponding configuration
items set (see the sample file below). No whitespace is permitted. Key values are case-sensitive and should be always lower case, as listed above.
Setting a keyword to have a null value results in the configuration value being cleared in the local configuration.
vpn.enabled=1
vpn.peer=vpn-gateway.sun.com
vpn.group=homesunray
vpn.key=abcabcabc
vpn.user=johndoe
vpn.passwd=xyzxyzxyxzy
dns.domain=sun.com
tftpserver=config-server.sun.com
servers=sunray3,sunray4,sunray2
$ utfwload -a
Note
If the DHCP version variable is defined, then when a new DTU is plugged in, its firmware is changed to the firmware version on the
server. If you make manual changes to your DHCP configuration, you will have to make them again whenever you run utadm or
utfwadm.
# utfwadm -A -a -n <interface>
Note
To force a firmware upgrade, power-cycle the DTUs.
# /opt/SUNWut/sbin/utfwadm -D -a -n all
Contents
Serial peripherals enable RS-232-style serial connections to the Sun Ray DTU. Parallel peripherals enable printing and come in two types: adapters
and direct USB-connected printers. Third-party adapters are useful for supporting legacy serial and parallel devices. Sun Ray Server Software
recognizes parallel printers with adapters as USB printers.
Note
The printer naming conventions in Sun Ray Server Software differ from those in a Solaris operating environment.
Directories correspond to buses and hubs, and files correspond to ports. Hub directories are named according to the port on the upstream hub into
which they are attached.
If the USB device has multiple identical ports (for example, two serial ports), the name is followed by :n where n is a numerical index, starting at 1.
/tmp/SUNWut/units/IEEE802.<MACID>/devices/usb@1/hub@1/<manufacturer_name>, <model_name>@3:1
Term Definition
physical topology The physical topology is hub@port/hub@port and so on. The port refers to the port on the parent hub into which the device
or child hub is plugged.
printer name 1, The printer and terminal name in the Sun Ray devices directory is manufacturer, model@port with a colon separating the
terminal name 1 numerical index when the string just described is not unique in the directory.
printer name 2, The printer and terminal name in the Sun Ray dev directory is the manufacturer and serial number concatenated with an
terminal name 2 alphabetic index when the serial number is not unique.
Device Links
Device links are created under the dev directory. A link to each serial node is created in dev/term, and a link to each parallel node is created in
dev/printers.
/tmp/SUNWut/units/IEEE802.080020cf428a/dev/term/manufacturer_name-67a
/tmp/SUNWut/units/IEEE802.080020cf428a/dev/printers/1608b-64
If the manufacturer name is not available, the USB vendor and product ID numbers are used for the name of the device link.
Changing the active session on a DTU changes the ownership of the device nodes to the user associated with the new session. A session change
occurs whenever a user inserts or removes a smart card from a DTU or logs into a session.
In a failover environment, you can use the utselect or utswitch command to change a session. A session change causes all devices currently
open by a non-root user to be closed after 15 seconds. Any input to or output from any affected device results in an error. For a serial device node,
if the original session is restored within 15 seconds, the ownership is not relinquished, and input and output continue uninterrupted.
Devices currently opened by the superuser, including normal printing, remain unaffected by a session change.
The Sun Ray 2 and Sun Ray 2FS each have one embedded serial port. The Sun Ray 170 and Sun Ray 270 each have two embedded serial ports. When
an internal serial service is disabled, users cannot access embedded serial ports on the Sun Ray DTU.
When an internal smart card reader service is disabled, users cannot access the internal smart card reader through the PC/SC or SCF interfaces for
reading or writing. However, this condition does not affect session access or hotdesking with unauthenticated smart cards.
When USB service is disabled, users cannot access any devices connected to USB ports. This situation does not affect HID devices such as the
keyboard, mouse, or barcode reader.
After installation of Sun Ray Server Software, all device services are enabled by default. You can use the utdevadm command to enable or disable
device services only in the configured mode, that is, after the Sun Ray Data store is activated.
This configuration affects all the servers in a group and all the DTUs connected to that group.
For more information, see the following related tasks. The other device services can be enabled or disabled with the same syntax.
Device links have a suffix denoting their slice number. Slice s2 is known as the backup slice, signifying the complete disk. Other slices are numbered
accordingly on the file system on the disk. For UFS disks, slice numbers are derived from the disk label. For FAT disks, slices (partitions in this case)
are numbered starting from s0. Disk operations such as format or eject should be directed at slice s2. Partition operations such as mount or fstyp
should be directed at the individual slice concerned. See the Commands for Common Disk Operation on SPARC and x86 Platforms Table for
examples.
Mount Points
When a mass storage device is plugged into the DTU, if it has an OS-recognizable file system, it is automatically mounted on a directory under the
user's mount parent directory. The mount parent directory is located in $DTDEVROOT/mnt/. The user can also locate mount points by using the -l
option of the utdiskadm command.
% utdiskadm -l
% utdiskadm -r <device_name>
Note
Before running this command, close all references to files and directories in the mount point to ensure that the device is not busy.
If these types of sessions become idle due to keyboard and mouse inactivity long enough to activate the screen lock, the session is detached. The
user loses access to the storage device, causing any I/O in progress to halt, and data may become corrupted.
Note
Some of these options have security and convenience implications that should be carefully weighed against the timeout issue to
determine what is best for your site.
Operation Command Device Name Argument Examples (SPARC) Device Name Argument Examples (x86)
Create fdisk table fdisk Path of whole disk Path of whole disk
$UTDEVROOT/dev/rdsk/disk3s2 $UTDEVROOT/dev/rdsk/disk3p0
Repair file system fsck Path of raw slice Path of raw partition
$UTDEVROOT/dev/rdsk/disk3s0 $UTDEVROOT/dev/rdsk/disk3p1
Display slice capacity prtvtoc Path of backup slice Path of backup slice
$UTDEVROOT/dev/rdsk/disk3s2 $UTDEVROOT/dev/rdsk/disk3s2
Device nodes are named with a partition identifier suffix. The device node representing the whole disk does not have such a suffix. For example:
Disk operations such as eject should be directed at the whole disk. Partition operations such as mount should be directed at individual partitions. See
Commands for Common Disk Operation on Linux Platforms for examples.
Mount Points
When a mass storage device is plugged into the DTU, if it has an OS-recognizable file system, it is automatically mounted on a directory under the
user's mount parent directory. The mount parent directory is located in $DTDEVROOT/mnt/. The user can also locate mount points by using the -l
option of the utdiskadm command.
% utdiskadm -l
Caution
Linux does not immediately write data to disks. Failure to run utdiskadm -r before unplugging mass storage devices will cause
loss of data. Make sure your users run utdiskadm -r before they unplug any mass storage device.
% utdiskadm -r <device_name>
If these types of sessions become idle due to keyboard and mouse inactivity long enough to activate the screen lock, the session is detached. The
user loses access to the storage device, causing any I/O in progress to halt, and data may become corrupted.
Note
Some of these options have security and convenience implications that should be carefully weighed against the timeout issue to
determine what is best for your site.
# utdevadm
# utdevadm -e -s usb
# utdevadm -d -s usb
Note
The lp subsystem opens the device node as superuser for each print request, so print jobs are not affected by hotdesking.
Starting a print queue on a printer attached to a Sun Ray DTU, either directly or through an adapter, is the same process as starting a print queue in
the Solaris OS.
Steps
1. On the Sun Ray DTU where the printer is attached, log in to a new session as superuser (root).
2. To determine the MAC address of the DTU, press the three audio option keys to the left of the power key in the upper right corner of the
keyboard.
The alphanumeric string displayed below the connection icon is the MAC address.
3. To locate the Sun Ray DTU, type:
3.
# cd /tmp/SUNWut/units/*<MAC_address>
# pwd
/tmp/SUNWut/units/IEEE802.<MACID>
The path to the extended MAC address for your particular Sun Ray DTU is displayed.
# cd dev/printers
# pwd
/tmp/SUNWut/units/IEEE802.<MACID>/dev/printers
# ls
<printer-node-name>
# /usr/sbin/printmgr &
# lpstat -d <printername>
Note
The lp subsystem opens the device node as superuser for each print request, so print jobs are not affected by hotdesking.
The following generic instructions might vary slightly from one operating system implementation to another, but they should provide enough
information to enable an administrator to set up basic printing services.
Steps
1. On the Sun Ray DTU where the printer is attached, log in to a new session as superuser (root).
2. To determine the MAC address of the DTU, press the three audio option keys to the left of the power key in the upper right corner of the
keyboard.
The alphanumeric string displayed below the connection icon is the MAC address.
3. Locate the Sun Ray DTU.
3.
# cd /tmp/SUNWut/units/*<MAC_address>
# pwd
/tmp/SUNWut/units/IEEE802.<MACID>
The path to the extended MAC address for your particular Sun Ray DTU is displayed.
# cd dev/printers
# pwd
/tmp/SUNWut/units/IEEE802.<MACID>/dev/printers
# ls
<printer-node-name>
# lpstat -d <printername>
# ln -s /tmp/SUNWut/units/IEEE802.<mac-address>/dev/printers/<device node>
\/dev/usb/sunray-printer
Use this soft link (/dev/usb/sunray-printer) as the Device URI while creating the print queue.
# /etc/init.d/cups restart
Check with the vendors for pricing and the precise printer models supported.
Symbolic links to the serial port device nodes are located under $UTDEVROOT/dev/term. Built-in ports are named "a" or "b", and serial adapter
ports have longer descriptive names.
Serial ports become unowned during hotdesking, so you should make sure any serial port activity is stopped before removing your smart card or
resetting the DTU.
libusb applications can run on any operating environment that supports libusb. For further information, see
/usr/sfw/share/doc/libusb/libusb.txt.
The following table lists some open source applications that make use of libusb support and enable users to access scanners, digital cameras, and
other devices.
http://sourceforge.net
Sun Download Center
The libusbut man page
Caution
Failure to run utdiskadm -r before unplugging mass storage devices will cause loss of data. Make sure your users run
utdiskadm -r before they unplug any mass storage devices.
% /opt/SUNWut/bin/utdiskadm -r <device_name>
Troubleshooting Printers
# utdiskadm -s
2. For each stale mount point, close all references to the mount point.
3. For each stale mount point, terminate all processes that refer to the mount point.
4. Remove the mount point.
# umount <stale_mount_path>
Contents
Managing Sun Ray DTU User Settings and Sessions (All Topics)
The Power key at the right side of the top row of a Sun Type 6 or Type 7 keyboard has a crescent moon icon. Therefore, the soft reset key sequence
is often called Ctrl+Moon.
Caution
Use Ctrl+Alt+Bksp+Bksp only for emergencies when you are unable to log out from the desktop. When using this method,
applications will not have the opportunity to exit properly and save data, and some application data corruption might result.
Note
NSCM and RHA sessions are disconnected if the screen lock idle time interval is exceeded. See Mass Storage Devices (Linux) and
Mass Storage Devices (Solaris).
You can disconnect a DTU session through any of the following three methods:
% /opt/SUNWut/bin/utdetach
Press Shift+Pause.
To change the disconnect hot key combination, see Sun Ray DTU Hot Keys.
Note
The hot key combination does not work with a full-screen Windows session.
Connect to your session through another DTU, either by inserting your smart card and authenticating to RHA or by logging in through
NSCM.
To redirect a session to a different server manually, use the utselect graphical user interface (GUI) or the utswitch command.
% utselect
The selections in the window are sorted in order of the most current to least current active sessions for the token ID.
In the following figure, the Server column lists the servers accessible from the DTU. The Session column reports the DISPLAY variable X session
number on the server if one exists. In the Status column, Up indicates that the server is available. The first server in the list is selected by default.
Select a server from the list or type the name of a server in the Enter server field. If a server without an existing session is selected, a new session is
created on that server.
where host is the host name or IP address of the Sun Ray server to which the selected DTU is redirected, and token is the user's token ID.
% utswitch -l
Power management is a feature of the Sun Ray Server Software and it is enabled by default. There are a couple of ways to disable power saving
mode.
At the desktop Refer to your desktop documentation about how to disable the power management feature or the screensaver feature.
environment level,
From the Sun Ray Set the Advanced->Video->Blanking parameter to 0 in the Sun Ray DTU Pop-up GUI, if enabled. For more details,
DTU level, see How to Set DTU Configuration Parameters (Pop-up GUI).
How to Enable or Disable XRender
The following procedure enables the X Rendering Extension (XRender) to allow clients to use the rendering model based on Porter-Duff
compositing. X Rendering is enabled by default.
Some applications may require the XRender extension to display properly. However, enabling XRender may cause unknown performance impacts to
the Sun Ray DTU as well as to the Sun Ray server.
Note
After enabling or disabling XRender, users must restart their current Sun Ray session (Ctrl+Alt+Bksp+Bksp) for the change to
take affect. Or, they can log out from their current session and log back in.
% utxconfig -n on
% utxconfig -n off
# utxconfig -a -n on
Note
You can use the -A option to make the setting mandatory for all DTU users, regardless of their personal settings. See the
utxconfig man page for details.
Any resolution selection made within a session remains effective whenever the session is displayed on that particular DTU. The selection is not lost if
the unit goes into power-save mode or is power-cycled; however, the resolution settings selected through the utsettings command apply only to
the DTU where the command is run.
When a user moves to another DTU, the resolution settings do not accompany the user to the new DTU, but the settings remain effective for the
user's session on the original DTU if the user returns to the session through hotdesking.
If the session is associated with a personal mobile token, such as a smart card or an NSCM credential, a message displays offering to make the
selected timing permanent. If a user accepts that offer, then the timing is retained and reused on that user's subsequent personal mobile token
sessions on the same DTU.
In addition, the administrator can use the utresadm command to arrange for particular monitor timing to be used in the following situations:
For further details, see the utsettings and utresadm man pages.
Command-Line Steps
utdesktop -p <desktopID>
Note
To facilitate the searching process, you can use the Admin GUI to edit DTU properties. Click the DTU Identifier and then click edit.
You can then provide a location or other information.
The Sun Ray Settings GUI contacts the Session Manager to determine which DTU is currently being used and connects to that unit to get the current
values. The GUI maintains a connection to the Session Manager so that the Session Manager can notify the GUI if the user moves to another DTU by
removing the smart card and inserting it into another DTU.
Steps
The default Settings hot key combination is Shift+Props but this assignment can be reconfigured, as described in Sun Ray DTU Hot Keys.
The Sun Ray Settings window is displayed, as shown in the following figure:
2. Use the Category menu to view the Audio Output, Audio Input, Display or Video settings panels.
3. To change a setting, move the appropriate scroll bar, checkbox, or pull-down menu.
Changes to the monitor signal timing through the Resolution/Refresh Rate setting require confirmation before and after the change
is applied to the DTU. All other changes take effect immediately.
4. Dismiss the Sun Ray Settings window.
If the window was launched by the Settings hot key, press the hot key again or apply the window manager's close action to that
window.
If the window was launched by invoking utsettings directly, apply the window manager's close action to that window.
utset Command
The utset command provides a non-GUI mechanism for reporting and modifying Sun Ray DTU settings. For details, refer to the utset man page.
Some of these hot key sequences have fixed definitions that cannot be modified. Others have definitions that can be reconfigured by a user or by an
administrator.
The activities controlled by these hot keys are specific to Sun Ray. Desktop software running in the Sun Ray session might provide a separate
keyboard shortcut facility that provides additional hot keys for desktop activities, perhaps including the ability to launch certain programs.
Mute+Softer Ctrl+Pause+N Displays the DTU MAC and IP addresses and server IP address.
+Louder
Ctrl+Power Ctrl+Pause+A Power cycles the DTU. On a Sun keyboard the Power key carries a crescent moon glyph and is
positioned at the top right corner of the keyboard.
Stop+S or Ctrl+Pause+S or Activates the DTU's local Pop-up GUI to configure the DTU. This GUI is available only when the DTU
Stop+M Ctrl+Pause+M has been loaded with GUI-capable firmware.
Stop+V Ctrl+Pause+V Shows the DTU's model, MAC address, and firmware version.
Ctrl+Alt+ Ctrl+Alt+Bksp+ Terminates a session. This hot key cannot be reconfigured to another value, but it can be disabled.
Bksp+Bksp Bksp For details, see the utxconfig man page.
Ctrl+Alt+ Ctrl+Alt+Del+Del Terminates the process that has taken control of the X server.
Del+Del
To support these levels of customization, at session startup Sun Ray examines a series of properties files in the order shown in the table below.
/etc/opt/SUNWut/utslaunch_defaults.properties System This file contains the default properties. Any properties specified
override any defaults built into the application itself.
$HOME/.utslaunch.properties User This file contains the user's preferred values, which override any
application or system-wide defaults.
/etc/opt/SUNWut/utslaunch_mandatory.properties System This file contains system-wide mandatory settings that cannot be
overridden by the user. These properties override any application,
system-wide, or user defaults.
If your policy is for all users to use the same standard hot key, modify the system-wide mandatory defaults file to specify this standard key. This
setting prevents users from specifying their own hot key preferences.
The format of the hot key entry in these properties files is utility_name.hotkey=value where utility_name is the name of the utility (currently
either utsettings or utdetach) and value is a valid X keysym name preceded by one or more of the supported modifiers (Ctrl, Shift, Alt,
Meta) in any order. Default values are shown in the following table.
utdetach.hotkey Shift+Pause Detaches the session from this DTU. (Often used to to detach a non-smartcard mobile session.)
How to Change Hot Key Settings for All Users
If you don't want your users to use the default hot keys, you can set up the system-wide defaults file to specify different hot keys. Users can still
specify their preferences in the user defaults file.
Note
If you want to make the change mandatory for all users even if they have user defaults set, change the value in the
/etc/opt/SUNWut/utslaunch_mandatory.properties file.
2. Locate the original hot key entry for the utility you want to change and place a # in front of it to comment it out.
For example:
# utdetach.hotkey=Shift Pause
3. Type the new hot key property after the first statement.
For example,
utdetach.hotkey=Alt F9
A user's hot key settings override any system-wide default settings, unless they are mandatory. See Sun Ray DTU Hot Keys for details.
Note
Make sure that the user owns and can read this file.
2. Add a line to the .utslaunch.properties file with the value for the hot key.
For example:
utsettings.hotkey=Shift F8
3. Save the .utslaunch.properties file.
4. Log out and log back in to enable the new hot key.
Installation of GDM
During the SRSS installation process, you are asked whether the installation script should remove the existing GDM from your system if your GDM
version is earlier than 2.12. Answer Yes to this question to continue with the SRSS installation, remove the old GDM from your system, and install the
Sun Ray enhanced version. If you answer No, the SRSS install process quits.
Because older GDM versions are removed during SRSS installation, do not use a GDM-controlled display for the installation. Use either a telnet
session into the server or a virtual terminal.
Uninstallation of GDM
Except on Red Hat Enterprise Linux 5, if you need to remove the SRSS software, you will be asked whether the Sun Ray enhanced GDM should remain
on your system. If you answer No, you might have to install the original GDM RPM if you want non-Sun Ray displays, such as the console, to be
managed.
Configuration of GDM
Sun Ray installation removes the current GDM from your system, including its configuration file. Therefore, if you have modified your GDM
configuration, back up the file before installing SRSS. You may then wish to reapply your changes to the /etc/X11/gdm/custom.conf file that
SRSS installs.
Caution
Do not simply replace the GDM configuration file that Sun Ray Server Software installs with your old GDM configuration file. The
Sun Ray Server Software will not work correctly if you do.
Bundled Greeter
If you are using Kiosk mode, please see the kiosk man page for details about the bundled GDM greeter. See also Managing Kiosk Mode.
<console>=tty[0-9][0-9]* vc/[0-9][0-9]*
<xconsole>=:[0-9][0-9] :[0-9]
Caution
Do not remove the /tmp/SUNWut/dev/utaudio directory. If you delete this directory, users with utaudio sessions cannot use
their audio pseudo device nodes.
If your application uses /dev/audio, the Sun Ray server software reroutes the audio signal appropriately.
% audioplay /usr/demo/SOUND/sounds/gong.au
If this command hangs, you might need to quit any other applications currently trying to play audio, for example, a browser. If you heare
the gong sound, your basic audio setup is working.
If the audio works with the clean configuration, then something is wrong in your browser's previous configuration.
1. Navigate to the shell or wrapper from which you started the audio player.
2. Set the environment variable LD_PRELOAD.
Contents
See the Man Pages page to view the man pages for any of these commands.
Command Definition
utaction Provides a way to execute commands when a Sun Ray DTU session is connected, disconnected, or terminated.
utadm Manages the private network, shared network, and DHCP (Dynamic Host Configuration Protocol) configuration for the Sun
Ray interconnect.
utadminuser Used to add, list, and delete UNIX user names from the list of users authorized to administer Sun Ray services. The list is
stored in the Sun Ray Data Store.
utamghadm Used to configure or disable regional hotdesking, which enables users to access their sessions across multiple failover
groups.
utcammigrate (Solaris only) Used to migrate existing CAM configuration to its Kiosk Mode equivalent with the intention of migrating
from existing CAM sessions to Kiosk sessions. This migration includes the creation of Kiosk application descriptors,
prototypes, session configuration and application lists. The migration does not include support for CAM wrapper scripts.
utcapture Connects to the Authentication Manager and monitors packets sent and packets dropped between the Sun Ray server and
the Sun Ray DTUs.
utcard Enables the configuration of different types of smart cards in the Sun Ray Data Store
utconfig Performs the initial configuration of the Sun Ray server and supporting administration framework software.
utdesktop Enables the user to manage Sun Ray DTUs connected to the Sun Ray server on which the command is run.
utdetach Disconnects the current non-smart card mobile session or authenticated smart card session from its respective Sun Ray
DTU. The session is not destroyed but put into a detached state. The session can be accessed again only after
authentication. When Remote Hotdesk Authentication (RHA) is disabled (through utpolicy or the Admin GUI),
utdetach affects only authenticated smart card sessions and non-smart card mobile sessions.
utdevadm Used to enable/disable Sun Ray device services. The devices include USB devices connected through USB ports, embedded
serial ports, and the internal smart card reader in the Sun Ray DTU.
utdssync Converts the port number for the Sun Ray Data Store service to the new default port on servers in a failover group, then
forces all servers in the group to restart Sun Ray services.
utfwload Used primarily to force the download of new firmware to a DTU running older firmware than its server.
utfwsync Refreshes the firmware level on the Sun Ray DTUs to the level available on the Sun Ray servers in a failover group. It then
forces all the Sun Ray DTUs within the group to restart.
utgmtarget Manages a group-wide list of explicit destinations for Sun Ray group membership announcements.
utgroupsig Sets the failover group signature for a group of Sun Ray servers. The utgroupsig command also sets the Sun Data Store
rootpw used by Sun Ray to a value based on the group signature. Although utgroupsig sets the rootpw in the
utdsd.conf file, it does not set the admin password, which is a separate entity, in the data store.
utgstatus Enables the user to view the failover status information for the local server or for the named server. The information that
the command displays is specific to that server at the time the command is run.
utinstall Used to installs, upgrade, and remove the Sun Ray Server Software.
utkiosk Used to import/export kiosk configuration information into the data store. It also supports storage of multiple named kiosk
session configurations in the data store.
utkioskoverride Provides a way to set the session type associated with a token, to select a kiosk session configuration for a token associated
with a kiosk session, or to query the session type and kiosk session currently associated with a token.
utmhadm Provides a way to administer Sun Ray server multihead terminal groups. The information that utmhadm displays and that is
editable is stored in the data store.
utmount Used to mount a file system on a Sun Ray mass storage device.
utpolicy Sets and reports the policy configuration of the Sun Ray Authentication Manager, utauthd.
utpreserve Saves existing Sun Ray Server Software configuration data to the /var/tmp/SUNWut.upgrade directory.
utpw Changes the Sun Ray administrator password (also known as the UT admin password) used by the Web-based and
command-line administration applications.
utreplica Configures the Sun Ray Data Store server to enable replication of administered data from a designated primary server to
each secondary server in a failover group. The data stores of the secondary servers remain synchronized automatically
unless there is a power outage. The -z option is useful for updating the port number.
utresadm Enables an administrator to control the resolution and refresh rate of the video monitor signal (persistent monitor settings)
produced by the Sun Ray unit.
utresdef Enables an administrator to create, delete, and view resolution definitions, that is, monitor signal timing definitions for
monitors attached to Sun Ray DTUs.
utselect Presents the output of utswitch -l as a list of servers in the current host group, to be used for reconnection of the
current DTU. A user can either select a server from this list or specify a server not in the current host group by typing its
full name in the utselect text box.
utsession Lists and manages Sun Ray sessions on the local Sun Ray server.
utset Enables a user to view and change Sun Ray DTU settings.
utsettings Opens a Sun Ray Settings dialog box that enables the user to view or change audio and visual settings for the Sun Ray DTU.
utsunmc (Solaris only) Adds the Sun Ray Server Software module to the Sun Management Center (SunMC) and loads it to permit
monitoring of Sun Ray Server Software. The utsunmc command can also remove the Sun Ray Server Software module
from SunMC.
utsunmcinstall (Solaris only) Used to install and uninstall the Sun Ray module for SunMC on a SunMC server where Sun Ray Server
Software is not installed.
utswitch Enables a Sun Ray DTU to be switched among various Sun Ray servers. utswitch can also list existing sessions for the
current token.
utumount Used to unmount a file system from a Sun Ray mass storage device.
utuser Reports Sun Ray user token registrations and enables the administrator to manage those registrations. utuser is able to
obtain smart card token values from DTUs that are configured as dedicated token reader devices.
utwall Sends a message or an audio file to users having an Xnewt or Xsun (X server unique to Sun Ray) process. The messages can
be sent in email and displayed in a pop-up window.
utwho Assembles information about display number, token, logged-in user, and the like, in a compact format.
utxconfig Manages X server configuration parameters for users of Sun Ray DTU sessions.
Man Pages
Note
To search for a specific command in the following pages, use your browser's find tool to search within the page.
To access the Admin GUI, see How to Log In to the Adminstration Tool (Admin GUI).
To allow another user account to perform administrative functions, see How to Enable or Disable Multiple Administration Accounts (Solaris) or How
to Enable or Disable Multiple Administration Accounts (Linux).
Servers From the Servers tab, you can do the following tasks:
Sessions From the Sessions tab, you can do the following tasks:
List all the sessions, sorted by user sessions and idle sessions.
Use the search function to find specific sessions such as those running on a
single server or sessions where a specific user is logged in.
Select a session's server to display details about the server or DTU and to select
and terminate sessions.
Desktop From the Desktop Units tab, you can do the following tasks:
Units
List all registered DTUs and Sun Desktop Access Clients.
List all connected DTUs and Sun Desktop Access Clients.
List all DTUs configured as token readers.
List all DTUs and Sun Desktop Access Clients participating in multihead groups.
Tokens From the Tokens tab, you can do the following tasks:
Security Subtab
From the Security subtab, you can disable and re-enable security settings, such as
encryption of communication between DTU and server, server authentication, security
mode, and device access.
Access for card users and non-card users, which includes enabling Kiosk Mode,
Sun Desktop Access Client (Software Client) access, or Mobile Sessions.
Enabling Client Authentication
Enabling the Multihead feature,
Session Access when Hotdesking
Log Files From the Log Files tab, you can do the following tasks:
All actions performed within the Admin GUI that modify system settings are logged in an audit trail.
Note
If a session is inactive for 30 minutes, you must log in again. To change the timeout value, see How to Change the Admin GUI
Timeout.
Steps
1. Log in to your Sun Ray server's console or to any DTU attached to it.
2. Open a browser window and type the following URL:
2.
http://<localhost>:1660
Note
If you specified a different port number when you configured the Sun Ray Server Software, use that port number in the
URL. If you enabled secure communication, the browser might be redirected to a secure port. The default secure port is
1661.
3. In the User Name window, type the administrator user name and click the OK button.
4. In the password challenge screen, type the administration password and click the OK button.
The Sun Ray Administration tool appears.
You are running a browser on a Sun Ray server or one of its DTUs.
The browser is not using a different machine as an HTTP proxy server.
For example, for Mozilla, go to Tools -> Options -> Advanced -> Edit Languages.
export LC_ALL=C
/etc/init.d/utwadmin stop
/etc/init.d/utwadmin start
For a more permanent solution, you can remove the non-English SRSS packages from the server. The following example removes the French
packages and restarts the web admin services.
# /etc/init.d/utwadmin stop
# pkgrm SUNWfuta SUNWfutwa SUNWfutwh SUNWfutwl
# /etc/init.d/utwadmin start
...
# The session timeout (specified in minutes)
session.timeout=30
...
# /opt/SUNWut/lib/utwebadmin restart
This tool automatically updates the web.xml file used by the web server hosting the SRSS Admin GUI.
# /etc/init.d/utsvc stop
Note
A disconnect will occur for a brief time on active Sun Ray DTUs before they reconnect again.
# /opt/SUNWut/sbin/utrestart
Caution
Be sure to notify your users before performing a cold restart, which terminates all existing sessions on a server. To restart Sun Ray
services without terminating sessions, perform a warm restart.
# utrestart -c
Command-Line Steps
utdesktop -p <desktopID>
Note
To facilitate the searching process, you can use the Admin GUI to edit DTU properties. Click the DTU Identifier and then click edit.
You can then provide a location or other information.
Fields Description
Token User's unique token type and ID. For smart cards, this value is a manufacturer type and the card's serial ID. For DTUs, this value is the
ID type "pseudo" and the DTU's Ethernet address. Examples:
mondex.9998007668077709
pseudo.080020861234
Server Name of the Sun Ray server that the user is using. This setting is optional.
Name
Server Sun Ray server's communication port. This field should generally be set to 7007. This setting is optional.
Port
Other Any additional information you want to associate with the user, for example, an employee or department number. This setting is
Info optional.
# /etc/init.d/utsvc stop
# /etc/init.d/utds stop
# utrestart
Authentication for accounts with administrative privileges is based on the PAM authentication framework.
Note
Make sure to include the comment line, which is needed for the cleanup to work properly.
To return to the old Sun Ray Admin GUI authentication scheme, modify the /etc/pam.conf file and replace the PAM stack for utadmingui with
the pam_sunray_admingui.so.1 module.
Note
Make sure to include the comment line, which is needed for the cleanup to work properly.
How to Enable or Disable Multiple Administration Accounts (Linux)
The Sun Ray server administrator can allow any valid UNIX user ID in the authorized user list to administer Sun Ray services. An audit trail of activity
on these accounts is provided. See the utadminuser man page.
Authentication for accounts with administrative privileges is based on the PAM authentication framework.
Note
Make sure to include the comment line, which is needed for the cleanup to work properly.
To return to the old Sun Ray Admin GUI authentication scheme, replace the PAM entries in the /etc/pam.d/utadmingui file with the
pam_sunray_admingui.so.1 module.
Note
Make sure to include the comment line, which is needed for the cleanup to work properly.
All audit events are prefixed with the keyword utadt:: so you can filter events from the messages file.
For example, session termination from the Admin GUI generates the following audit event:
where:
Contents
Each managed object is monitored separately and has independent alarm settings. Alarms are used to notify you when errors occur or your
performance needs to be tuned. Alarms are triggered (tripped) if:
For example, in a failover configuration, the entire group as well as any part of the group can be monitored – each server and its load, each
interconnect, and each DTU. Sun Management Center software also monitors Sun Ray Server Software daemons that:
Authenticate users
Start sessions
Manage peripheral devices
Handle DHCP services
For information on how to managing the Sun Management Center, see Task Map - Managing Sun Ray System Monitoring (Solaris).
Initial Configuration
To configure monitoring on a Sun Ray system using the Solaris OS, you need to perform the steps described in the following table.
3 Create the hierarchy of the system you want to monitor, either manually by adding nodes to the How to Create an Object
administrative domain or by using the Discovery Manager.
4 Configure alarms to monitor your Sun Ray system. How to Set an Alarm
Additional Tasks
Task Description
How to Display Sun Ray System Information Explains how to display property and status information about your managed objects.
Steps
1. Start the console on the server that has the console component installed.
# /opt/SUNWsymon/sbin/es-start -c &
Steps
# /opt/SUNWsymon/sbin/es-start -c &
3.
3. Select the domain you plan to add an object to.
The selected domain is displayed.
4. Choose Edit -> Create an Object.
The Create Topology Object window is displayed.
5. On the Node page, type a node label and description.
6. Type the Host name (server name), IP address, and port for the Sun Ray server.
The port provided here must be the same port you configured (entered) during the installation of the Sun Management Center.
This procedure describes how to set alarms to monitor the server and its load.
Base a tuning alarm on the number of active sessions on each server in a failover group to determine if one of the servers is overloaded. You set the
thresholds that trigger this type of alarm.
Steps
# /opt/SUNWsymon/sbin/es-start -c &
3. Double-click the object folder in the left panel for which you would like to create an alarm.
4. Right-click the value portion of the table row.
This console Details window shows the hierarchical details of your system. You can immediately see if any alarms have been tripped. An
alarm's area and type appear in the left panel as a colored circle with a bar. The Alert alarm also shows up on the title bar near the server
node name and at the Operating System, Sun Ray, and Failover Group levels. Double-clicking the area where an alarm icon is present
updates the right panel with the detailed information. If you position the mouse pointer over one of the colored circles in either panel, a
pop-up window is displayed detailing the alarm information. The following figure shows an example.
The total number of alarms set for the current server object is displayed at the top of the alarm summary window. Critical alarms (red), alert
alarms (yellow), and caution alarms (blue) that are tripped are listed below. Details and comments are displayed in the Message column.
5. Select Attribute Editor.
The Attribute Editor window for that table entry is displayed.
6. Select the Alarms tab, shown in the following figure.
7. Supply an appropriate number for the type of alarm that you choose to monitor.
In this example, the Alert Threshold alarm is set at greater than 1 to notify you when that server in the failover group is down.
8. Click the Apply button to save the value of the alarm and continue setting other values in the Attribute Editor
9. Click the OK button, which saves the value of the alarm and closes the window.
As soon as you set an alarm it takes effect.
10. Select the Actions tab and type an action to perform.
You can specify an action such as sending email or running a script for each alarm.
11. Select the Refresh tab to set the number of seconds between pollings.
The default value is 300 seconds (5 minutes).
Note
Do not set the Refresh value to less than 60 seconds. The load will interfere with the Sun Ray server performance.
12. Select the History tab to view information about the log file that records monitored values.
# /opt/SUNWsymon/sbin/es-start -c &
# /opt/SUNWsymon/sbin/es-start -c &
# /opt/SUNWsymon/sbin/es-start -c &
The total number of alarms set for the current server object is displayed at the top of the alarm summary window. Critical alarms (red), alert
alarms (yellow), and caution alarms (blue) that are tripped are listed below. Details and comments are displayed in the Message column.
Some cells in the table respond to a mouse-over event by displaying a pop-up window called a Tool Tip window. This window shows the
current status and when it last changed, plus the type of alarm, its value, and when it occurred or when the last alarm was cleared. The Tool
Tip time can also be the last time the agent was restarted. For example, on the Sun Ray System panel, a Tool Tip for Up Time (1/100ths sec.)
would be:
Steps
# /opt/SUNWsymon/sbin/es-start -c &
2. Double-click the appropriate folder (Sun Ray System, Sun Ray Services, Fail Over Group, Interconnect, and Desktops) in the left panel.
The right panel is populated with information about the selected object.
Details about the information displayed are described in the following sections.
The Sun Ray System properties displayed in the panel are explained in the following table.
Property Value
Host Name Name of server that was queried. This information is obtained when Sun Ray System is selected or on manual refresh.
Contact Name This information is obtained when Sun Ray System is selected or on manual refresh.
Up Time (measured in Number of hundredths of a second since the last of all the daemons critical to the Sun Ray server was started. A value of
hundredths of a 0 means the server is down and an alarm is tripped. The default refresh rate is 300 seconds (five minutes)
second)
Version List of version, build, and date of build of Sun Ray Server Software. This information is obtained when Sun Ray System is
selected or on manual refresh.
Install Date Date Sun Ray Server Software was installed. This information is obtained when Sun Ray System is selected or on manual
refresh.
Patch Information List of Sun-Ray-specific patches. This information is obtained when Sun Ray System is selected or on manual refresh.
Active Sessions Number of sessions based on logged-in sessions with a smart card plugged in, plus sessions for DTUs logged in without
smart cards. Set an alarm here to watch for overloading of this server. The default refresh rate is 300 seconds (five
minutes).
Total Sessions Number of active and suspended sessions. The default refresh rate is 300 seconds (five minutes).
Active Desktops Number of connected DTUs. The default refresh rate is 300 seconds.
Active Users Number of currently active users. When pseudo-tokens are allowed, which is a policy setting for non-smart card users,
this number includes DTUs at the login prompt. The default refresh rate is 300 seconds (five minutes).
Policy The policy that has been set. This information is obtained when Sun Ray System is selected or on manual refresh.
If, for example, utauthd is not running, all user sessions are disconnected.
Some of the daemons have two instances corresponding to their two functions: one to listen and one to interact. You can reset these values.
Status Value
Status Value
Interconnect Properties
The Interconnect panel populates with information about usable interfaces, as shown in the following figure.
Interface Table – The Interface table lists all the interfaces on the Sun Ray server. The Address is the IP address for the interface. You
entered this address as the Net Mask when you first configured your system.
The Status values are:
Status Value
DHCP Table – The DHCP table lists the interfaces that are used for the Sun Ray interconnect. Available Addresses lists the number of
addresses available for new end users. The alarms that are set here let the system administrator know when the Sun Ray server is running
out of addresses to give to users.
DTU Properties
The Desktops panel displays the status of all DTUs, as shown in the following figure.
In a failover group, you can monitor any desktop from any server.
Status Value
Property Value
Status 1 Running
2 Down
3 Displaying the green hourglass cursor
Problem: Sun Management Center's Detail window does not show a Sun Ray object for the Sun
Ray server node.
Load the Sun Ray module or enable the module manually.
4. If the Load status is not Yes, select the Sun Ray entry and then click the Load button.
This action loads the module and moves it to the Modules with Load Status list.
5. If the Enabled status is not Yes, select the Sun Ray entry and then click the Enable button.
6. Return to the Detail window.
The Detail window now shows a Sun Ray object for the Sun Ray server node.
Problem: The list of modules on the Modules tab does not include an entry for Sun Ray.
Add the module manually and restart its agent.
1. Issue the following command to add the module to the Sun Management Center and restart its agent:
# /opt/SUNWut/sbin/utsunmc
2. If a message displays indicating that the agent failed to start, type the following command to verify that the agent is running:
If the Sun Management Center agent is running, wait a few minutes and then check the Detail window.
3. If the agent is running, type the following command to start the Sun Management Center agent:
# /opt/SUNWsymon/sbin/es-start -a
Contents
When a user accesses a DTU, the DTU sends the user's token information to the Authentication Manager and requests access. If the user inserts a
smart card in the DTU, the card's type and ID are used as the token. If no smart card is inserted, the DTU's Ethernet address is used as a
pseudo-token.
You can administer tokens through the utuser command or the Admin GUI.
Sun Ray Server Software provides a way to designate one or more specific DTUs as dedicated token readers. A dedicated token reader is not used for
normal Sun Ray services, so it does not need a keyboard, mouse, or monitor. Inserting a smart card in a token reader does not enable hotdesking. It
does allow the administrator to assign the card to a user.
When you enable an authentication policy with registered users or token owners, be sure to specify smart card IDs for them. To use token readers
with regional hotdesking based on Sun Ray pseudo-tokens, use the Site-specific Mapping Library. See How to Configure a Site-specific Mapping
Library and How to Use Token Readers with Regional Hotdesking.
Steps
3.
3. Click the New button.
4. Type an identifier or select a token reader.
Steps
The utreader command enbles a DTU to be used as a token reader for registering smart cards. When a DTU is configured as a token reader,
inserting or removing a smart card does not initiate session mobility. Any session connected to that DTU remains connected to it regardless of card
movement events.
Token reader mode is useful when you want to determine the raw token ID of a smart card.
For instance, to configure the DTU with MAC address 0800204c121c as a token reader, type the following command:
# utreader -a 0800204c121c
To re-enable the DTU with MAC address 0800204c121c to recognize card movement events and perform session mobility based on the smart card
inserted into the DTU:
# utreader -d 0800204c121c
# utreader -c
The DTU you have selected is now set up to read smart card tokens.
6. Restart Sun Ray services.
The DTU is now a token reader.
# utuser -r <token-reader>
where token-reader is the MAC address of the DTU containing the smart card whose ID you want to read. Insert the smart card into the DTU and run
the utuser command. This command queries the DTU for the smart card token's ID and, if successful, displays it. For example:
# /opt/SUNWut/sbin/utuser -r 08002086e18f
Insert token into token reader '08002086e18f' and press return.
Read token ID 'mondex.9998007668077709'
Steps
To change the search criteria, type text in the Search text box.
Contents
If you see the older version of the icons, the firmware has not been upgraded or is failing. To make sure that you are using the latest firmware, see
How to Update Firmware Versions on DTUs.
On-Screen Indicates the current state of a client's connectivity. These icons are shown
Display as white icons. They can display even if the client is not connected to a
(OSD) server. and they typically provide the following detailed information:
Server Indicates a problem based on a specific server policy that needs attention.
Policy These icons are shown as blue icons. They are sent by the server in place of
a regular session, they may be overlaid by a concurrent client state OSD
icon, and they are not available if the client is behind a NAT router.
= Server
Policy Icon
1 Startup Sun Ray DTU is starting up and is waiting for Ethernet link.
3 Firmware Sun Ray DTU is storing new firmware in its flash memory.
Download
9 There is an "overcurrent" condition on the USB bus, that is, the total number of devices draws too much
current. Consider using a powered hub.
11 The server is authenticated and the graphic/keyboard network connections are encrypted.
12 The server is not authenticated and the graphic/keyboard network connections are encrypted.
13 The server is authenticated and the graphic/keyboard network connections are not encrypted.
14 The server is authenticated and the graphic/keyboard network connections are not encrypted.
15 Session Sun Ray DTU is refusing to talk to the server due to the server's refusal or inability to authenticate or
Connection encrypt the network connection.
Failure
16 USB bus is busy servicing a high-speed device, and the keyboard or mouse might not be responsive to
user input.
21 Startup Sun Ray DTU is booting up and is waiting for DHCP IP address and parameter assignment.
22 Startup Sun Ray DTU is booting up and is waiting for the initial connection to a Sun Ray server.
23 Network The connection between the Sun Ray DTU and the network is down. Check the network drop cable. If the
Status network drop cable is okay, check the network switch.
26 Startup Sun Ray DTU has connected to the server and is waiting for graphics traffic.
27 Session Sun Ray DTU is broadcasting to locate a Sun Ray server since either it was not provided with Sun Ray
Connection specific DHCP parameters or all of the specified servers are not responding.
Failure
31 Network The network link is up, the server is authenticated, and graphics/keyboard network connections are not
Status1 encrypted.
32 Network The network link is up, the server is not authenticated, and graphics/keyboard network connections are
1 encrypted.
Status
33 Network The network link is up, the server is authenticated, and graphics/keyboard are encrypted.
Status1
34 Network The network link is up, the server is not authenticated, and graphics/keyboard are not encrypted.
Status1
35 Sun Ray DTU has been disconnected from its server, either by a STOP-Q session disconnect event or by
the VPN session timeout value having been set and exceeded.
41 The server is authenticated, the client is authenticated, and the graphic/keyboard network connections are
encrypted.
42 The server is not authenticated, the client is authenticated, and the graphic/keyboard network
connections are encrypted.
43 The server is authenticated, the client is authenticated, and the graphic/keyboard network connections are
not encrypted.
44 The server is authenticated, the client is authenticated, and the graphic/keyboard network connections are
not encrypted.
46 No access to server.
51 Network The network link is up, the server is authenticated, the client is authenticated, and graphics/keyboard
1 network connections are not encrypted.
Status
52 Network
Status1
53 Network The network link is up, the server is authenticated, the client is authenticated, and graphics/keyboard are
Status1 encrypted.
54 Network The network link is up, the server is not authenticated, the client is authenticated, and graphics/keyboard
1 are not encrypted.
Status
60 Insert card. If the site's authentication policy allows access only by card, this icon is displayed to prompt
the user to insert a card. Access without a card is disabled.
61 Waiting for primary DTU. The DTU is a secondary DTU in a multihead group, and the primary DTU is not
currently connected.
62 Token reader. The DTU is a token reader. When a site policy disallows pseudo-sessions, a DTU configured
as a token reader displays the Token Reader icon instead of the Login dialog box.
63 Token reader error. The card is an unknown type or there is a reader error. This error is not restricted to
token reader units.
64 Waiting for session access. Access is temporarily denied, but the Sun Ray DTU automatically retries when
this condition is resolved.
1 - Press the Mute+Softer+Louder keys or Ctrl+Pause+N keys simultaneously to display the current network status.
B DCHP provided IP address, subnet mask, and router, but Sun Ray vendor-specific parameters are missing.
C DHCP provided IP address and Sun Ray vendor-specific parameters, but subnet mask and router are missing.
Power LED
Off Check to see whether the DTU is plugged in. Replace the DTU.
Blinking PROM is corrupted. Check that firmware downloads are configured and enabled, then power
cycle the DTU.
Card reader LED remains on even when card is Card reader hardware problem. Replace the DTU.
removed
The DTU Startup icon indicates that the DTU has passed the power-on self test but has not yet detected an Ethernet signal. The icon is displayed for
a few seconds as part of the normal startup process. When an Ethernet signal is detected, the Network Connection Verified OSD is displayed.
Problem: The DTU Startup OSD is displayed for more than 10 seconds.
Check that the Ethernet cable is plugged into the DTU correctly and that the other end is plugged in to the correct hub,
switch, or network outlet.
If the DTU is connected through a hub or a switch, verify that the hub or switch is powered on and configured correctly. A
link LED on the switch or hub indicates that the connection is alive.
If you see this OSD, wait until the download is complete. Downloading and saving the firmware takes less than a minute. If you interrupt the
download, the DTU has to download new firmware the next time it reboots.
Firmware download error codes are valid only with OSD icon 2.
E FW Load: No server
If you see this OSD, wait until the download is complete. Downloading and saving the new firmware takes less than a minute. If you interrupt the
download, the DTU has to download new firmware the next time it reboots.
The Firmware Download with a 4 error code icon is displayed when the DTU fails to download new firmware. The message "FW Load: Prevented by
barrier" indicates that the DTU already has a later version of the firmware.
In the syslog, the following message indicates that a barrier level has been set to prevent Sun Ray DTUs from downloading an earlier version of the
firmware.
The Session Refused icons are displayed during a possible security breach because authentication has failed.
The DTU is refusing to connect to a server because the DTU is unable to verify the validity of the Sun Ray server. This error can occur
only if an unknown Sun Ray server tries to emulate a valid Sun Ray server. This situation is a session security breach.
Problem: Icon shows the 50D message.
The Sun Ray server is refusing to grant a session to the DTU because the DTU is unable to fulfill the server's security requirements.
Upgrade the DTU's firmware version. This error can occur with firmware versions earlier than 2.0 when the server is
configured for hard security mode.
As an alternative, determine whether your site requires hard security mode. If not, the session can be enabled with soft
security mode.
The Bus Busy OSD indicates that the Sun Ray USB bus is servicing a high-speed device and the keyboard or mouse might not be responsive to user
input.
This icon is displayed during an unusually long print job and disappears when the job is done. No action is needed unless killing the print job is
necessary.
The Network Connection Verified icon indicates that the DTU has detected the Ethernet carrier but has not yet received its initial parameters or IP
address from the DHCP server. The icon is displayed for a few seconds as part of the normal startup process.
After the DHCP server has allocated an IP address, the icon is updated with the DTU's assigned IP address. When the network connection is verified,
the Sun Ray DTU connects to the Sun Ray server.
Verify that the DHCP server is running and has not run out of IP addresses to assign to clients.
Verify that the DHCP server is configured properly for network parameters.
Problem: The icon displays an IP address and an icon message, either 21A or 21B, depending on whether the Sun Ray server is on a
LAN network or a dedicated interconnect.
This condition occurs when the DTU receives an IP address from the DHCP but no other parameters. The Sun Ray DTU issues a
DHCP_INFORM request to obtain the Sun Ray-specific parameters.
Code 21 A indicates that the DTU received an IP address and is waiting for a response to its DHCP inform request.
Code 21 B indicates that the DTU received an IP address and IP router and is waiting for a response to its DHCP inform
request.
If no response is received, the Sun Ray DTU continues the startup process using only the IP address. In a private interconnect or simple
LAN configuration, the DTU can function successfully. However, performance of the Sun Ray DTU might be affected. If the Sun Ray
DTU is part of a complex LAN configuration, it can fail later in the start up process because it requires the additional parameters and
Sun Ray-specific vendor options to handle network operations, such as when a DTU is located several hops away from the Sun Ray
server's subnet.
Continue with the startup process, if possible, and at the next opportunity, do the following:
For LAN configurations with other non-Sun Ray DHCP services but no bootp proxy agent, verify the DHCP server and the Sun
Ray vendor tags.
For routed configurations, verify that the bootp proxy agent is configured correctly in the Sun Ray DTU's subnet and that it
points to one of the Sun Ray servers in the failover group.
For non-routed private interconnect configurations, the Sun Ray server performs the functions of a DHCP server. Verify that it
is configured properly for DHCP services.
When the Sun Ray DTU concludes the interaction with the DHCP server, it connects to a Sun Ray server and then interacts with the
server's Authentication Manager, indicated by the Waiting to Connect to Authentication Manager OSD. Occasionally, the Sun Ray DTU
is first routed to another Sun Ray server. In this case, the Redirection OSD icon is displayed for a few seconds and then, as the Sun Ray
DTU interacts with the new server's Authentication Manager, the Waiting to Connect to Authentication Manager OSD is displayed.
The Waiting to Connect to Authentication Manager icon indicates that the DTU has received its parameters from the DHCP server and it has
connected to the Sun Ray server but has not yet completed it authentication. The icon is displayed for a few seconds as part of the normal startup
process.
Problem: The icon displays for more than 10 seconds or the DTU resets after the icon is displayed.
Verify that Sun Ray services, including the Authentication Manager, are running on the Sun Ray server.
Verify that the DTU's IP address can reach the Authentication Manager.
Verify that the DTU's routing information, received from the Sun Ray server, is correct.
Verify that the bootp proxy agent is configured correctly in the Sun Ray DTU's subnet and that it points to one of the Sun
Ray servers in the failover group.
Run utquery for the DTU's IP address to see the parameters that the DTU received. If the parameters do not include a
AuthSrvr parameter, the DHCP server might not have sent the Sun Ray parameters or the parameters might not be correct.
To confirm that the DHCP server can be reached, check the value of the DHCPServer parameter.
To confirm that the DHCP server sends the proper Sun Ray-specific parameter values, check the value of the
INFORMServer parameter.
If a value is incorrect, look at your bootp relay configurations and DHCP server configurations for network and Sun
Ray parameters. For details of these parameters, see the utquery man page.
To restart DHCP on a Solaris server, type the following as superuser:
# /etc/init.d/dhcp stop
# /etc/init.d/dhcp start
The No Ethernet Signal OSD indicates that the DTU had an Ethernet address and an IP address but later lost the Ethernet signal.
Check that the Ethernet cable has not become unplugged from the DTU or from the switch or network outlet.
If the DTU is connected through a hub or switch, make sure that the hub or switch is still powered on.
The Wait for Session OSD indicates that the DTU is waiting for its X Window session. The icon is displayed for a few seconds as part of the normal
startup process.
If this icon is displayed for a long time, display traffic from the server is not arriving to the client. Some possible reasons for this problem includes:
The network (routers, switches, firewalls) is not correctly transmitting UDP traffic from the server to the client.
The server is attempting to display one of the Server Policy icons, but the client is behind a NAT router or gateway.
The X server (Xnewt or Xsun) that is the source of the display traffic on the Sun Ray server side is not working properly. It might be crashed
or hung.
The display manager (dtlogin on Solaris 10 or gdm on Linux) has failed to start an X server for the session. It might be crashed, hung, or
not configured properly. If you suspect that dtlogin configuration files have been corrupted, see How to Check and Fix Corrupted
Configuration Files (Solaris).
The Establishing VPN Connection icon is displayed while a DTU is trying to connect to the Sun Ray server through a VPN connection.
When the VPN connection is established, the VPN Connection Established icon is displayed.
To display current information about the Ethernet link, do one of the following at any time.
On a Sun keyboard, press the three audio volume keys simultaneously. To get the same effect on a non-Sun keyboard, type Crtl-Pause-N
.
Disconnect and reconnect the Ethernet cable.
A value of 10 indicates a link speed of 10 Mbps; 100 indicates 100 Mbps. A value of F indicates that the link mode is full duplex. A value of H
indicates half-duplex mode.
This icon usually displays if the policy disallows card access and a card is inserted.
The card or DTU is not registered. If ATI is configured for a site, the ATI script is run when this icon is first displayed. If the script registers the card,
this state might not last long.
This icon is displayed if only confirmed keys are allowed access by policy. It might be displayed if there is a key conflict, but other icons might display
instead.
This icon is displayed if the client is running old firmware that does not support encryption or client authentication and the server has "hard" security
mode set. This icon might also display in other security-related cases, such as key conflict or failed key validation, but other icons might display
instead.
(60) Insert Card Icon
If the site's authentication policy allows access only by card, this icon is displayed to prompt the user to insert a card. Access without card is disabled.
The DTU is a secondary DTU in a multihead group, and the primary DTU is not currently connected.
The DTU is a token reader. When a site policy disallows pseudo-sessions, a DTU configured as a token reader displays the Token Reader icon instead
of the Login dialog box.
The Card Error icon indicates that the firmware is unable to read the card's token due to one of the following causes:
The DTU is running old firmware.
The token's contacts are dirty, the contacts on the DTU's token reader are dirty, or the card is not properly inserted.
The token is malfunctioning.
The token is of a type that the firmware is not configured to read.
An error exists in the configuration for reading this type of card.
This icon indicates that the server is not allowing access at the current time. This problem occurs when a Sun Ray DTU loses power or the network
connection to the server is interrupted and the smart card from the Sun Ray DTU is inserted into a different Sun Ray DTU before the server has
timed out the lost connection. Because the old connection is still active, new connections using the same smart card are unable to gain access.
When this conditions occurs, the server checks the status of the old connection. After the time reserved for this check has elapsed (an initial default
of 10 seconds), the Sun Ray DTU connection is restarted and the condition should be automatically resolved. Either the session access is granted or
the Sun Ray DTU remains in this Waiting for Access state (64).
If a Sun Ray DTU continues to remain in this state, the same token is being used with another connection. Specifically, two physical tokens (smart
card, DTU, Sun Desktop Access Client profile) are trying to connect to the same session.
A security incident where a copied or fake smart card is used to gain access to the session.
A security incident where a copy of a Sun Desktop Access Client profile is used to gain access to the session. This situation might also
indicate a user error. Sun Desktop Access Client profile files should not be copied to a different computer or user account.
A registered token policy is in effect, alias tokens have been configured, and an alias token is still connected to the session the user is trying
to access. If access is denied because of a currently connected alias token, the connected alias token needs to be disconnected to regain
access. For example, the aliased smart card must be removed from its Sun Ray DTU.
If your application uses /dev/audio, the Sun Ray server software reroutes the audio signal appropriately.
% audioplay /usr/demo/SOUND/sounds/gong.au
If this command hangs, you might need to quit any other applications currently trying to play audio, for example, a browser. If you heare
the gong sound, your basic audio setup is working.
% utsettings
If the audio works with the clean configuration, then something is wrong in your browser's previous configuration.
1. Navigate to the shell or wrapper from which you started the audio player.
2. Set the environment variable LD_PRELOAD.
Installation logs:
/var/adm/log (Solaris only)
/var/log (Linux only)
Configuration logs:
/var/adm/log (Solaris only)
/var/log/SUNWut (Linux only)
General log files:
/var/opt/SUNWut/log
/var/opt/SUNWut/srds/log
/var/opt/SUNWut/srds/replog
Messages logged into /var/opt/SUNWut/log/messages are delivered through the syslog service described in the syslogd man page. The
general format of these messages is:
For example:
May 7 15:01:57 e47c utauthd: [ID 293833 user.info] Worker3 NOTICE: SESSION_OK pseudo.080020f8a5ee
CLIENT_ERROR ...Exception ... : cannot send Error encountered while attempting to send a keep-alive message to a DTU.
keepAliveInf
...keepAlive timeout A DTU has failed to respond within the allotted time. The session is being disconnected.
duplicate key: DTU does not properly implement the authentication protocol.
invalid key: DTU does not properly implement the authentication protocol.
NOTICE "discarding response: " + No controlling application is present to receive DTU response.
param
UNEXPECTED "CallBack: malformed Bad syntax from a user application such as utload or utidle.
command"
.../ ... read/1: ... Exception ... Error encountered while reading messages from the DTU.
.../... protocolError: ... Various protocol violations are reported with this message. This error condition is also a way for
utauthd to force the DTU to reset.
Problem: How do you get keyboard type information for a Sun Ray DTU?
No method currently exists to get the keyboard type information for a Sun Ray DTU.
Troubleshooting Installation
All Installations
utinstall: fatal, media-dir is not a valid You called the -d option, but The media-dir directory requires relevant
directory. media-dir is incomplete. patches and packages for installation. The
media-dir directory includes the Sun Ray
directory.
xxxxxx not successfully installed Might occur for the installation of Verify that he component xxxxxx is present
any application or patch if relevant in the installation media directory path and
packages have not been properly has the correct permissions, then run the
installed. utinstall script again.
{{A different version x.x of product has been detected. The Some of the applications provided Compatible and necessary applications are
other-product Software is only compatible with product y.y. with Sun Ray Server Software are included with Sun Ray Server Software.
You must either upgrade or remove the current product compatible only with certain Remove older versions, then run the
installation before proceeding. versions of other applications. utinstall script again.
Exiting ...}}
error, no Sun Ray software packages None of the Sun Ray components No action is required as the product is not
installed. are installed on this system. installed.
The following files were not successfully Some files were not properly Manually copy the listed files from the
replaced during this upgrade. The saved replaced as part of the upgrade. directory, overwriting the newer files if
copies can be found in <directory> applicable.
Linux Installations
The following packages were not The packages listed Use the rpm -e command to remove each listed rpm manually,
successfully removed xxxxxx ... have not been properly then run utinstall -u again.
removed.
Removal of product was not Removal of Sun Ray Check the log file for the package that started the problem and
successfully completed. See log file Server Software was manually remove it with the rpm -e command, then run
for more details. incomplete. utinstall -u again.
Solaris Installations
Cannot open for read admin-file The admin_default file is unreadable, Verify that the installation administration file exists (
or you called the -a option and the admin_default or other) and the permissions are
admin-file is unreadable. correct.
For SPARC platforms: You are attempting to install Sun Ray Upgrade to the supported version 10 of the Solaris
SunOS release is x.x, valid Server Software onto a Solaris software OS before installing Sun Ray Server Software.
releases are: 10 version that does not support SRSS 4.2.
For x86 platforms: You are not running a valid OS release for Upgrade to the supported version 10 of the Solaris
SunOS release is x.x, valid this platform. OS before installing Sun Ray Server Software.
releases are: 10
Please clean up the directory Other unrelated files were found in the Remove unrelated files from the directory.
/var/tmp/SUNWut.upgrade before preserve directory.
rerunning utinstall.
Please remove the existing You decided not to restore from the Remove the tar file before running utinstall
preserved file indicated tar file. again.
<preserved_tarfilename> before
rerunning utinstall.
utpreserve: unable to preserve The utinstall script failed to preserve Either exit and manually preserve these files or just
data. Error while creating existing configuration files. continue.
archive file
The following packages were not The packages listed have not been Use the pkgrm command to remove each listed
successfully removed xxxxxx ... properly removed. package manually, then run utinstall -u again.
Removal of product was not Removal of Sun Ray Server Software was Check the log file for the package that started the
successfully completed. See log incomplete. problem and manually remove it with the pkgrm
file for more details. command, then run utinstall -u again.
/etc/inet/hosts
/etc/inet/networks
/etc/inet/netmasks
/etc/inet/dhcpsvc.conf # including all DHCP-related files
/etc/nsswitch.conf
/etc/hostname.intf
The following files are modified during Sun Ray service startup:
/etc/inet/services
/etc/inet/inetd.conf
/etc/passwd
/etc/shadow
/etc/group
/etc/syslog.conf
/etc/pam.conf
/etc/dhcpd.conf
/etc/nsswitch.conf
/etc/opt/SUNWut/net/dhcp/SunRay-options
/etc/opt/SUNWut/net/dhcp/SunRay-interface-eth1
/etc/opt/SUNWut/net/hostname.eth1
/etc/opt/SUNWut/net/networks
/etc/opt/SUNWut/net/netmasks
/etc/hosts
/etc/passwd
/etc/shadow
/etc/group
SRSS also updates the GDM configuration file, custom.conf, to make sure it has the following entries, which are removed when SRSS is removed:
VTAllocation=false
DynamicXServers=true
In addition, display files are created for each Sun Ray DTU in the following directories:
PreSession
PostSession
Init
PostLogin
Log Files
Significant activity occurring on the Sun Ray server is logged and saved. The server stores this information in text files. The following table describes
the log files that are maintained.
Administration /var/opt/SUNWut/log/admin_log Lists operations performed during server administration. This log is updated
daily. Archived files are stored on the system for up to one week and are
annotated using numeric extensions, for example, from file name
admin_log.0 to admin_log.5.
Authentication /var/opt/SUNWut/log/auth_log Lists events logged from the Authentication Manager. The auth_log file is
updated up to a limit of 10 every time the server's authentication policy is
changed or started. The archived authentication files are annotated using
numeric extensions, for example, from auth_log.0 to auth_log.9.
Automatic /var/opt/SUNWut/log/utmountd.log Lists mount messages for mass storage devices. The archived mountd files are
Mounting annotated using numeric extensions, for example, from utmountd.log.0 to
utmountd.log.9.
Mass Storage /var/opt/SUNWut/log/utstoraged.log Lists mass storage device events. The archived storage files are annotated using
Devices numeric extensions, for example, from utstoraged.log.0 to
utstoraged.log.9.
Messages /var/opt/SUNWut/log/messages Lists events from the server's DTUs, including details of registering, inserting, or
removing smart cards. This file is updated daily. Archived files are stored up to
seven days or 3.5 MB, annotated with numeric extensions, for example, from
messages.0 to messages.5.
Web /var/opt/SUNWut/log/utwebadmin.log Lists web administration-related messages. The archived log files are annotated
Administration with numeric extensions.
The structure and content of the various messages written to these files and other SRSS log files is arbitrary and might change at any time. The
messages do not provide a stable interface for programmatic consumption.
The Default, Register, and Kiosk session types have normal login processes. When a problem occurs, investigate the following:
Sun Ray server configuration files. However, the Sun Ray Server Software itself modifies some configuration files. In most cases, these
changes are identified with SRSS-specific comments. Do not change these modifications.
Any X server startup files that have been modified
dtlogin status
Although the last four session types display icons on the Sun Ray DTU, they do not have login processes. If the user removes and reinserts the smart
card immediately, the icon disappears but the Wait for Session OSD icon remains. These session types and their OSDs do not cause concern. The user
can perform one of the following actions:
Problem: The dtlogin daemon cannot start the Xsun server properly.
See How to Check and Fix Corrupted Configuration Files (Solaris).
Multihead Video
The H264 and VC-1 streams are synchronized with the audio stream on the DTU. In a multihead group, the audio stream is directed only to the
primary DTU, so audio/video synchronization can only be performed on the primary DTU. When video is displayed on secondary DTUs, the
application must perform the A/V synchronization.
The monitor was powered off when the Sun Ray DTU was started
A bad cable
An older monitor
utresadm
TIMESTAMP The time the loss occurred in year-month-day-hour-minute-second format, for example, 20041229112512.
TOTAL PACKET Total number of packets sent from the server to the DTU.
BYTES SENT Total number of bytes sent from the server to the DTU.
PERCENT LOSS Percentage of packets lost between the current and previous polling interval.
LATENCY Time in milliseconds for a round trip from the DTU to the server.
utcapture Examples
The following command captures data every 15 seconds from the Authentication Manager running on the local host and then writes it to stdout if
any change occurs in packet loss for a DTU.
% utcapture -h |
The following command captures data every 15 seconds from the Authentication Manager running on the local host and then writes it to stdout.
The following command captures data every 15 seconds from the Authentication Manager running on server5118.eng and then writes the output to
stdout if any change occurs in packet loss for the DTU with ID 080020a893cb or 080020b34231.
The following command processes the raw data from the input file raw-out.txt and then writes to stdout the data only for those DTUs that had
packet loss.
% utcapture -i raw-out.txt
OSD Icons
Sun Ray DTU on-screen display (OSD) icons contain information that can help the administrator understand and debug network configuration
problems. The amount of information encoded into the icons has been significantly expanded in the firmware delivered with Sun Ray Server
Software. The icon structure and progression are described in detail in SRSS Troubleshooting Icons.
# /opt/SUNWut/sbin/utdesktop -l -w
# /opt/SUNWut/sbin/utsession -k -t token
Troubleshooting Printers
Problem: Sun Management Center's Detail window does not show a Sun Ray object for the Sun
Ray server node.
Load the Sun Ray module or enable the module manually.
The Detail window now shows a Sun Ray object for the Sun Ray server node.
Problem: The list of modules on the Modules tab does not include an entry for Sun Ray.
Add the module manually and restart its agent.
1. Issue the following command to add the module to the Sun Management Center and restart its agent:
# /opt/SUNWut/sbin/utsunmc
2. If a message displays indicating that the agent failed to start, type the following command to verify that the agent is running:
If the Sun Management Center agent is running, wait a few minutes and then check the Detail window.
3. If the agent is running, type the following command to start the Sun Management Center agent:
# /opt/SUNWsymon/sbin/es-start -a
# utdiskadm -s
2. For each stale mount point, close all references to the mount point.
3. For each stale mount point, terminate all processes that refer to the mount point.
4. Remove the mount point.
# umount <stale_mount_path>
Contents
Tuning Applications
Tuning the Java Desktop Systems
Tuning the Network
Network Switches
Network Load
Tuning the Sun Ray Server
Excessive Disk Swapping
Screensaver Resource Consumption
Tuning Applications
Some applications, such as intensive 3-D visual simulations, might run very slowly on a Sun Ray client.
Applications that use double-buffering such as pseudo-stereo viewers and applications that use high-frequency dynamic color table flips on 8-bit
visual displays might not show the proper result. Turn off antialiasing to save screen resources.
Install interactive applications such as web browsers and StarOffice(TM) and PC interoperability tools such as Citrix and Sun Secure Global Desktop
(SGD) software on the Sun Ray server. The applications benefit from faster transport of commands to the Sun Rays X server and network traffic is
reduced.
If an application can be configured to use shared memory instead of DGA or OpenGL(R), using shared memory results in improved performance.
Tuning the Java Desktop Systems
To tune desktop performance, use solid backdrops and wireframe window moves.
Network Switches
Some network switches do not work well with Sun Ray DTUs when the server-side connection is configured to run at 1 Gbps. Because the Sun Ray
DTUs run at 100 Mbps and the data is sent from the X Windows server in periodic bursts, these switches are required to buffer a certain amount of
data. This situation can happen even when the average data rate from the X server is well under 100 Mbps.
The X server is programmed in such a way that a certain allowed amount of data is sent at tick intervals. The original implementation had 50 ticks
per second. The X server is allowed to send at a certain specific rate granted by the Sun Ray DTU.
For example, if the Sun Ray DTU’s grant is 40 Mbps, it can send 5 MB per second in bursts that are sent every 1/50th of a second. This means that at
each tick, the server can send 100 KB of data at a rate of 1 Gbps. This rate would cause a queue buildup in the switch of close to 100 KB, which
would then drain out at 100 Mbps over the next 1/50th of a second.
The first action to mitigate this type of issue is to increase the number of ticks per second to 100 per second from 50. Thus, in the example above,
the X server would send 50 KB every 10 ms rather than 100 KB every 20 ms. This setting would improve the situation considerably, but the problem
would still remain. The 100 ticks per second rate was chosen because it corresponded to the normal resolution of the timer in the Solaris and Linux
software.
To increase the number of ticks per second beyond 100, the operating system's timer must also be increased. On the Solaris platform, use the
following procedure.
set hires_tick = 1
The hires_tick = 1 setting increases the system timer resolution to 1000 ticks per second.
Because the X server code uses the system setting, the X server's bursts of data now use the same value, 1000 ticks = 1 second, that is, 1 tick = 1 ms.
In the example, using the new tick duration results in the X server sending 5 KB of data every 1 ms.
Because the change to the tick duration decreases the amount of buffering required on the network switch, the performance of the Sun Ray DTUs
improve.
Network Load
In situations where network load or packet loss is too high, network cables or switch equipment might be defective in very rare cases.
To determine whether the Sun Ray server is swapping to disk excessively, use the vmstat command:
# vmstat 5
The solution is to add more memory or increase the size of the swap partition.
# pkgrm SUNWxscreensaver-hacks
# pkgrm SUNWxscreensaver-hacks-gl
If the SUNWxscreensaver-hacks-gl package is not removed successfully, remove the gl package and then remove the
SUNWxscreensaver-hacks-gl package.