Beruflich Dokumente
Kultur Dokumente
Index
1 INTRODUCTION ............................................................................................. 7
Page 1 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 2 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
5.1.2.1 Register a Service Provider of the Service oVirt Platform Provider .... 89
Page 3 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
5.1.9.1 Register a Service Provider of the Service RDS Platform Provider .. 128
Page 4 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 5 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 6 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
1 INTRODUCTION
UDS Enterprise provides a set of software elements for services lifecycle management,
administration and deployment of virtual services.
Page 7 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
There are different versions of the UDS software, each of them oriented to different
uses and scenarios:
UDS Enterprise: Ideal for VDI environments of any size, it allows to have
technical support in case of any doubt with the software or updates to new
versions. Requires subscription purchase.
UDS Free: Valid for small VDI environments (maximum of 10 users). Includes
all the features of the Enterprise version. It does not require a subscription
purchase.
UDS Evaluation: Designed for conducting Pilots, PoCs and in general tests
with a limited duration (60 days). It has no limitation on the number of users and
does not require acquisition of a subscription.
UDS software requires a Data Base (DB) to storage system configuration parameters.
To perform this function, UDS is compatible with MySQL starting version 5.5.
UDS Enterprise paid version requires an external Data Base. In case you dont have
one, VirtualCable will provide a DB in virtual appliance format, which is not included in
UDS software support.
UDS Enterprise Free Edition & UDS Enterprise Evaluation Edition feature an internal
MySQL Data Base. External DB integration is not supported in these versions.
NOTE: In case youre about to setup UDS Enterprise Free Edition or UDS Enterprise
Evaluation Edition, the sections included in this guide regarding UDS Data Base dont
apply, since as we explained before the DB is embedded in the UDS Server
component.
The main differences between the available UDS versions are shown in the following
comparative table:
Enterprise Free Evaluation
N of users Until illimited 10 Illimited
Duration Illimited Illimited 60 days
New Hypervisors? Yes No No
Database? External required Internal Internal
WAN Tunneler for conections? Yes Yes Yes
Security updates? Yes No No
Upgrade between versions? Yes No No
New modules? Yes No No
Support? Yes By incidence No
Premium Support? Yes No No
Page 8 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
1.2 Caracteristics
Tasks scheduling system (service deployment, user access control, etc ...)
through calendars
Secure WAN access for desktops and virtual applications using an SSL-
tunneler included in the subscription
Model of costs per subscription that entitles to support, new versions, updates
and patches of UDS Enterprise
Page 9 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
An optimal design of a services platform is essential in order to obtain all the benefits
which may be provided by the architecture. Each layer that forms this architecture may
be designed to fulfill its function without affecting the other ones.
UDS Servers: They are formed by a database (DB) to storage all the data
related to the environment, a connection Broker which will manage the desktop
services lifecycle and communication with the hypervisors and other service
providers; and a tunnel server to allow secure access from outside. All of them
will be served in virtual appliance format
Service Providers
Storage: They will host the servers, virtual and remote desktops, applications
and other services of the platform. The choice of the type of storage is an
important part of the design. Depending on the needs demanded by the users
in the desktop services, we may select the most appropriate one regarding
performance
With a clear idea of the architecture design, you may start scaling the platform, bearing
in mind the number of users that will access to it.
Page 10 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
In the following image, you can see an example of an architecture with UDS
Enterprise:
Page 11 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Example of deployment of services and virtual desktop applications for user access
through a LAN (extensible to users accessing from a VPN or LAN_extension):
Page 12 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Example of deployment of services and virtual desktop applications for user access
across a WAN (internet).
In order for UDS to be published on the internet, and that its services can be accessed
by users; two public IP addresses will be needed (this process is possible with a single
public IP address by changing default ports and setting internal NATs).
Page 13 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 14 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The features and technical requirements of each component are defined below:
Page 15 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
This is the software that mediates among connection clients and service providers.
This is the basic element of UDS, as it performs the functions of connection Broker to
the desktop services and enables the administration and management of virtual
desktop platforms defined as implemented services.
Memory: 1 GB
CPU: 2 vCPU
Network: 1 vNIC
Requirements:
1 IP Address
IP DNS
Network mask
IP Gateway
Domain name
Database IP
Activation code
Page 16 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Software that establishes secure connections to desktop services through WAN. It also
provides HTML5 access to the services.
UDS tunneler allows the connection from any device/browser/client to the desktop
services through a SSH tunnel without having installed any software beforehand.
Moreover, it allows RDP access to desktop services through HTML5.
Hard drive: 5 GB
Memory: 1 G
CPU: 2 vCPU
Network: 1 vNIC
Requirements:
1 IP Direction
IP DNS
Network mask
IP Gateway
Domain name
IP UDS Server
Page 17 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
This component is responsible for storing all system UDS data, such as service
providers, authenticators, connectivity and all the information needed to generate
statistics.
Currently, in UDS 2.1 version, database manager MySQL 5.5 version onwards are the
only ones supported.
IMPORTANT! In the event that you do not have said database manager, VirtualCable
can provide this component as a virtual appliance. This component is not included in
UDS Enterprise support.
Hard drive: 8 GB
Memory: 1 GB
CPU: 1 vCPU
Network: 1 vNIC
Requirements:
1 IP address
DNS IP
Network mask
IP Gateway
Domain name
*THIS COMPONENT DOES NOT APPLY TO UDS ENTERPRISE FREE EDITION &
UDS ENTERPRISE EVALUATION EDITION.
Page 18 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
This software performs the communication and interface functions for transmitting data
(virtual desktop status, machine name) and commands among the Broker and the
desktop services managed by UDS.
It is installed on the virtual machine as a service that will be used as a template (Gold
image) for generating desktop services groups based on Llinked Clones.
Windows 10
Windows 8.1
Windows 8
Windows 7
Windows 2008
Windows 2012
Windows 2012 R2
Requirements:
UDS Server IP
Page 19 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
This software allows the connection to the connection protocol to run desktop services.
Windows 10
Windows 8.1
Windows 8
Windows 7
Windows 2012
Windows 2008
Page 20 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Even though the UDS Enterprise components are hosted on a single virtual platform,
UDS is capable of managing the deployment of virtual desktops on multiple virtual
platforms that are completely independent of the virtual platform where UDS Enterprise
is hosted.
This section describes the requirements for installing UDS Enterprise on different
virtualization platforms and the requirements of the virtual platform on which the
software is to be installed.
Page 21 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
To find out the requirements of a VMware vSphere platform, you can access the
following documentation:
The VMware platform on which UDS will be deployed must meet the following
requirements:
At least one VMware ESXi server with a valid license is needed for hosting the
UDS servers and generating the virtual desktops
For UDS to be integrated and capable of sending requests to a vCenter, and for
these requests to be carried out, the user must have credentials with
administration rights on the VMware vSphere platform on which the virtual
desktops and applications are to be deployed
At least one Virtual Machine Port Group to which the virtual appliance of the
UDS platform is going to be connected must be established
At least one Virtual Machine Port Group to which the different virtual desktops
managed by UDS are going to be connected must be established
There must be at least 18 GB of free space on the hard drive to host the virtual
appliance that makes up UDS
There must be at least 3 GB of free RAM to host the virtual appliance that
makes up UDS
Page 22 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections between the different elements which make up the
UDS Enterprise platform must be enabled:
Page 23 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
UDS Enterprise can be deployed on oVirt 3.3, 3.4, 3.5.4, 4.0 and 4.1 platforms
The oVirt platform on which UDS will be deployed must meet the following
requirements:
At least one oVirt node server is required to host the UDS servers and generate
the virtual desktops
In order for UDS to be installed and able to send requests to oVirt-engine and
execute them, it is necessary to have the credentials of a user with
administration permissions on the oVirt platform on which the virtual desktops
are to be deployed
It is necessary to have defined at least one cluster to create and configure the
different virtual desktops managed by UDS
At least 18 GB of free disk space is required to host the virtual servers that
make up UDS
At least 3 GB of free RAM is required to host the virtual servers that make UDS
Page 24 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections between the different elements which make up the
UDS Enterprise platform must be enabled:
Page 25 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The RHEV platform on which UDS is going to be deployed must meet the following
requirements:
At least one RHEV server is needed to host the UDS servers and create the
virtual desktops
You must have at least one setup cluster for creating and configuring the
different virtual desktops managed by UDS
You must have at least one setup Logical network to which the virtual servers
of the UDS platform are going to be connected
You must have at least one setup Logical network to which the different virtual
desktops managed by UDS are going to be connected
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS.
Page 26 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections between the different elements which make up the
UDS Enterprise platform must be enabled:
Page 27 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The Microsoft Hyper-V platform on which UDS is going to be deployed must meet the
following requirements.
At least one Microsoft Hyper-V server with a valid license to host the UDS
servers and create the virtual desktops
It is necessary that Microsoft Hyper-V servers are not part of a Microsoft cluster
You must have at least one Virtual Switch to connect the virtual servers of
UDS platform
You must have at least one Virtual Switch to connect the different virtual
desktops managed by UDS
You must have the credentials of one user with administration rights on the
Microsoft Hyper-V platform where the virtual desktops are going to be deployed
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS
You must enable WSMan on every Hyper-V host used with UDS so that
Microsoft Hyper-V with UDS will perform properly
Page 28 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
winrm quickconfig
winrm set winrm/config/service '@{AllowUnencrypted="true"}'
winrm set winrm/config/service/auth '@{Basic="true"}'
Page 29 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections between the different elements which make up the
UDS Enterprise platform must be enabled:
Page 30 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The XenServer platform on which UDS is going to be deployed must meet the following
requirements:
At least one XenServer server to host the UDS servers and create the virtual
desktops
You must have at least one network to connect the virtual servers of UDS
platform
You must have at least one network to connect the different virtual desktops
managed by UDS
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS
Page 31 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections among the different elements which make up the
UDS platform must be enabled:
Page 32 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The Nutanix Acropolis platform on which UDS is going to be deployed must meet the
following requirements.
In order to setup UDS and Acropolis can receive and run UDS requests, you
must have credentials for a user with administration permissions on the
Acropolis platform where the virtual desktops are going to be deployed
You must have at least one network to connect the virtual servers of
UDS platform
You must have at least one network to connect the different virtual desktops
managed by UDS
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS
Page 33 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections among the different elements which make up the
UDS platform must be enabled:
Page 34 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The OpenStack platform on which UDS is going to be deployed must meet the
following requirements.
In order to setup UDS, and OpenStack can receive and run UDS requests, you
must have credentials for a user with administration permissions on the
OpenStack platform where the virtual desktops are going to be deployed
You must have at least one network to connect the virtual servers of
UDS platform
You must have at least one network to connect the different virtual desktops
managed by UDS
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS.
Page 35 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections among the different elements which make up the
UDS platform must be enabled:
Page 36 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
UDS can be deployed on OpenNebula platforms through the versions 5.0, 5.1 and 5.2.
The OpenNebula platform on which UDS is going to be deployed must meet the
following requirements.
In order to setup UDS, and OpenNebula can receive and run UDS requests,
you must have credentials for a user with administration permissions on the
OpenStack platform where the virtual desktops are going to be deployed
You must have at least one network to connect the virtual servers of
UDS platform
You must have at least one network to connect the different virtual desktops
managed by UDS
There must be at least 18 GB of free space on the hard drive to host the virtual
servers that make up UDS
There must be at least 3 GB of free RAM to host the virtual servers that make
up UDS.
Page 37 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The following connections among the different elements which make up the
UDS platform must be enabled:
Page 38 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
At this point we will detail the installation of the components of UDS Enterprise. The
installation procedure is the same for different virtualization platforms (VMware
vSphere, Microsoft Hyper-V, Citrix XenServer, etc...) supported by UDS.
Page 39 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
DNS server. This service is necessary for both the proper running of the virtual
platform as well as for the UDS virtual platform environment to be deployed
DHCP server. A DHCP server that enables to assign IP addresses to the virtual
desktop groups created by UDS
In order to configure the UDS network, you must have at least 3 IP addresses (Server,
tunneler and MySQL Database). To setup UDS Enterprise Free Edition or UDS
Enterprise Evaluation Edition you only need 2 IP addresses (Server and tunneler).
Network mask
Gateway IP address
Page 40 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Please, remember that UDS Enterprise Free Edition & UDS Enterprise Evaluation
Edition feature an internal database, so UDS Database setup is not required.
If VirtualCable provides the UDS DB virtual appliance, the following steps should be
followed:
User: root
Password: uds
Page 41 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
We configure the virtual machines network parameters. The file interfaces should be
modified and a static IP address should be assigned (the virtual appliance is configured
with dhcp by default).
It is also necessary to modify the resolv.conf file in order to configure the dns server:
Page 42 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the IP data of the VM are configured, it is ready to be used with UDS. The
MySQL server has configured the following DB by default to use it with UDS server:
Instance: uds
User: uds
Password: uds
If you need to create a new DB instance for UDS, you should perform the following
process:
User: root
Password: uds
Page 43 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
A user with administration rights is created on the new DB using the command:
Page 44 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the virtual machine that makes up the UDS Broker server is turned on, a client
console will be displayed to access the virtual machine.
NOTE:
In order to successfully configure a UDS Broker server, a MySQL database server with
a completely empty database must be configured. If you use a database which has
already been used and it contains data from another UDS version, all data will be
migrated in order to be used in UDS Server version 2.0 (database migrations are only
allowed from previous versions onwards).
UDS Enterprise Free Edition & UDS Enterprise Evaluation Edition dont require MySQL
DB, since the system automatically enables a local DB.
Page 45 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Host Name. This name has to be created in the appropiate name server
Broker Server UDS network data (IP Address, Network Mask, Gateway and
DNS)
Page 46 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Database: Database where the table structure will be created to host the data
needed for the UDS platform
Page 47 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
In this step, a username will be created in order to access UDS Administration for the
first time. The access of such user can be disabled in UDS advanced configuration
options. The following information must be filled in:
Username: User with administrator permission for managing the UDS platform
Password: Password for the administrator user created in the previous step
NOTE:
The assigned password to the UDS system administrator user will be also valid for the
Linux SO root user that hosts UDS software. It may be changed via console inside the
virtual appliance using the command passwd
Page 48 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
If all the data entered in the configuration wizard are right, click on Continue to start
the UDS Server virtual appliance configuration.
Page 49 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once all the steps are completed, the Broker server UDS has to be rebooted.
If you need to run the configuration wizard again to modify any data, youll have to
validate yourself on the server (using the root user and the password for UDS system
administration user fixed in Step 4) and execute SetupUDS.sh.
Once the new configuration has been setup, it is necessary to reboot the server
manually.
Page 50 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the virtual machine that makes up the UDS tunneler is turned on, a client console
will be displayed to access and start configuring the virtual machine.
NOTE:
To configure a UDS server tunneler successfully you must configure a UDS server
Broker and know its IP address or name.
Page 51 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Host Name. This name must be defined in the corresponding DNS server
UDS server Tunneler Network data (IP Address, Network Mask, Gateway and
DNS)
Page 52 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Broker Port: Communication Port with UDS server Broker. By default 443
Page 53 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 54 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once all the steps have been completed, the UDS server tunneler has to be rebooted.
If a rerun of the configuration wizard is needed to modify any data, we will have to
validate us in the server using the credentials we obtained in the Step 3 and run
SetupTunneler.sh
Once the configuration is finished, we will have to manually reboot the server for the
changes to be made.
Page 55 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The UDS actor is installed in the S.O. Windows or Linux (gold image) to be used for
the deployment of virtual desktops. It is also necessary that the RDS application
servers have the UDS actor installed in order to be able to present virtual application
sessions to the users.
In order to install UDS Actor, you must previously download in the UDS Broker the
suitable Actor for each platform (Windows, Linux and vApps).
In order to do that, connect to the UDS Broker via web browser and using credentials
for a user with administration permission to access the downloads.
Page 56 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The UDS Actors available for download will be displayed in the browser. Select the
Actor corresponding to the operating system or the service installed on the base
template, from which virtual machines and services will be deployed:
Page 57 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the UDS Actor for Windows OS has been downloaded and transferred to the
template, its time to strat the configuration:
NOTE:
Before UDS Actor has been setup, you need the IP address of the UDS server Broker.
Page 58 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Click on Install and the UDS Actor will begin its installation process:
Page 59 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the installation has been completed, the UDS Actor is configured:
Enter the IP address of the UDS server Broker and indicate if you will use a secure
connection and the level of generated logs.
We need to indicate the UDS Master Key that the UDS server Broker has created
(this code provides more security to the system). In order to obtain this code, you have
to access UDS administration (with a user with administration rights), go to Tools
section and there select Security tab and copy the code from the Master Key
parameter.
Page 60 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once these parameters have been configured, run the connection test to check the
connectivity to the UDS Broker.
Once the UDS Actor has been configured and installed, you can switch off the virtual
machine. It is now ready to be used as an UDS system virtual desktop template.
Page 61 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once we have downloaded the appropiate UDS Actor for the chosen Linux distro and it
has been transferred to the base template, we run the Actor in order to start the setup.
NOTE:
Before installing the UDS Actor we need the UDS server Broker IP address and name.
The setup may happen to fail because of some dependencies resolution problems, or
conflicts.
Once the dependencies have been installed we indicate the necessary data in the
configuration wizard of the UDS Actor
Page 62 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
We select how the communication between the Actor and the UDS server will be.
Finally, enter the UDS Master Key generated by the UDS server Broker (this code
provides the system with more security). To obtain this code, access UDS
administration (with a user with administration rights), go to Tools section and click
on Security tab and copy the code from Master Key parameter.
Paste the master key in the configuration wizard of the actor and finish.
Page 63 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Open the configuration of the actor and test the connection with the data above.
If you need to modify some data, such as the IP address / name of the UDS server or
the UDS Master Key, we can do this in this window.
Page 64 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The virtual machine can now be turned off and will be available for use as a virtual
desktop template of the UDS system.
NOTE:
In addition to the installation of the UDS actor will be necessary to have a connection
protocol to be used to connect to the generated desktops (For example, have installed
XRDP, x2go, etc ...)
If the installation of a previous version of the UDS Actor already exists in the base
template of the desktop, it will be necessary to completely uninstall and install the new
Actor. You can follow the instructions in this article.
Page 65 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Upon UDS Actor download and transfer we can execute the install wizard and proceed
with setup:
NOTE:
Before installing the UDS Actor we need the UDS server Broker IP address.
Page 66 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 67 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the installation has been completed, the UDS Actor is configured:
Enter the IP address of the UDS server Broker and indicate if you will use a secure
connection and the level of logs generated.
Once these parameters have been configured, run the connection test to check the
connectivity to the server Broker.
Page 68 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the UDS Actor for RDS has been configured and installed, you can proceed with
installing the features of RDS and integrate them with UDS Actor; hence you can
deploy and virtualize applications using RDS.
To proceed with UDS integration with Remote Desktop Services RDS you can check
our guide Install and Configure Microsoft RDS with UDS Enterprise available in the
documentation section under this link.
Page 69 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
To connect to a virtual desktop through any transport other than HTML5, it will be
necessary for the connecting client computer to have the UDS Plugin installed.
In the first access to a desktop or virtual application, UDS will automatically recognize
the Operating System from which the user is connecting and will offer the appropriate
plugin download for it.
At any time, we can access the plugin downloads window by displaying the user
options and selecting: "UDS Plugin".
Page 70 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
If once installed the system continues showing the installation screen of the plugin,
preventing access to virtual desktops, it is recommended to restart the browser and re-
login to UDS. If you continue despite the reboot, we will disable automatic detection of
the plugin by selecting the option: "WARNING: Automatic plugin detection is disabled".
Page 71 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once downloaded the UDS Plugin in its S.O. Windows (connection client), we will
execute it to proceed with its installation:
Page 72 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 73 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
After installation to the Windows connection client, the UDS plug-in will execute the
selected connection protocol (Transport) and connect to the desktop or virtual
application.
Page 74 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the UDS Plugin is downloaded to the Linux connection client, we proceed to
install it.
We are located in the path where we have saved the UDS Actor and we execute it.
It is possible that the installation fails because some dependency is missing, in which
case we install them:
Once installed on the linux client, the UDS plugin will execute the selected connection
protocol (transport) and connect to the desktop or virtual application.
Page 75 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
We can also install the UDS plugin (client) from the software installation tool of our
distribution.
Page 76 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 77 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
4 ADMINISTRATION OF UDS
Once the UDS platform has been setup, the system will be ready for its initial
administering and configuration. To do this, input the IP address or UDS Broker server
name through http or https access.
The first time you enter UDS administration dashboard, you must enter using the
administrator user and the password indicated in the UDS Broker virtual appliance
configuration script (step 3.2.2.)
Once you access the administration dashboard, you will be able to change the
password and create or select new users to enter to the administration dashboard.
If you already have a user with administration permission for UDS platform, enter that
user, the password and select the authenticator that will be used to validate the user.
(Only in case you have more than one authenticator).
Page 78 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
If more than one authenticator is connected to UDS platform and you would like to
access the administration dashboard with the administrator user and password
indicated in the configuration script of the UDS Broker virtual appliance (see 3.2.1
section), the selected authenticator wont be used, because this user wont be
validated against any authenticator.
Once inside UDS administration, the initial configuration of the services, that will make
a Service Pool in which deployment of virtual desktops and services is executed, will
start.
The configuration of each "Services Pool" must be approached like the building of a
puzzle, it is made up of different elements:
Page 79 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the elements of the first "Services Pool" have been configured, the
creation thereof will begin, repeating the process with the next "Service Pool", if
there is one
All configured "Services Pools" together will form the type of virtual desktop
deployment managed by the UDS platform.
Page 80 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
A Service Provider is responsible for offering IP services. The services offered by UDS
will be on-demand virtual desktops or applications provided by a virtualization platform
or persistent physical/virtual desktops assigned to specific users via IPs assignment.
In order to build a Service Pool, at least one Service Provider must be created.
Page 81 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Enter "Services", click "New" and select VMware Vcenter Platform Provider.
o Main:
Service provider name, vCenter server IP (field Host), Connection port with vCenter,
a username and password with administration rights on the vCenter.
Page 82 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Advanced:
Through the button Test we can test and make sure the connection is successful.
Upon saving, our "Service Providers" is now valid and ready to use for base service
creations in VMware vSphere.
Page 83 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
In order to modify any parameter in an already existing Service Providers all you
neew is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Page 84 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the platform vSphere, where Virtual Desktops is created, a base services of type
"VMware Vcenter Platform Linked Clones" should be created.
Select the "Service Providers" in which you like to create your " VMware Vcenter
Platform Linked Clones" and click "New":
Page 85 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Main:
Pub. Resource Pool: vCenter resources pool where the Linked Clones virtual
desktops will be hosted (if there are no Pools in the VMware infrastructure, they will be
created in the root).
Pub. Datastores: Location where the publication of the service will be stored. We can
select one, several or all the datastores. If you select more than one, the system will
always locate the new publications in the datastore with more free space (By default,
the system wont generate new publications in datastores with less than 30GB of free
space. This parameter can be modified entering the UDS system advanced options).
Remove found duplicates: If set to yes, UDS will remove any service with the same
name generated by UDS.
o Machine:
Resource Pool: vCenter resources pool where the template to be used by the service
is located.
Clones Folder: Location of the Linked Clones virtual desktops in the VMs view and the
vCenter templates.
Page 86 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Inc. Datastores: Location where the created Linked Clones will be stored. We can
select one, several or all the datastores. If you select more than one, the system will
always locate the new Linked Clone desktops in the datastore with more free space
(By default, the system wont generate new virtual desktops in datastores with less
than 30GB of free space. This parameter can be modified entering the UDS system
advanced options).
Machine Names: Root name of all of the Linked Clones virtual desktops to be
deployed on this service. (eg: Machine Names= UDSW8).
Name Length: Number of digits of the counter attached to the root name of the
desktops (ex: Name Length= 3, UDSW8-000... UDSW8-999).
When saving this configuration, we already have a valid "VMware Linked Clone
Base" in the VMware vCenter platform. We can register all VMware Linked
Clone Base" we need in the UDS platform.
Once the entire UDS environment has been configured and the first Service Pool has
been created, we will be able to observe how the virtual desktops based on VMware
Linked Clones are deployed on the vCenter server.
Page 87 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
The first task that the vCenter will perform will be to create a base machine (this
machine will be created each time we make a publication of a service) which will be a
clone of the template selected when registering the service, with a hard drive size and
features equal to those of said template.
Once the process of creating the base machine has been completed (the UDS system
calls it: UDS Publication name_service number_publication), the creation of virtual
desktops in the vCenter automatically begins (the UDS system calls it: UDS service
Machine_Name+Name_Length).
The hard drive space taken up by the virtual desktops (Linked Clones) will be
exclusively that which is taken up by the changes made by the users on the machines
after their initial connection.
Page 88 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Deploying the VDI platform via virtual oVirt infrastructure or RedHat Enterprise
Virtualization (RHEV).
o Main:
Page 89 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Advanced:
Page 90 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Through the button Test we can test and make sure the connection is successful.
Upon saving, our "Service Providers" is now valid and ready to use for base service
creations in oVirt.
In order to modify any parameter in an already existing Service Providers all you
neew is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Page 91 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the oVirt platform where the desktops will be created has been setup, you must
create base services based on oVirt/RHEV Linked Clones.
Select the Service Providers where an oVirt/RHEV Linked Clone is going to be created
and click on "New".
o Main:
Base Machine: Template for deploying the virtual desktops (Golden Image).
Cluster: oVirt node cluster that will host the deployed Linked Clones.
Datastore Domain: Storage established for deploying the Linked Clones. We can
select one, many or all the available datastores; in case of multiple datastore selection,
the system will always publish into the datastore with more free space.
Reserved Space: Minimum free space a datastore may have to be used by UDS
system.
Page 92 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Machine:
Memory: Amount of memory that will be assigned to the Linked Clones in MB.
Machine Names: Root name of all of the Linked Clones to be deployed in this service
(eg. Machine Names= Win7lab2).
Name Length: Number of counter digits attached to the root name of the desktops (ex:
Name Length= 3, Win7lab2000... Win7lab2999).
Machine Names: Root of the name of all Linked Clones to be deployed in this service
(ex: Machine Names = Win7lab2-).
Name Length: Number of digits of the counter attached to the root of the name of the
desktops (ex: Name Length = 3, Win7lab2-000 ... Win7lab2-999).
Page 93 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Page 94 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
After saving this configuration, we already have a valid "oVirt Linked Clone" in the oVirt
platform. We can register all "oVirt Linked Clone" we need in the UDS platform.
After the entire UDS environment has been configured (Services, Authenticators, Os
Managers and Transports) and created the Service Pool, we will be able to observe
how the virtual desktops based on oVirt Linked Clones are deployed on the oVirt-
engine server.
Page 95 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
In a Hyper-V Platform Provider you must configure at least the following parameters:
o Main:
Service Name, Microsoft Hyper-V IP server (Host field), connection port, user name
and password with administration rights on the Microsoft Hyper-V.
Page 96 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Advanced:
Page 97 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Through the button Test we can test and make sure the connection is successful.
Upon saving, our "Service Providers" is now valid and ready to use for base service
creations in Hyper-V.
In order to modify any parameter in an already existing Service Providers all you
neew is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Page 98 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
Once the Microsoft Hyper-V platform where the desktops will be created has been
configured, you must create base services based on "Hyper-V Linked Clone".
Select the Service Providers where a "Hyper-V Linked Clone" is going to be created
and click on "New".
o Main:
Datastores Drives: Location where the publication of the service and the Linked
Clones created will be stored. We can select one, several or all of the datastores
clicking the Ctrl button. If you select more than one, the system will always locate the
new publications and desktops in the datastore with more free space.
Reserved Space: Minimal free space that should be available in a storage space for it
to be eligible to be used by UDS.
Page 99 of 253
Installation Manual, Administration and User
Guide of UDS Enterprise 2.1
www.udsenterprise.com
o Machine:
Machine Names: Root name of all of the Linked Clones virtual desktops to be
deployed on this service. (eg: Machine Names= W1).
Name Length: Number of digits of the counter attached to the root name of the
desktops (eg: Name Length= 3, W7000...W7999).
Upon saving this configuration, we have a valid " Hyper-V Linked Clone " in the Hper-V
platform. We can register all " Hyper-V Linked Clone" we need in the UDS platform.
Once the entire UDS environment has been setup and the first Service Pools have
been created, we will be able to observe how the virtual desktops based on Microsoft
Hyper-V are deployed on the Microsoft Hyper-V server.
The first task the Microsoft Hyper-V server will perform will be to create a base
machine (this machine will be created each time we make a publication of a service)
which will be a clone of the template selected when registering the service, with a hard
drive size and characteristics equal to those of said template.
Once the process of creating the base machine has been completed (the UDS system
calls it: UDS Publication name_service number_publication), the creation of virtual
desktops in the Microsoft Hyper-V automatically begins (the UDS system calls it: UDS
service Machine_Name+Name_Length.
The hard drive space taken up by the virtual desktops (Linked Clones) will be
exclusively that which is taken up by the changes made by the users on the machines
after their initial connection.
o Main:
Service Name, connection port with XenServer, XenServer IP server (Host field), user
name and password with administration rights on XenServer.
o Advanced:
We will check that the connection has been correctly made clicking on the Test
button.
Upon saving this configuration, we have a valid "Service Providers" to start creating
base services in the XenServer platform.
We will be able to register all XenServer Platform Provider "Service Providers" we need
on the UDS platform.
In order to modify any parameter in a current Service Providers, we select it and click
on Edit.
Clicking the Maintenance button we can stop all operations running in UDS Broker on
a service provider. It is recommended to enter a maintenance service provider when
the communication with those service provider is lost or youre planning a maintenance
stoppage.
Once the Microsoft Citrix XenServer platform where the desktops will be created has
been setup, base services based on "Xen Clone" must be created.
Select the Service Providers where a "Xen Linked Clone" is going to be created and
click on "New".
o Main:
Storage SR: Location where the publication of the service and the Linked
Clones created will be stored. We can select one, several or all of the datastores
clicking the Ctrl button. If you select more than one, the system will always locate the
new publications and desktops in the datastore with more free space.
Only shared storage is supported.
Reserved Space: Minimal free space that should be available in a storage space for it
to be eligible to be used by UDS.
o Machine:
Base Machine: Template for deploying the virtual desktops (Gold image).
Machine Names: Root name of all of the Linked Clones virtual desktops to be
deployed on this service. (eg: Machine Names= W1).
Name Length: Number of digits of the counter attached to the root name of the
desktops (eg: Name Length= 3, W7000...W7999).
Once the entire UDS environment has been setup and the first Service Pools have
been created, we will be able to observe how the virtual desktops based on Citrix
XenServer are deployed on Xen Linked Clones.
Enter "Services", click "New" and select Nutanix Acropolis Platform Provider.
o Main:
Service Name, connection port with Nutanix Acropolis, Nutanix Acropolis IP server
(Host field), user name and password with administration rights on Nutanix Acropolis.
o Advanced:
We can check that the connection has been correctly made clicking on the Test
button.
Upon saving this configuration, we have a valid "Service Provider" to start creating
base services in Nutanix Acropolis platform.
We can register all Nutanix Acropolis Provider Service Providers we need in the UDS
platform.
In order to modify any parameter in a current Service Providers, we select it and click
on Edit.
Clicking the Maintenance button we can stop all operations running in UDS Broker on
a service provider. It is recommended to enter a maintenance service provider when
the communication with those service provider is lost or youre planning a maintenance
stoppage.
Once the Nutanix Acropolis platform where the desktops will be created has been
setup, base services based on "Nutanix KVM" must be created.
Select the Service Providers where a "Nutanix KVM Linked Clone" is going to be
created and click on "New".
Machine Names: Root name of all the Linked Clones virtual desktops to be deployed
on this service. (eg: Machine Names= W1).
Name Length: Number of digits of the counter attached to the root name of the
desktops (eg: Name Length= 3, W7000...W7999).
Upon saving we have a valid Nutanix KVM on Nutanix Acropolis platform. We can
register all Nutanix Acropolis Provider Service Providers we need in the UDS
platform.
Once the entire UDS environment has been configured and the first Service Pools
have been created, we will be able to see how the virtual desktops based on Nutanix
KVM are deployed on the Nutanix Acropolis server.
In "Services", click the button "New" and select OpenStack Platform Provider:
o Menu Main:
Service name, OpenStack Server IP (field Host), a username and password with
administration rights on OpenStack.
We can also indicate the connection port with OpenStack, specify access interface and
used domain name.
o Menu Advanced:
Upon saving our config, we have a valid "OpenStack Platform Provider " ready to start
creating base services in the plataform OpenStack.
In order to modify any parameter in an already existing Service Providers all you
need is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Once the platform OpenStack, where Virtual Desktops will be created, base services of
type " OpenStack Live Volume " should be created.
Select the "Service Providers" in which you like to create your " OpenStack Live
Volume " and click "New":
o Menu Main:
Region: Each region has its proper complete deployment in OpenStack, including its
own assessment criteria of the API, network and computing resources.
o Machine:
Machine Names: Root name of all linked clone virtual desktops to be deployed in this
service (eg: Machine Names = UDSW8-).
Name Length: Number of digits of the counter attached to the root name of the virtual
desktops (eg: Name Length= 3, UDSW8-000... UDSW8-999).
Upon saving the configuration we have a valid "OpenStack Live Volume" in the
plataform OpenStack. We can register as many "OpenStack Live Volume" as we need
in the platform UDS.
Once we have all the UDS environment properly configured, and and we have created
the first Service Pools, we can observe how deployments of virtual desktops, based
on OpenStack Live Volume, are made in the server OpenStack.
In "Services", click the button "New" and select OpenNebula Platform Provider:
o Main:
Name of the Service, IP of the OpenNebula server ("Host" field), a user name and
password with administrative rights to OpenNebula.
o Advanced:
By clicking the Test button, we check if the connection has been correctly made.
By saving this configuration, we have a valid "Service Providers" to start creating base
services in the OpenNebula host. We can register all OpenNebula Platform Provider
Service Providers we need in the UDS platform.
In order to modify any parameter in an already existing Service Providers all you
neew is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Once the platform OpenNebula, where Virtual Desktops will be created, base services
of type " OpenNebula Live Volume " should be created.
Select the "Service Providers" in which you like to create your " OpenNebula Live
Volume " and click "New":
o Main:
Datastores Drives: Location where the publication of the service and the Linked
Clones created will be stored. We can select one, several or all of the datastores
clicking the Ctrl button. If you select more than one, the system will always locate the
new publications and desktops in the datastore with more free space.
Machine Names: Root name of all the Linked Clones virtual desktops to be deployed
on this service. (eg: Machine Names= W1).
Name Length: Number of digits of the counter attached to the root name of the
desktops (eg: Name Length= 3, W7000...W7999).
o Machine:
Base Template: Virtual Machine template (Gold Image) used by the UDS system for
the deployment of virtual desktops.
Machine Names: Root of the name of all virtual desktops Linked Clones to be
deployed in this service. (Ex: Machine Names = UDSW8-).
Name Length: Number of digits of the counter attached to the root of the name of the
desktops (ex: Name Length = 3, UDSW8-000 ... UDSW8-999).
Once the entire UDS environment has been configured and the first Service Pools
have been created, we will be able to see how the virtual desktops based on
OpenNebula Live Volume are deployed on the OpenNebula server.
Assigning IP addresses and usernames will be done by order of access, that is, the
first user that accesses this service will be assigned the first IP address on the list.
If multiple users need access to same device, its necessary subscribe the IP of the
device as many times as many users we have.
In order to connect to the machine with the IP address assigned to a user, the machine
must have previously been switched on, the Terminal Services for Windows machines
must be enabled and the NX software for Linux machines must be installed.
In the creation of a "Static IP Machines Provider" we must indicate the name of the
service provider.
In order to modify any parameter in an already existing Service Providers all you
neew is select it and click on Edit.
Through the button Enter Maintenance Mode you can suspend all the operations
issued by UDS Broker for a given service provider. Its recommended to put your
service provider in maintenance mode in case the connection to this latter has been
lost or a stop for maintenance.
Once the "Service Provider" has been created for access to computers with a fixed IP
address, we create "Static Multiple IP" services.
Select the "Service Providers" on which we will create a "Static Multiple IP" and click on
"New":
We will enter a name for the service and enter one or more machine IP addresses
(they must be turned on and connected) to which access will be provided.
Enter one or more IP addresses of the machines that will be accessed and save the
changes:
The assignment of users and machines will be done in order of access, ie the first user
to connect to the service will be assigned the machine that responds to the first IP in
the list.
We will be able to register all the "Static Multiple IP" we need on the UDS platform.
Once the "Service Provider" has been created for access to computers with a fixed IP
address, we create "Static Single IP" services.
Select the "Service Providers" on which we will create a "Static Single IP" and click on
"New":
We will indicate a name for the service and enter the IP address of the machine (it
needs to be turned on and with connectivity) that will be provided access to the users.
List of servers: Listing of Microsoft RDS servers available for publishing applications.
In case of indicating more than one server the connections of the users will be
distributed between the servers.
User mapping: "Yes" indicates that specific users will be used to access applications,
"No" will use the UDS login user to access the applications.
User list for mapping: Mapping users belonging to an Active Directory who can log in
to the RDS application servers and will be used by UDS only to run a session of an
application.
User`s password: Password for all users in the "User list for mapping" section. It is
necessary that all "mapping" users have the same password.
Using the Test button we will verify that the connection is successful.
When saving this configuration, we already have a valid "Service Provider" to start
creating base applications in RDS. We can register all RDS Platform Provider Service
Providers we need in the UDS platform.
In order to modify any parameter in a current Service Providers, we select it and click
on Edit.
Clicking the Maintenance button we can stop all operations running in UDS Broker on
a service provider. It is recommended to enter a maintenance service provider when
the communication with those service provider is lost or youre planning a maintenance
stoppage.
Once the RDS application provider where the desktops will be created has been
configured, base services based on "RDS RemoteAPP" must be created.
Select the Service Providers where a "RDS RemoteAPP" is going to be created and
click on "New".
Upon saving this configuration, we have a valid RDS RemoteAPP". We can register all
RDS RemoteAP we need in the UDS platform.
NOTE:
UDS needs one or several RDS Windows 2012 external servers to connect and
provide applications. The server must be configured and properly integrated with UDS
Actor in order to work properly.
To configure and integrate RDS with UDS you can consult this document: Installation
and configuration of Microsoft RDS with UDS Enterprise available in the documentation
section of the web: www.udsenterprise.com
An Authenticator is not needed to create a Service Pool. But if the Service Pool hasnt
at least one authenticator assigned, there will be no users able to connect to UDS
platform desktop services.
You can choose between many types Authenticators either external (Active Directory,
eDirectory, OpenLDAP, etc) or internal (Internal Database y Autenticacin por IP).
You can choose between different types of authenticators as needed by your business
and platform.
This external authenticator allows access to users and groups of users, belonging to an
Active Directory, virtual desktops or applications.
o Main:
Priority: the priority of this authenticator, the lower that priority is, the higher it will
appear on the list of authenticators available in the user access window (this field
admits negative values).
Label: Enables direct validation in the authenticator, it allows to validate this latter in
the login page URL without going through the whole dashboard interface using this
format: UDSServer/login/label (e.g: https://UDSServer/login/AD)
o Credentials:
User: User with read rights on the authenticator in the format: user@domain
Clicking on the Test button, we can check if the connection has been established
correctly.
This authenticator is available to provide Novell network users and user groups access
to UDS desktop services.
o Main:
Priority: the priority of this authenticator, the lower that priority is, the higher it will
appear on the list of authenticators available in the user access window (this field
admits negative values).
Label: Enables direct validation in the authenticator, it allows to validate this latter in
the login page URL without going through the whole dashboard interface using this
format: UDSServer/login/label (e.g: https://UDSServer/login/eAD)
o Credentials:
User: User with read rights on the authenticator in the format: CN=user, O=domain
Clicking on the Test button, we can check whether the connection has been made
correctly.
o Main:
Priority: the priority of this authenticator, the lower that priority is, the higher it will
appear on the list of authenticators available in the user access window (this field
admits negative values).
Label: Enables direct validation in the authenticator, it allows to validate this latter in
the login page URL without going through the whole dashboard interface using this
format: UDSServer/login/label (e.g: https://UDSServer/login/int1)
o Advanced:
Different user for each host: This option allows connections to virtual desktops using
a single connection user ID. These types of connections are made creating multiple
users in the internal database by adding a root to existing user already existing at the
time of establishing a connection with the virtual desktop. This suffix is the IP of
connection client or its DNS name.
Reverse DNS: The behavior is exactly the same as in the previous option, but the
username structure would be different in this way:
The added suffix is the DNS name instead of IP. Good DNS resolution is mandatory for
this authenticator.
Accept proxy: This feature must be enabled when you have a component prior to the
access of UDS like for example a load balancer.
This feature must be enabled in environments where "Different user for each host"
option is used as well as load balancers.
5.2.4 IP Authenticator
The IP addresses function as the users of other authenticators allowing the direct
validation of the connection clients in the UDS login portal. User groups on an "IP
Authenticator" can range from specific network ranges to full subnets or specific IPs.
o Main:
Priority: the priority of this authenticator, the lower that priority is, the higher it will
appear on the list of authenticators available in the user access window (this field
admits negative values).
Label: Enables direct validation in the authenticator, it allows to validate this latter in
the login page URL without going through the whole dashboard interface using this
format: UDSServer/login/label (e.g: https://UDSServer/login/IP)
o Advanced:
Accept proxy: This feature must be enabled when you have a component prior to the
access of UDS like for example a load balancer.
In a "SAML Authenticator" we configure the authenticator name and data: Private Key,
Certificate, IDP Metedata, Entity ID, User name attrs, Group name attrs and Real name
attrs.
We can also indicate the priority that this authenticator will have. The lower that priority,
the higher it will appear in the list of available authenticators in the user access window
(this field supports negative values).
The "Label" field Enables direct validation in this authenticator, allows the user login
screen to validate with that authenticator even though the UDS environment has more
authenticators. To do this we will have to access the UDS login screen with the
following format: UDSServer/login/label (For example: https://UDSServer/login/saml)
This is a generic authenticator available within the UDS platform. By configuring the
correct parameters according to each case, we can define practically any
authentication service based on LDAP.
The user (Ldap User field) must be entered with the format: cn = user, dc =
domain_name, dc = domain_extension
We can also indicate the priority that this authenticator will have. The lower the priority,
the higher the number of authenticators available in the user access window (this field
will allow negative values), if we want to use an SSL connection and the "Timeout" time
in the connection with the LDAP server.
The "Label" field Enables direct validation in this authenticator, allows the user login
screen to validate with that authenticator even though the UDS environment has more
authenticators. To do this we will have to access the UDS login screen with the
following format: UDSServer/login/label (eg https://UDSServer/login/oldap)
Once the authenticator or authenticators have been configured, you must configure the
user groups that contain the users to which access to the desktop services is to be
granted. It is also possible to create metagroups, which will be used to combine several
groups.
To create a group, select the authenticator where we want to create or add the group.
In the new window displayed at the bottom of the window, select Groups tab and click
"new".
The search for user groups is done automatically in all authenticators defined in UDS,
except in the authenticators of type "Internal Database" and "IP Authenticator" (also it
is possible that in authenticators of type OpenLdap or eDirectory the option "search
"Does not work, having to indicate the group name manually). In this case, the groups
are discharged without possibility of searching.
To search for a group, click on the "Search" button. We can write a root of name to
narrow the search. If we leave it empty, we will see all the groups available in the
authenticator. If we need to add several groups, we will have to add them one at a
time.
Once the group is selected, click Accept. If you know the name, you can write it down
directly, but it is recommended to check that it appears in the right way in the search
option.
To create a metagroup, select the groups that will form part of the metagroup, choose
a name for the new group and click Accept.
A user will belong to this metagroup if he belongs to all the groups included in the
metagroup.
The users of the configured groups are automatically added to the system when they
connect to the UDS platform for the first time, except in Internal or by IP
authenticators, in which the users will have to be manually registered.
If we need to register new users manually, to assign special permissions before they
connect for the first time and they add themselves automatically, well have to select
the authenticator. Then, in Users tab click on "New".
The additional Staff parameter allows access to downloads (UDS Actor) and to UDS
administration.
The additional Admin parameter allows access to downloads (UDS Actor), to the
administration and also allows for the modification of advanced UDS configurations
(Tab Tools - Configuration). An Admin user has to simultaneously be a Staff
member.
By clicking "Search" button we can search users created in the authenticator and add
them.
Once the user has been created, click "Edit" to check that the user has been
automatically assigned to the group it belongs.
If we register a user that belongs to a group which is not registered in the authenticator,
it will appear without group and we wont be able to use that user.
The "Staff member" and "Admin" user options can be modified anytime.
To delete a user, a group or a metagroup, select it and click "Delete" button. If we have
registered users in the system that belong to a group and this group is deleted, the
users wont have an assigned group and they wont be able to be validated in the
system.
Select the Internal Database authenticator and in Groups tab click "New".
Once we have created the group or groups of users, we register users and assign
them to a group or several.
We select the authenticator of type "Internal Database" previously created and in the
tab "Users" click on "New".
The creation of a group in the by IP authenticator is different from the other ones,
because in this case it will be a range of IPs addresses which will be registered to allow
access to all the hardware within this range. This range of addresses is defined as
follows:
When the access client connection to the UDS portal login and IP address belong to a
given group, they will be automatically registered to the "Users" tab.
The UDS Actor, hosted on the virtual desktop or application server, is responsible for
the interaction among the OS and the Broker based on the configurations or type of OS
Manager chosen.
In order to perform VDI deployments via Linked Clones, you will have to select the
disconnection behavior of the Linked Clones, within the configuration of each OS
Manager. If a non-persistent desktop policy is configured, you can indicate user
downtime before the system will automatically log out.
A Linux OS Manager is used for virtual desktops based on Linux systems. It renames
the machines.
On Logout: What is the action that UDS is supposed to do on the VM when a user
closes a session:
Keep service assigned: (Persistent VM) when a user logs out the desktop
wont undergo any change. If this same user requests a virtual machine to the
system again, the system will provide the same virtual desktop
Remove service: (non-persistent VM) when a user logs out, the system will
destroy the desktop. If this same user requests a virtual machine to the system
again, the system will provide a new virtual desktop
Max. Idle time: When we configure non persistent desktops (Remove service)
we can specify a maximum idle time (in seconds) in the virtual desktop. When it
finishes, the UDS Actor will automatically log out from the virtual desktop. The
Max. Idle time field doesnt apply to persistent desktops (keep service
assigned).
Note: negative values or values less than 300 disable this option.
A Linux Random Password OS Manager is used for virtual desktops based on Linux
systems which require a higher level of security in user access.
It performs tasks of renaming and password change of existing users.
A random password is assigned to an existing local user, which has been previously
defined during the configuration process, in each new deployed virtual desktop, thus
providing a higher level of security in the access.
On Logout: What is the action that UDS is supposed to do on the VM when a user
closes a session:
Keep service assigned: (Persistent VM) when a user logs out the desktop
wont undergo any change. If this same user requests a virtual machine to the
system again, the system will provide the same virtual desktop
Remove service: (non-persistent VM) when a user logs out, the system will
destroy the desktop. If this same user requests a virtual machine to the system
again, the system will provide a new virtual desktop
Max. Idle time: When we configure non persistent desktops (Remove service) we can
specify a maximum idle time (in seconds) in the virtual desktop. When it finishes, the
UDS Actor will automatically log out from the virtual desktop. The Max. Idle time field
doesnt apply to persistent desktops (keep service assigned).
Note: negative values or values less than 300 disable this option.
A Windows Basic OS Manager is used for virtual desktops based on Windows systems
which arent part of a domain.
On Logout: What is the action that UDS is supposed to do on the VM when a user
closes a session:
Keep service assigned: (Persistent VM) when a user logs out the desktop
wont undergo any change. If this same user requests a virtual machine to the
system again, the system will provide the same virtual desktop
Remove service: (non-persistent VM) when a user logs out, the system will
destroy the desktop. If this same user requests a virtual machine to the system
again, the system will provide a new virtual desktop
Max. Idle time: When we configure non-persistent desktops (Remove service) we can
specify a maximum idle time (in seconds) in the virtual desktop. When it finishes, the
UDS Actor will automatically log out from the virtual desktop. The Max. Idle time field
doesnt apply to persistent desktops (keep service assigned).
Note: negative values or values less than 300 disable this option.
Domain: Name of the domain, to which virtual desktops will be joined to.
OU: Information of the Organizing Unit (OU) where the virtual desktops deployed with
this OS Manager are going to be registered (if we dont write anything, the desktops
will be located in the branch by default)
The OU admitted format is the following:
OU=name_OU_last_level,OU=name_OU_first_level,DC=name_domain,DC=extenstion_dom
ain
On Logout: What is the action that UDS is supposed to do on the VM when a user
closes a session:
Keep service assigned: (Persistent VM) when a user logs out the desktop
wont undergo any change. If this same user requests a virtual machine to the
system again, the system will provide the same virtual desktop
Remove service: (non-persistent VM) when a user logs out, the system will
destroy the desktop. If this same user requests a virtual machine to the system
again, the system will provide a new virtual desktop
Max. Idle time: When we configure non persistent desktops (Remove service) we can
specify a maximum idle time (in seconds) in the virtual desktop. When it finishes, the
UDS Actor will automatically log out from the virtual desktop. The Max. Idle time field
doesnt apply to persistent desktops (keep service assigned).
Note: negative values or values less than 300 disable this option.
On Logout: What is the action that UDS is supposed to do on the VM when a user
closes a session:
Keep service assigned: (Persistent VM) when a user logs out the desktop
wont undergo any change. If this same user requests a virtual machine to the
system again, the system will provide the same virtual desktop
Remove service: (non-persistent VM) when a user logs out, the system will
destroy the desktop. If this same user requests a virtual machine to the system
again, the system will provide a new virtual desktop
Max. Idle time: When we configure non-persistent desktops (Remove service) we can
specify a maximum idle time (in seconds) in the virtual desktop. When it finishes, the
UDS Actor will automatically log out from the virtual desktop. The Max. Idle time field
doesnt apply to persistent desktops (keep service assigned).
Max. Session time: The maximum time that a session will can stay open in hours (0 =
illimited)
UDS allows registering several networks to allow or deny access to virtual desktops or
applications. These networks, together with Transports will define what kind of access
the users will have to their virtual desktops or applications generated by UDS.
IP range, a complete subnet or a unique IP, in each case we use the following format:
Depending on the type of virtual desktop configured, the location and way of
connection to our virtual desktops, different types of transports must be created.
Both, the client and the virtual machine should have the connection protocol installed,
this latter will be used in the transport section.
Tunneled:
Directs:
"Transports" that are indicated as "direct" will be used for user access to virtual
desktops and applications from an internal LAN, VPN, LAN Extension, etc ...
"Transports" that are indicated as "Tunneled" will be used for user access to virtual
desktops and applications from a WAN. These "Transports" will rely on the Tunneler
UDS server to make the connection.
The "Transport" HTML5 can be used for user access to virtual desktops from all types
of access (LAN, WAN, etc ...). This "Transport" uses the Tunneler UDS server to make
the connection against the virtual desktops.
An "HTML5 RDP Transport" allows access to Windows and Linux virtual desktops
using the RDP protocol through a browser that supports HTML5 (for Linux desktops it
is necessary for machines to have the XRDP package installed and for Windows
desktops, RDP access has to Be enabled).
This transport uses the Tunneler UDS server to make the connection against the virtual
desktops, having to be previously configured for its correct operation.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 10443 (default port).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
Without Domain: states whether the user of the field Username belongs to a domain
or not.
o Parameters:
A "NX Transport (direct)" enables access to Linux virtual desktops through NX software
(the virtual machines and the connection clients must have NX installed).
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
o Parameters:
This transport uses UDS tunneler server to make the connection against the virtual
desktops, and it must be configured beforehand in order to work properly.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 443 (default port).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
o Parameters:
In addition, the other elements that make up the PCoIP suite (license server,
connection manager and Security Gateway) must be previously configured.
Priority: Priority will be the transport, the lower that priority, the higher will appear in
the list of available transport of a service. The transport with the lowest priority will be
the one used by default when clicking on the image of a service.
Networks Access: It allows or disables the access of users to a service based on the
network from where it is accessing and the network indicated in the "Networks" field.
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Credentials:
Empty creds: If this option is enabled, when we make the connection with the service
will ask for the credentials of access to the virtual desktop, in case of being "No" will be
redirected the credentials entered in the UDS login portal.
Username: The user name that will be used to log in to the virtual desktop, if this field
is empty, it will attempt to use the protal UDS login user if the "Empty creds" field is
"No" or will ask for credentials to indicate them Manual form.
Password: Contrasea del usuario del campo Username.
Without Domain: Indicates whether the username in the "Username" field belongs to
a domain.
A "RDP Transport (direct)" enables access to Windows virtual desktops through RDP
protocol (the virtual machines must have RDP service enabled).
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
Without Domain: states whether the user of the field Username belongs to a domain
or not.
o Parameters:
o Linux Client:
Use Alsa: Enables the use of audio through Alsa (Linux connection clients only).
This transport uses the Tunneler UDS server to make the connection against the virtual
desktops, having to be previously configured for its correct operation.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 443 (default port).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
Without Domain: states whether the user of the field Username belongs to a domain
or not.
o Parameters:
o Linux Client:
Use Alsa: Enables the use of audio through Alsa (Linux connection clients only).
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Without Domain: states whether the user of the field Username belongs to a domain
or not.
o Parameters:
o Linux Client:
Use Alsa: Enables the use of audio through Alsa (Linux connection clients only).
This transport uses the UDS Tunneler server to connect to virtual applications, it has to
be pre-configured for proper operations.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 443 (default port).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Without Domain: states whether the user of the field Username belongs to a domain
or not.
o Parameters:
o Linux Client:
Use Alsa: Enables the use of audio through Alsa (Linux connection clients only).
A "RGS Transport (direct)" allows access to virtual desktops Windows / Linux users by
the protocol Remote Graphics Software (RGS), it is necessary that both connection
clients and virtual desktops have RGS software installed and enabled.
The RGS transport is used for connections that need high graphics performance.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
o Credentials:
Empty creds: If this option is enabled, when we make the connection to the service
we will ask the access credentials to the virtual desktop, in case it is "No" the
credentials entered in the login portal are redirected.
Username: Username to use to log on to the virtual desktop, if it is empty, UDS will try
to user user's login; if the "Empty creds" field is "No", it will ask for credentials to
indicate them manually.
o Parameters:
Match Local Resolution: Adjust screen resolution of the client and server.
Redirect Mic: If enabled, it redirects Mic and voice input to the VM.
A "SPICE Transport (direct)" allows access to virtual desktops Windows / Linux users
through the SPICE protocol, clients need the SPICE connection (Virt-Manager) to be
installed.
SPICE transport is only possible to use with a service provider oVirt or Red Hat
Enterprise Virtualization (RHEV) and OpenNebula.
o Main:
Priority: Priority will be the transport, the lower that priority, the higher will appear in
the list of available transport of a service. The transport with the lowest priority will be
the one used by default when clicking on the image of a service.
o Advanced:
SPICE transport is only possible to use with a service provider oVirt or Red Hat
Enterprise Virtualization (RHEV) and OpenNebula.
This transport uses the UDS Tunneler server to connect to virtual applications and it
has to be pre-configured for proper operations.
o Main:
Priority: Priority will be the transport, the lower that priority, the higher will appear in
the list of available transport of a service. The transport with the lowest priority will be
the one used by default when clicking on the image of a service.
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 443 (default port).
o Advanced:
An "X2Go Transport (direct)" allows access to Linux virtual desktops by users using
X2Go software (software based on the NX protocol).
Both the client (client) and the virtual desktops (server) need to have X2Go installed
and enabled.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Credentials:
Username: username
o Parameters:
o Advanced:
An "X2Go Transport (tunneled)" allows access to Linux virtual desktops by users using
X2Go software (software based on the NX protocol).
Both the client (client) and the virtual desktops (server) need to have X2Go installed
and enabled.
This transport uses the Tunneler UDS server to make the connection against the virtual
desktops, having to be previously configured for its correct operation.
o Main:
Priority: The lower that priority is, the higher it will appear on the list of transports
available in virtual desktop window of each user (this field admits negative values).
Allowed Devices: Enables access to the service only with the selected devices, if
there is no one marked, no filtering is performed.
o Tunnel:
Tunnel Server: IP address with the connection port Tunnel UDS server. If desktop
access is via a WAN, you must enter public IP address of the Tunnel UDS server.
Format: https: // IP_Tunneler: 443 (default port).
o Credentials:
Username: username
o Parameters:
o Advanced:
With the use of calendars is also possible to schedule and automate certain tasks on a
"service Pool", such as making new publications, adjust the system cache or change
the maximum number of services.
Calendars defined in this section will be used in the "services Pool" to enable / deny
access to virtual desktops or applications or to configure scheduled tasks so you can
automate certain actions.
Upon saving we have a valid calendar and we can start creating rules that will apply to
services through the "Services Pool" calendar.
In a calendar, we can enlist various types of rules in which we could schedule the
availability of services at certain times.
Event: sets periods of execution, for this we specify the start time and duration of this
rule (in minutes, hours, days and months)
Repeat: In this section, you can configure the rule to repeat in days, weeks, months,
years and even specify working days, and also repeat intervals per day.
Upon saving we have a valid rule to be assigned to a service pool for scheduling
creation and managment of virtual services.
Once rules are configured in the calendars we can use them to enable or deny user
access to services, virtual desktops and applications.
To apply these calendar rules, you select a "Service Pool", and go in the menu "Access
Calendars" tab and click on "New"
We indicate the priority access, select an existing calendar and mark the actions that
apply in accessing the service.
Once rules are configured in the calendars we can use them to schedule Certain tasks
on a "Service Pool".
To apply these rules to a service pool, we select a service pool and go to the tab
"Scheduled actions" and click on "New"
Select an existing calendar, the time during which the action will be executed and
select the action to perform:
Set initial services: Re-adjustment of virtual desktops initially created by the system.
These desktops are configured and ready to be assigned to a user.
Adjust the size of the cache: Re-adjustment of virtual desktops always available in
the system cache. These desktops are configured and ready to be assigned to a user.
Change the maximum number of services: Modify the maximum number of virtual
desktops in the service pool, created by the system.
Adjust the L2 cache size: Re-adjustment of virtual desktops always available in the
L2 cache system. These desktops are configured and put in suspension mode.
Upon saving, we have a scheduled task that can perform real actions on a service
pool.
Once the different pieces of UDS platform are configured, Service Pools can be
created. Services Pools are made up of a Base Service created from a Service
Provider and an OS Manager. You must indicate one or several Transports, one or
several accesses Network (if no access network is specified, all networks will be
allowed) and a group or groups of users to access this service.
o Main:
Name: Service name which will be shown to the user to access the virtual desktop.
Show Transports: If it is enabled, the users can select and access a desktop through
different transports. In case more than one is available, if it is not enabled, users only
will be able to access the desktop through the transport by default (the one with less
priority).
Publish on creation: If this option is setup, the system will publish the new
Service Pool when the user saves the creation of the new "Service Pool". If is is not
enabled, the desktops will have to be manually published (from Publications tab).
o Display:
Associated image: Image associated to the service. It must first be added to the
image repository accessible from "Tools" - "Gallery" section.
Pool group: Enables grouping different services. In order to assign a "pool group" this
has to be previously created in the "Tools" section - "Services Pool Groups".
o Availability:
Initial available services: Virtual desktops that will be created, configured and will be
initially available in the system.
Services to keep in cache: Virtual desktops available in the system cache. These
desktops will be configured and ready to be assigned (this number of desktops will be
automatically generated until the maximum number of machines indicated in the field
"Maximum number of services to provide" will be reached).
Services to keep in L2 cache: Virtual desktops in sleeping mode. These desktops will
be configured and ready to be assigned when the system demands new desktops.
Virtual desktops generated in the cache level 2 skip to cache level 1 at the time that the
system is requested.
We save the new Service Pool and the system will start generating virtual desktops
based on the configured cache (Availabiliy tab).
By means of the "Delete" button we can completely eliminate a "Service Pool" and with
"Edit" we can modify it.
In "publications" and if you have set the "Publish on creation" option, the system will
start with the publication of the machine generating the service base on which will be
deploying virtual desktops.
Once a "Service Pool" is created, we select it and well have the following control and
configuration menus available:
Selecting the virtual desktop and clicking on "Delete" we can delete it manually.
Cache: Virtual desktops available in the system cache (including level 2 cache
machines). These desktops will go through different states:
o Waiting OS: The virtual desktops are being configured with the parameters
indicated in the OS Manager
o Valid: Virtual desktop available to be used
We select the Authenticator and based on this choice we select the Group Name.
Transports: The Transport to make the connection with the virtual desktop
(beforehand added in the Transports section) will be indicated. The "Transport" with
less priority will be configured by the system by default. For the other ones, the user
will have to open the pull-down menu in the virtual desktops access window and select
the one that corresponds
Select the Transport" we want to use in this "Service Pool" and save.
Publications: From this menu, we will be able to perform a new publication of the
service (for example if we have updated our base machine with new applications or
patches of S.O. and we want all our virtual desks to take these changes). Once the
publishing process is finished, the entire system cache will be regenerated with the
new Linked Clones based on this latest publication
If we perform a new publication, a new base machine will be generated and, once
available, the system will remove the virtual desktops from the previous version and
generate new ones based on the new publication.
In UDS Enterprise administration dashboard you can assign access permissions for
the different elements, users and groups of users. The permissions will be directly
assigned on each element and will also apply to sub-elements.
Once applied, the users with Staff member option enabled will be able to access this
administration element with the given permissions.
In order to revoke user or group permissions, select it and click on Revoke user
permission / Revoke group permission.
Permissions "Full Access" may only be applied to elements of the second level of the
sections "Services", Calendars and "Service Pools". In the items "Authenticators" "OS
mnagers" and Connectivity "will only be possible to apply read permissions.
Once one or several Service Pools are available, we can run a connection to a virtual
desktop. Access UDS Enterprise via web browser (Internet Explorer, Chrome and
Firefox browsers are supported), enter a valid username and password and select the
authenticator if more than one is available.
In Services dashboard, the available services for that user will be displayed. Click on
the one you want to run.
By default, if we click directly on the service image, the connection with the Transport
which has the lower priority will be performed. If several Transports are setup, a pull-
down menu will be displayed and you will be able to select the Transport you are going
to use to connect to the virtual desktop.
In order to start the connection with the virtual machine, it is necessary to have the
UDS Plugin installed on the client machine (in case it is not installed the system will
provide the appropriate version for each OS) in order to start the connection for all
transports except for HTML5 transport.
Example of NX Connection:
Once the connection is made, the virtual desktop will be available for use.
UDS provides advanced parameters which will define the running of the system. These
parameters will be responsible for defining security, connectivity, operating mode
both of UDS system and its communication with the virtual platforms (vSphere,
oVirt/RHEV, Hyper-V, XenServer, Acropolis) registered on UDS.
This manual shows only some of the system variables, which are considered the most
useful ones to the management of virtual desktops.
Here you can find the system variables that are considered to be the more useful ones
to manage the virtual desktops. When using the variables which arent mentioned here,
it is recommended not to modify the default values, as some of them indicate how the
system has to work (number of simultaneous tasks, time for tasks execution,
programmed checks, etc) and a wrong parameter modification may completely stop
the system or make it work in a wrong way.
Once the values of one of the UDS advanced configuration variables have been
modified, it will be necessary to reboot the UDS Server so that the changes will be
applied.
If you want to modify any value which isnt included in this section, we recommend you
to contact the UDS Enterprise support team in order to verify that change and confirm
that it doesnt affect in a negative way to the running of UDS system.
UDS has a repository of images that may be associated to a Service Pool" to facilitate
the identification of the virtual desktop. The supported formats are: PNG, JPEG and
GIF. The maximum image size is 256 Kb.
To access UDS image Gallery, enter "Tools" section and select "Gallery":
Click on New to add the image to the repository and write a name. Click on Select
image to search the image you want to save.
Once the image is stored, it will be available in order to be assigned to a Service Pool
(see more details in 4.7).
UDS services group allows for easy access and location; nonetheless, to each service
group there can be assigned a name and image. If a "Pool Group Services" is not
defined all services will be located in the default group created by the system.
To access and create new "Pool Services Group", we access the "Tools" section and
select "Services Pool Group":
Select "New" and indicate a descriptive name, assign priority pool group (groups with
small priority numbers will appear first in the list) and associate an image.
Once created, the "Pool Service Group" will be available for allocation to a "Service
Pool" (for details go to 4.7).
7.3 Reports
UDS generates automatically reports about different platform elements.
Once the report is created, well obtain a list of users belonging to that authenticator:
User access: It creates a report with all user accesses to the system in a specific date
range. To create the report, select the Statistics / Users access report by date group
and click on Generate report and select the date range and the number of intervals
Once the report is generated, youll get a graphic and a list with all users accesses:
Service Pool performance: It creates a report about the use of a services pool in a
specific date range. In order to create the report, select the Statistics / Pools
performance by date group, click on Generate report and select the pool, date range
and number of intervals:
Once the report is created, youll get a graphic and a performance list of the selected
Service Pool:
In order to access the UDS advanced configuration parameters, access Tools section
and click Configuration:
7.4.1 UDS
The most important parameters regarding UDS internal procedures, appearance and
communication with the hypervisor platforms.
AutorunService = It performs direct access to the virtual desktop when a user only
has one service assigned (0 = off 1 = on).
If this parameter is turned on, the users who only have one virtual desktop assigned
will connect to it straightaway, the window where you select the service wont appear
and the first configured transport will be used.
Default value 0.
CustomHtmlLogin= HTML code for partial customization of UDS login page. The
code you enter will appear under the user login box in the UDS Access dashboard.
Empty by default.
If this variable is turned on, you must use a short name to see an authenticator and
allow user access to the system.
Default value 0
Default value 0
StatsDuration = It indicates how long the system will keep the statistics.
UDSTheme = Name of the folder which contains the HTML templates for the login
Windows, user, preferences, downloads, etc
7.4.2 RGS
Find below the description of the parameters related to the RGS Transport:
TunnelOpenedTime = Maximum time the tunnel will wait for the RGS connection to be
opened.
If the connection isnt carried out in the time indicated in this variable, it will be
canceled and you will have to make the connection again (if you make the connection
using slow clients, it is recommended to increase this value)
7.4.3 SAML
Find below the description of the parameters related to the SAML authenticator:
If it is enabled, when you logout from UDS you also logout from SAML.
Default value 0.
IDP Metadata Cache = Time the IDP.m searched metadata are kept.
User cleanup = It indicates how often the system cleans up the users without activity.
If a user remains inactive for the time indicated in this variable, the system will delete it.
7.4.4 IPAUTH
7.4.5 NX
7.4.6 CLUSTER
7.4.7 WYSE
Find below the description of the parameters related to the connection with
Wyse clients:
Colors = It defines the quality of the colours displayed during the connection.
For more details about these parameters see Wyse official documentation or the
following reference guide:
http://www.freewysemonkeys.com/downloads/wtos/Wyse%20Thin%20OS%2064%20P
arameters.pdf
7.4.8 ENTERPRISE
Find below the description of the parameters related to UDS Enterprise subscription:
During the UDS Server configuration you must indicate a valid serial number. Using
this variable you can update or change it.
7.4.9 SECURITY
Find below the description of the parameters related to UDS system security:
AllowRootWebAccess = It allows the root user login via web (0 = off 1 = on).
The modification of this variable doesnt affect the root user access through the
administration client.
Default value 1.
RootPass = Root user password, previously indicated in the UDS Server configuration
script.
By default: root.
Trusted Hosts = Hosts considered to be secure by UDS. These host can make
sensitive requests to UDS, for example tunnelers (it is recommended to modify this
variable so that the only displayed option is the list of tunnelers).
UserSessionLength = It indicates how long the user session will be opened. After this
period, it will be necessary for the user to authenticate himself again in the system.
7.4.10 VMWARE
Find below the description of the parameters related to VMware vSphere virtual
platform:
If the VMware platform datastores selected to create services in UDS have less free
space than the value of this variable, the virtual desktops wont be created. Once this
value is modified or the needed space is available, the system will work properly.
In order to flush the UDS systems cache, enter the Tools section and click on Flush
cache.
Inventory update: it is possible that when you edit a "Service", some elements
as datastores, networks, base machines, etc. recently added, are not available.
To view them, we will have to flush the system cache. In this way, the Broker
will again make the request to the hypervisor and data will be updated
8 ABOUT VIRTUALCABLE
VirtualCable also offers a broad portfolio of professional services in order to help its
clients in both installation processes and UDS Enterprise configuration and in
virtualization projects with other platforms.
All the proper names of programs, operating systems, hardware, etc. that appear in
this document are registered trademarks of their respective companies or
organizations.
All rights reserved. The content of this work is protected by law, which establishes
prison sentences and /or fines in addition to appropriate compensation for damages for
the ones that copy, plagiarise, distribute or communicate publically, whole or in part, a
literary, artistic or scientific work or its transformation, interpretation or artistic execution
fixed in any type or format or communicated through any means without the required
authorization.
-END OF DOCUMENT-