Dell Thin Client Admin Guide
Dell Thin Client Admin Guide
0
Administrator’s Guide
November 2020
Rev. A04
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
Contents
Chapter 1: Introduction................................................................................................................. 8
Supported platforms........................................................................................................................................................... 8
What's new in ThinOS 9.0.4024 (MR3) release?........................................................................................................ 8
What's new in ThinOS 9.0.3030 (MR2) release?........................................................................................................8
What's new in ThinOS 9.0.2081 (MR1) release?......................................................................................................... 9
What's new in Wyse Management Suite 2.1?...............................................................................................................9
What's new in ThinOS 9.0?.............................................................................................................................................10
What's new in Wyse Management Suite 2.0?............................................................................................................ 10
Feature comparison between ThinOS 9.0 and ThinOS 8.6..................................................................................... 10
Other documents you may need.................................................................................................................................... 12
Contents 3
Configuring thin client settings and connection broker settings...........................................................................35
Configure ThinOS using Admin Policy Tool.................................................................................................................36
Configure the Admin Policy Tool............................................................................................................................. 36
Admin Policy Tool feature list...................................................................................................................................36
Locking the thin client......................................................................................................................................................38
Shut down and restart..................................................................................................................................................... 39
Battery information...........................................................................................................................................................40
Login dialog box features................................................................................................................................................. 41
View the system information...........................................................................................................................................41
Sleep mode......................................................................................................................................................................... 42
Enable sleep manually.................................................................................................................................................42
Import certificates to ThinOS from Admin Policy Tool or Wyse Management Suite....................................... 43
ThinOS system variables................................................................................................................................................. 43
4 Contents
Microsoft Teams Audio Optimization........................................................................................................................... 77
Citrix ADC............................................................................................................................................................................78
Citrix two-factor authentication.............................................................................................................................. 79
Configure Citrix ADC using LDAP and RSA.......................................................................................................... 79
Configuring Citrix ADC using DUO.......................................................................................................................... 79
Configure Citrix ADC using CensorNet MFA authentication............................................................................80
Citrix ADC Native OTP...............................................................................................................................................80
Citrix Federated Authentication Service SAML with Microsoft Azure Active Directory............................81
Configure Citrix NetScaler using Okta................................................................................................................... 82
Citrix Cloud services.........................................................................................................................................................83
Getting started with Citrix Cloud............................................................................................................................ 83
Automatically configure using DNS for email discovery ......................................................................................... 83
Citrix HDX Adaptive transport (EDT)...........................................................................................................................84
Enable HDX Adaptive Transport.............................................................................................................................. 84
HDX Adaptive Display V2................................................................................................................................................ 84
Enable HDX Adaptive Display V2.............................................................................................................................85
Browser Content Redirection.........................................................................................................................................85
Enable Browser Content Redirection..................................................................................................................... 85
HTML5 Video Redirection...............................................................................................................................................86
Windows Media Redirection........................................................................................................................................... 86
Enable Windows Media Redirection........................................................................................................................86
Enable UDP audio in a Citrix session............................................................................................................................ 87
QUMU Video Optimization Pack for Citrix..................................................................................................................87
Keyboard layout synchronization in VDA..................................................................................................................... 87
Keyboard enhancements on Windows VDA..........................................................................................................93
Citrix Self-Service Password Reset..............................................................................................................................93
Before resetting a password or unlocking an account.......................................................................................93
Use the Account Self-Service..................................................................................................................................93
Unlock an account.......................................................................................................................................................94
Citrix SuperCodec............................................................................................................................................................. 94
Anonymous logon.............................................................................................................................................................. 95
Configure the Citrix session properties....................................................................................................................... 95
Using multiple displays in a Citrix session................................................................................................................... 95
USB Printer Redirection.................................................................................................................................................. 96
Configure the Citrix UPD printer ..................................................................................................................................96
Contents 5
Configure the serial settings................................................................................................................................... 109
Configure the camera device...................................................................................................................................110
Configure the Bluetooth settings............................................................................................................................ 111
Secure Digital cards................................................................................................................................................... 113
Configuring the printer settings....................................................................................................................................113
Configure the ports settings....................................................................................................................................114
Configure the LPDs settings....................................................................................................................................114
Configure the SMBs settings.................................................................................................................................. 115
Using the printer setup options.............................................................................................................................. 116
Using the Help............................................................................................................................................................. 117
Reset to factory defaults................................................................................................................................................117
6 Contents
Import unassigned users or user groups to public cloud through active directory....................................138
Access Wyse Management Suite file repository................................................................................................ 138
Contents 7
1
Introduction
Thin clients running Dell Wyse ThinOS firmware are designed solely for optimal thin client security and performance. These
efficient purpose-built thin clients offer ultrafast access to applications, files, and network resources within Virtual Desktop
Infrastructure (VDI) environments. With zero attack surface, unpublished API, and encrypted data Wyse ThinOS is virus and
malware resistant.
Wyse ThinOS requires a management software to configure, operate, and update thereby eliminating the need for IT support
to visit or touch the physical devices. Dell Wyse Management Suite is the next generation management solution that enables
you to centrally configure, monitor, manage, and optimize your ThinOS-based thin clients. As the number of devices grows, the
Wyse Management Suite offers process automation and helps lower costs for large deployments of thin clients. With secure
HTTPS-based communications and active directory authentication for role-based administration, Wyse Management Suite keeps
your thin clients always up-to-date. The mobile application enables IT to view critical alerts, notifications on the dashboard, and
send real-time commands.
This guide is intended for administrators of thin clients running Wyse ThinOS and using Wyse Management Suite to manage thin
clients. It provides information and detailed system configurations to help you design and manage a ThinOS environment using
Wyse Management Suite.
Supported platforms
The Dell Wyse ThinOS 9.0 firmware is supported on the following Dell Wyse thin clients:
● Wyse 3040 Thin Client
● Wyse 5070 Thin Client
● Wyse 5470 Thin Client
● Wyse 5470 All-in-One Thin Client
NOTE: Wyse 3040 Thin Client is for users who work mostly on tasks with limited multimedia requirements. It is not
applicable for using multimedia such as BCR, HTML 5 video redirection, Window multimedia redirection, RTOP video call, or
JVDI video call. It is recommended to use Wyse 5070, 5470 AIO, or 5470 thin clients for high multimedia requirements.
8 Introduction
What's new in ThinOS 9.0.2081 (MR1) release?
● ThinOS enhancements
○ Ability to upgrade BIOS using either Admin Policy Tool or Wyse Management Suite. See, Upgrade BIOS.
○ Ability to edit BIOS settings using either Admin Policy Tool or Wyse Management Suite. See, Edit BIOS settings.
○ Ability to install firmware and application packages using Admin Policy Tool. See, Upgrade ThinOS 9.x to later versions
using Admin Policy Tool.
○ Ability to configure the WINS server in the Network Setup window. See, Configure the general settings.
○ Ability to import certificates using Admin Policy Tool. See, Import certificates to ThinOS.
○ Ability to set videos and moving images as screen saver using Admin Policy Tool. See, Admin Policy Tool feature list.
○ Added new options for EAP-PEAP-GTC/EAP-FAST-GTC, default audio devices, DHCP Option tags 12 and 43 in the
Admin Policy Tool. See, Admin Policy Tool feature list.
○ Added icons for all the ThinOS local windows that can be minimized and restored from the taskbar. See, Using the
taskbar.
○ Added EULA in the First Boot Wizard. End User License Agreement.
○ Displays an error message when an invalid DNS server is configured. See, Configure the general settings.
○ Reversed the touchpad scroll direction on Wyse 5470 Thin Client. See, Touchpad gestures.
○ Supports the dual IPv6 network interface. See, Configure the general settings.
○ Supports wireless IPv6. See, Configure the WLAN settings.
○ Supports automatic configuration of email-based account discovery using DNS. See, Autoconfiguration of email-based
account discovery using DNS.
○ Supports additional ELO touch displays. See the Dell Wyse ThinOS 9.0 MR1 Release Notes at www.dell.com/support.
○ Integrated the HID Global Corporation OMNIKEY driver into ThinOS to support HID smart card readers and proximity card
readers. See the Dell Wyse ThinOS 9.0 MR1 Release Notes at www.dell.com/support.
○ Implemented a rule to force usage of complex passwords for VNC or Admin Mode.
○ Supports audio jack ports on the WD19 Docking Station.
○ Supports external displays with more display resolutions on Wyse 5470 Thin clients and Wyse 5470 All-in-One Thin
Clients.
○ Removed support for Non-CCID USB smart card keys.
○ Removed support for shortcut keys in a session with full screen mode.
● Citrix updates
○ Supports Microsoft Teams audio optimization in a Citrix session. See, Microsoft Teams Audio Optimization.
○ Upgraded the Citrix RealTime Media Engine (RTME) to version 2.9. See the Dell Wyse ThinOS 9.0 MR1 Release Notes at
www.dell.com/support.
○ Upgraded the Citrix package to Citrix workspace app 2004. See the Dell Wyse ThinOS 9.0 MR1 Release Notes at
www.dell.com/support.
● Imprivata updates
○ Supports Imprivata ProveID Embedded feature on ThinOS. See, Imprivata OneSign ProveID Embedded.
○ Supports Fast User Switching (FUS) feature on ThinOS. See, Configure Fast User Switching on ThinOS.
● Wyse Management Suite updates
○ Supports Wyse Management Suite version 2.1.
○ Ability to assign a subnet to a file repository using Wyse Management Suite. See, Subnet mapping.
○ Ability to create end-user exceptions using Wyse Management Suite. See, Create exceptions for an end user.
○ Ability to configure the Active Directory Group setting using Wyse Management Suite. See, Adding the Active Directory
server information.
○ Implemented a rule to force usage of complex passwords for VNC or Admin Mode.
For detailed information about the Wyse Management Suite features, see the Dell Wyse Management Suite version 2.1
Administrator's Guide at www.dell.com/support.
Introduction 9
● Implemented a rule to force usage of complex passwords for VNC or Admin Mode. See, Dell Wyse ThinOS 9.0 MR1 Release
Notes at www.dell.com/support.
10 Introduction
Table 1. Feature comparison (continued)
Category Feature ThinOS 9.0 ThinOS 8.6
System Information Supported Supported
Classic desktop mode Supported Supported
Zero desktop mode Not supported Supported
Workspace mode Supported Not applicable
Broker setup Supported Supported
Connection Manager Supported Supported
Global Connection Settings Supported Supported
Certificate Management Supported Supported
SCEP Supported Supported
Screensaver Supported Supported
Locale Limited support¹ Supported
Locking the terminal Supported Supported
Date and time Supported Supported
Troubleshooting options Limited support¹ Supported
Connected devices list Limited support¹ Supported
VNC Limited support¹ Supported
Network IPv4 Supported Supported
IPv6 Supported Supported
Ethernet speed Supported Supported
Wired IEEE802.1x Limited support¹ Supported
Authentication
Dual NIC Limited support¹ Supported
Proxy Supported Supported
VPN Supported Supported
Wireless Supported Supported
Display Resolution Supported Supported
Rotation Supported Supported
Multi screen mirror/ Supported Supported
extended mode
Peripherals Keyboard and keyboard Supported Supported
layouts
Mouse, mouse speed, swap Supported Supported
left and right
Serial ports Supported Supported
Camera Supported Supported
Audio (headset/DP audio) Limited support¹ Supported
Touchscreen Limited support¹ Supported
Printer Limited support¹ Supported
Bluetooth Limited support¹ Supported
Introduction 11
Table 1. Feature comparison (continued)
Category Feature ThinOS 9.0 ThinOS 8.6
ThinPrint Not supported Supported
Broker agent Citrix Supported Supported
VMware Not supported Supported
Microsoft Remote Desktop Not supported Supported
Dell vWorkspace Not supported Supported
Amazon Web Services or Not supported Supported
WorkSpaces
Teradici Cloud Access Not supported Supported
Authentication Smart card Limited support¹ Supported
Imprivata OneSign Supported Supported
SECUREMATRIX Not supported Supported
HealthCast Not supported Supported
Management Wyse Management Suite Supported Supported
Admin Policy Tool Supported Not available
Usage of INI parameters Not supported Supported
BIOS update using Wyse Supported Supported
Management Suite
BIOS configuration using Supported Not available
Admin Policy Tool
BIOS configuration using Supported Not available
Wyse Management Suite
Firmware upgrade using Supported Supported
Wyse Management Suite
Firmware upgrade using Supported Supported
USB Imaging Tool
Package update using Wyse Supported Supported
Management Suite
Package removal using Supported Supported
Wyse Management Suite
DHCP scope options Limited support¹ Supported
Security TPM Supported Supported
Secure Boot Not supported Supported
FIPS Limited Supported—only on WLAN Not supported
¹For feature limitations see the Dell Wyse ThinOS 9.0 Release Notes.
12 Introduction
● The Dell Wyse Management Suite 2.0 Administrator's Guide provides information about configuration, and maintenance of
the ThinOS 9.0-based thin clients by using the Wyse Management Suite console.
Introduction 13
2
Upgrading the ThinOS firmware
It is recommended to use the Wyse Management Suite version 2.0 to upgrade your ThinOS firmware to 9.0. You can also use
the USB Imaging Tool version 3.3.0 to install the ThinOS 9.0 Merlin image on your thin client. If you are using ThinOS v8.5 or
earlier versions, you must first upgrade your device to ThinOS v8.6 before installing ThinOS 9.0. ThinOS 9.0 displays a change
group notification message on the device after you change the group in Wyse Management Suite. A new firmware or package
message is also displayed when you deploy a new firmware or package using Wyse Management Suite.
NOTE: You cannot upgrade ThinOS PCoIP version as ThinOS 9.0 does not support PcoIP devices.
CAUTION: All device settings are erased after you upgrade from ThinOS 8.6 to 9.0 except the Wyse
Management Suite server settings. You must back up your device settings before you start the upgrade process.
Once upgraded to ThinOS 9.0, you can downgrade to ThinOS 8.6 only by using Merlin image.
The overall upgrade process using Wyse Management Suite includes the following tasks:
1. Register your thin client to Wyse Management Suite.
● Register ThinOS devices using Central Configuration. See Register ThinOS devices using Wyse Device Agent.
● Register ThinOS devices using DHCP option tags. See Register devices by using DHCP option tags.
NOTE: You must not disable the on-board NIC on the Wyse Thin Client. If disabled, the Wyse Management Suite
server cannot identify the thin client.
2. Download the ThinOS 9.0 operating system image. See Download the ThinOS firmware.
3. Upload the ThinOS 9.0 firmware to the Wyse Management Suite repository. See Add ThinOS firmware to repository.
4. Upgrade the ThinOS firmware from 8.6 to 9.x. See Upgrade ThinOS 8.6 to ThinOS 9.x.
5. Upgrade the ThinOS firmware from 9.x to later versions. See Upgrade ThinOS 9.x to later versions.
6. Deploy the application package using Wyse Management Suite. See Upload and push ThinOS 9.0 application packages.
6. Enable or disable CA validation based on your license type. For public cloud, select the Enable CA Validation check box, and
for private cloud, select the Enable CA Validation check box if you have imported certificates from a well-known certificate
authority into your Wyse Management Suite server.
To enable the CA validation option in the private cloud, you must install the same self-signed certificate on the ThinOS
device as well. If you have not installed the self-signed certificate in the ThinOS device, do not select the Enable CA
Validation check box. You can install the certificate to the device by using Wyse Management Suite after registration, and
then enable the CA validation option.
7. Click OK.
The device is registered to Wyse Management Suite.
Name—WMS This tag points to the Wyse Management Suite server URL. For example,
wmsserver.acme.com:443, where wmsserver.acme.com is fully qualified
Data Type—String domain name of the server where Wyse Management Suite is installed.
Code—165
Description—WMS Server FQDN
Name—CA Validation You can enable or disable CA validation option if you are registering your
devices with Wyse Management Suite on private cloud.
Data Type—String
Enter True, if you have imported the SSL certificates from a well-known
Code—167
authority for https communication between the client and Wyse Management
Description—Certificate Authority Suite server.
Validation
Enter False, if you have not imported the SSL certificates from a well-known
authority for https communication between the client and Wyse Management
Suite server.
Name—Group Registration Key This tag directs to the Group Registration Key for the Wyse Management Suite
agent.
Data Type—String
Code—199
Description—Group Registration Key
Steps
1. Go to www.dell.com/support.
2. In the Enter a Service Tag, Serial Number, Service Request, Model, or Keyword field, type the model number of your
device, and press Enter or click the search icon.
3. On the product support page, click Drivers & downloads.
4. Select the operating system as ThinOS 9.0.
5. From the list, locate the ThinOS image entry and click the download icon.
6. If you want to use ThinOS packages, locate a package and click the download icon.
7. If you want to install the latest BIOS package, locate the package entry—ThinOS 9.0 <version> BIOS package <version>
—for your thin client model and click the download icon.
Steps
1. Go to the Groups & Configs page, and select a group.
2. From the Edit Policies drop-down menu, click ThinOS.
The Select ThinOS Configuration Mode window is displayed.
3. Select Advanced Configuration Mode.
4. Go to Firmware Upgrade, and click Configure this item.
5. Clear the Disable Live Upgrade and Verify Signature options.
6. From the Platform Type drop-down list, select the platform.
7. From the Firmware to auto-deploy drop-down list, select the firmware added to the repository.
8. Click Save & Publish.
The firmware is deployed to the thin client. The conversion process takes 15-20 s, and the thin client restarts automatically.
NOTE: After you upgrade the firmware, the device is automatically registered to Wyse Management Suite. The
configurations of 8.6 build are not inherited after you upgrade the firmware.
Steps
1. Go to the Groups & Configs page, and select a group.
2. From the Edit Policies drop-down menu, click ThinOS 9.x.
The Configuration Control | ThinOS window is displayed.
3. Click Advanced.
4. In the Firmware field, select OS Firmware Updates.
5. Click Browse to browse and upload the firmware.
6. From the Select the ThinOS Firmware to deploy drop-down menu, select the uploaded firmware.
7. Click Save & Publish.
The thin client downloads the firmware and restarts. The firmware version is upgraded.
Prerequisites
Ensure that you have installed the ThinOS v9.0.1136 image on your thin client.
NOTE: Dell Technologies recommends that you upgrade ThinOS version 9.0.1136 directly to version 9.0.3030 from
September 9, 2020 onwards. Do not update ThinOS version 9.0.1136 to version 9.0.2081 or 9.0.2108 after September
9, 2020 as it may result in certificate failure.
Steps
1. Go to the Admin Policy Tool on the ThinOS client.
2. In the Configuration Control | ThinOS window is displayed. Click Advanced.
3. In the Firmware field, select OS Firmware Updates.
4. Click Browse to browse and upload the firmware.
5. From the Select the ThinOS Firmware to deploy drop-down menu, select the uploaded firmware.
6. Click Save & Publish.
The thin client downloads the firmware and restarts. The firmware version is upgraded.
Steps
1. Go to the Groups & Configs page, and select a group.
Steps
1. Go to the Admin Policy Tool on the ThinOS client.
The Configuration Control | ThinOS window is displayed.
2. Click Advanced.
3. In the Firmware field, click Application Package Updates.
4. Browse and select the package.
5. From the Select the ThinOS Package(s) to deploy drop-down menu, select the uploaded package.
NOTE: You can select one or more ThinOS application packages simultaneously.
Upgrade BIOS
Prerequisites
● Ensure that you have downloaded the BIOS file from Dell.com/support to your device.
● Ensure that you have registered the thin client to Wyse Management Suite, if you are upgrading BIOS using Wyse
Management Suite.
Steps
1. Open the Admin Policy Tool on the thin client or go to the ThinOS 9.x policy settings on Wyse Management Suite.
2. On the Configuration Control | ThinOS window, click the Advanced tab.
3. Expand Firmware and click BIOS Firmware Updates.
4. Click Browse and select the BIOS file to upload.
5. From the Select the ThinOS BIOS to deploy drop-down list, select the BIOS file that you have uploaded.
Steps
1. Open the Admin Policy Tool on the thin client or go to the ThinOS 9.x policy settings on Wyse Management Suite.
2. In the Configuration Control | ThinOS window, click the Advanced tab.
3. Expand BIOS and select your preferred platform.
4. In the System Configuration section, modify the USB ports and audio settings.
5. In the Security section, modify the administrator-related configurations.
6. In the Power Management section, modify the power-saving options.
7. In the POST Behavior section, enable or disable the MAC Address Pass-Through feature. This option is applicable only to
the Wyse 5470 Thin Client.
8. Click Save & Publish
NOTE: If the thin client does not have a BIOS admin password, you can set the password using Admin Policy Tool or
Wyse Management Suite. In this scenario, the client reboots first to apply the BIOS admin password and other BIOS
settings take effect after the second reboot.
Steps
1. Log in to Wyse Management Suite.
2. Go to the Groups & Configs page, and select your preferred group.
3. From the Edit Policies drop-down menu, click ThinOS 9.x.
The Configuration Control | ThinOS window is displayed.
4. In the left pane, click Advanced.
5. From the Advanced menu, expand Firmware, and click OS Firmware Updates.
6. Click Browse and select the ThinOS firmware to upload.
7. From the Select the ThinOS Firmware to deploy drop-down menu, select the uploaded firmware.
8. Click Save & Publish.
Wait for the thin client to display a message for firmware downgrade. The thin client starts downloading the firmware.
NOTE: You cannot downgrade from ThinOS 9.0 MR1 to ThinOS 8.6.
Steps
1. Log in to the ThinOS client.
2. From the system menu, go to System Tools > Packages.
All the installed ThinOS packages are listed.
3. Select a package that you want to delete and click Delete.
NOTE: To delete all the packages, click Delete all.
Prerequisites
If you are an existing thin client user, and you have upgraded to the ThinOS version 9.0 or later, reset your thin client to factory
default settings to enter the First Boot Wizard.
NOTE: If DHCP contains the Wyse Management Suite configurations, the ThinOS desktop is loaded without entering the
First Boot Wizard and you cannot view the End User License Agreement.
Steps
1. Connect your thin client to an Ethernet using a wired connection.
NOTE: If you want to use a wireless connection, you can connect to Wi-Fi on the How do You Connect? screen at a
later stage.
3. Click Dell EULA or HID EULA from the right pane to read the respective EULAs. If you have installed the ThinOS application
packages, ensure that you read the respective EULAs of the third-party applications.
Figure 2. EULA
4. Select the Click here to accept all EULAs check box and click Accept.
5. On the Select Your Language screen, select a language from the Language drop-down list to start ThinOS in the regional
language.
6. Click .
7. On the Select Your Keyboard screen, select a keyboard layout from the list.
8. Click .
9. On the Select Your Time Zone screen, select a time zone from the list to set the time zone for your thin client.
10. Click .
11. On the How do You Connect? screen, do either of the following:
● Local network (Ethernet)—Click this option if you have connected the thin client to an Ethernet using a wired
connection.
● Wi-Fi Network—Click this option if you want to select a wireless network. From the list, select a wireless network, and
click Connect.
NOTE: The option to define a wireless connection is not available on thin clients without a WLAN module.
● My computer does not connect to the Internet—Click this option if you do not want to establish a network
connection using the First Boot Wizard screen. You can connect to either wired or wireless connection after you boot to
the ThinOS desktop.
12. Click .
13. On the How would you like to import ThinOS configuration? screen, do either of the following:
● From Wyse Management Suite—Click this option if you want to use Wyse Management Suite to manage your thin
clients.
To register your thin client to Wyse Management Suite, enter the group registration key and the Wyse Management Suite
server URL. Select the CA validation check box if you want to enable the CA validation feature. The CA validation is
required when you import certificates into your Wyse Management Suite server. By default, the CA Validation check box
is selected to improve the security when using the Wyse Management Suite cloud.
● From USB—Click this option if you want to import system settings from the USB drive.
● Not import any configuration now—Click this option if you do not want to import any ThinOS configurations using the
First Boot Wizard screen.
14. Click .
15. On the Connect to VDI broker screen, enter the Citrix server address.
The broker enables you to connect to full desktops using Citrix Virtual Apps and Desktops or individual applications using
Citrix Virtual Apps from a centralized host through Citrix Workspace App.
To enable the Citrix Workspace based layout of published applications and desktops on the thin client, select the Workspace
Mode check box.
16. Click Done to exit the First Boot Wizard.
The device exists from the First Boot Wizard mode, and the ThinOS desktop is displayed.
Steps
1. From the desktop menu, click System Setup > Admin Policy Tool.
The Configuration Control || ThinOS window is displayed.
2. Click the Standard tab or the Advanced tab.
3. Expand Privacy & Security.
4. Click Account Privileges.
5. Click the Enable Admin Mode slider switch if you want to enable the Administrator mode. When enabled, you must specify
the Admin username and password.
6. From the Privilege Level drop-down list, select a privilege level—None, Customize, or High.
Steps
1. Go to the Groups & Configs tab and select your desired group.
2. Click Edit Policies.
3. Select ThinOS 9.x from the drop down list.
The Configuration Control | ThinOS window is displayed.
4. Click the Standard tab or the Advanced tab .
5. Expand Privacy & Security.
6. Click Account Privileges.
7. Click the Enable Admin Mode slider switch if you want to enable the Administrator mode. When enabled, you must specify
the Admin username and password.
8. From the Privilege Level drop-down list, select a privilege level—None, Customize, or High.
When you set the user privilege to Customize, you can manually select options that you want to enable or disable in the
ThinOS system menu.
Steps
1. From the desktop menu, click System Setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. Click the Broker Setup tab and configure the Citrix broker. See, Configuring a Citrix broker setup.
3. Click OK and restart the thin client.
After the thin client restarts, the Login dialog box is displayed.
4. Enter the username, password, and domain.
After authentication is successful, your desktop is presented with your assigned connection that is defined by the broker
server.
Connecting a display
Depending on your thin client model, connections to displays can be made using VGA (analog) port, DisplayPort (digital), Mini
DisplayPort, USB Type-C port, HDMI, and the proper Dell monitor cables/splitters/adapters.
For more information about ports and connectors, see the hardware documentation of the respective thin clients.
Desktop overview
ThinOS boots to the desktop screen. This is the default screen that is displayed after you log in to the thin client—without
autostart of any connections or applications.
● Desktop menu —Displays the main menu that provides access to all the ThinOS configurations.
● Taskbar—Contains the system tray area that displays the date, time, and notification icons.
● Connection and application shortcuts—Provides quick access to available server connections and published applications.
● Broker login window—Enables you to log in to the Citrix broker session using your login credentials.
NOTE: The Dell logo is updated from ThinOS 9.0.3030 (MR2) version.
PNA menu button Click this icon to use the following options:
● Refresh
● Disconnect
● Reconnect
● Logoff
● Manage Security Question—This option is available when you
enable SSPR at the server end.
NOTE: The PNA menu button is displayed only after you log in
to the Citrix broker with classic mode.
From ThinOS 9.0 MR1 release onwards, taskbar icons are added for all ThinOS windows except the login window and the Admin
Policy Tool window. You can use the taskbar icons to minimize and restore the windows.
Remote Connections
Central Configuration
VPN Manager
System Preferences
Display
Peripherals
Printer
System Information
System Tools
Troubleshooting
Connection Manager
Desktop guidelines
The classic desktop has a Dell Wyse default background with a horizontal taskbar at the bottom of the screen.
Use the following guidelines:
● Icons representing available server connections and published applications are displayed on the desktop. If you pause the
mouse pointer over an icon, the information about the connection is displayed. Right-click an icon to open the Connection
Settings dialog box that displays additional information about the connection. The number of icons that can be displayed on
the desktop depends on the desktop resolution and administrator configuration.
● A server connection and published application can be opened by double-clicking a desktop icon. You can also go to the
desktop icon by using the tab key and press Enter to initiate the connection.
● Right-clicking on the desktop provides a shortcut menu.
● Clicking the desktop menu button, or clicking anywhere on the desktop, opens the desktop menu.
Steps
1. Right-click on your desktop.
The shortcut menu is displayed.
2. On the shortcut menu, you can view and use the following options:
a. Administrator Mode—Lets you select the account privileges. This option is disabled by default. You must enable the
option from Wyse Management Suite server or Admin Policy Tool.
b. Hide all windows—Brings the full desktop to the foreground.
c. Copy to clipboard—Copies an image of the full screen, current window, or event log to the clipboard. The clipboard
contents can be pasted to an Independent Computing Architecture (ICA) session. You can copy the full screen or current
window to clipboard, and can export the screenshots using the Export Screenshot option in the Troubleshooting
dialog box.
d. Purge clipboard—Discards the contents of the clipboard to free up memory. If there are no contents in the clipboard,
the Purge clipboard option is disabled.
e. Lock Terminal—Puts the thin client in a locked state when the user has logged in to the system with a password. The
thin client can only be unlocked using the same password.
f. Performance Monitor—Opens the performance monitor.
Steps
Steps
1. Go to System Setup > Remote Connections, and configure the Citrix broker setup.
2. Log in to the Citrix broker.
Important information
● If you are using the Device Security White List Policy setting, you must first specify Hub in the Class field by adding a
row. If you do not add Hub to the White list, all USB devices are inaccessible when connected to the thin client.
● It is not recommended to set Vendor and Product ID and Class simultaneously in one row. However, if you configure both
options simultaneously, the device first checks the Vendor and Product ID followed by the Class list.
● When you configure the Bluetooth, VNCD server, Bluetooth, VNC Server, NetID License, Serial Port, and Device Security
settings using the Admin Policy Tool, ensure that you restart the thin client for the settings to take effect.
Steps
1. From the desktop menu, click Shutdown.
The shutdown dialog box is displayed.
Battery information
This section is applicable to the Wyse 5470 Thin Client. The battery indicator is displayed on the system tray.
The following table contains the battery indicators:
● When the battery is lower than 12%, a notification is displayed at the right-bottom with the remaining percentage.
● Plugging in the AC adapter to charge the device increases brightness by 10% and disconnecting the AC adapter decreases
brightness by 10%.
● By default, the critical battery level is 5%. When the battery reaches the critical level, ThinOS is turned off automatically.
You must plug in the AC power to power on the thin client.
Sleep mode
The sleep mode enables the power-saving state and quickly resumes full power operations without loss of data.
The sleep mode feature is supported on the following platforms:
● Wyse 5070 Thin Client
● Wyse 5470 Thin Client
● Wyse 5470 All-in-One Thin Client
The USB interface is closed in sleep mode. All USB devices such as USB drives, Bluetooth, audio devices, video devices, and
camera are reinitialized after resuming from sleep mode.
The wired network, wireless network, and VPN are disconnected in sleep mode. However, the network configurations are saved.
All the ThinOS configurations—VDI configuration, network configuration, and so on—are saved automatically in sleep mode. If
you are signed on to broker agent, all the windows are closed automatically and signed off when entering sleep mode. If you are
not signed on to broker agent, the windows are not closed when entering sleep mode.
4. Click the Auto Install Certificates slider switch to enable autoinstall of certificates on ThinOS.
5. Browse and select the certificate that you want to upload.
NOTE: Admin Policy Tool supports the .cer, .crt, .der, and .pem certificate file types. Wyse Management Suite
supports .cer, .crt,.pfx, and .pem certificate file types.
6. From the Select Certificates to Upload drop-down list, select the certificate that you have uploaded.
7. Click Save & Publish.
8. Restart the thin client.
The certificate is installed on your thin client.
Steps
1. Log in to the Citrix Broker agent.
2. On the desktop taskbar, click the Connection Manager icon, and then click Global Connection Settings.
The Global Connection Settings dialog box is displayed.
3. Click the Session tab to configure the options that are available to all sessions.
The Smart Card check box specifies the default setting for connecting to a smart card reader at system startup.
ICA sessions connect automatically when you connect smart card readers. If you want to use the Disks option to connect to
ICA sessions automatically, the following are the guidelines:
● More than one disk can be used simultaneously. However, the maximum number of USB drives including different
subareas is 12.
● Ensure that you save all data and sign off from the session before removing the USB drive.
USB device redirection—By default, audio, video, and printer devices do not use HDX USB for redirection. You can make
selections for the USB device redirection on the Session tab of the Global Connection Settings dialog box.
4. Click the ICA tab, and do the following:
a. Select the check boxes for the options that are available to all ICA sessions.
b. Select an audio quality optimized for your connection.
5. Click OK to save your changes.
Steps
1. From the desktop menu, click System Setup > Network Setup.
The Network setup dialog box is displayed.
2. Click the General tab, and do the following:
NOTE: If network interfaces are in the same subnet, connection to the same subnet is prioritized last by the interface to
fetch the IP address. Connections to the other subnets are prioritized in the order ENET0, ENET1, and WLAN.
a. To set a default gateway, select the type of network interface from the Select Network Interface as the Default
Gateway drop-down list.
From ThinOS 9.0 MR1 release onwards, ThinOS supports the dual IPv6 network interface. The following network
combinations are supported:
● Wired connection 1 + Wireless connection 1
Configuring connectivity 45
● Wired connection 1 + Wired connection 2
NOTE:
The limitation of the dual IPv6 network is that the device cannot automatically determine which connection to use
among the two.
b. Use Static Name Servers—By default, this check box is not selected, and the thin client fetches the server IP address
from DHCP. To manually assign the static IP addresses, select the Use Static Name Servers check box and do the
following:
NOTE: If name servers are changed using GUI or link down/up, the details are displayed in event logs. In dynamic
mode, if the network is not working, the DNS can be merged from Ethernet and wireless, or from Ethernet 0 and
Ethernet 1.
i. Enter the URL address of the DNS domain in the DNS Domain field.
ii. Enter the IP address of the DNS server in the DNS Server field.
However, the use of DNS is optional. DNS enables you to specify remote systems by their host names rather than IP
addresses. If a specific IP address (instead of a name) is entered for a connection, it is used to make the connection.
Ensure that you use the DNS domain and the network address of an available DNS server. The function of the DNS
domain entry is to provide a default suffix that is used to resolve the name. The values for these two fields may be
supplied by a DHCP server. If the DHCP server supplies these values, they replace any locally configured values. If the
DHCP server does not supply these values, the locally configured values are used.
From ThinOS 9.0 MR1 release onwards error tips are displayed when you set an invalid DNS server. A pop-up window
with the error message is displayed when you click save the invalid DNS server.
NOTE: You can enter the server addresses, each separated by a semicolon. The character limit is 256. The first
address is for the primary DNS server and the rest are secondary DNS servers or backup DNS servers.
c. Enter the IP address of the WINS server in the WINS Server field.
However, the use of WINS is optional. You must specify the network address of an available WINS name server. WINS
enables you to specify remote systems by their host names rather than IP addresses. If a specific IP address (instead of
a name) is entered for a connection, it is used to make the connection. These entries can be supplied through DHCP, if
DHCP is used. DNS and WINS provide essentially the same name resolution. If both DNS and WINS are available, the thin
client attempts to resolve the name using DNS first and then WINS. You can enter two WINS Server addresses (primary
and secondary), separated by a semicolon.
d. Enter the digit multiplier of 30 s in the TCP Timeout box to set the time-out value of a TCP connection. The value must
be either 1 or 2 which means the connection time-out value is from 1 x 30=30 s to 2 x 30=60 s. If the data for connecting
to the server is not acknowledged and the connection is timed out, setting the time-out period retransmits the sent data
and again tries to connect to the server until the connection is established.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Network setup.
The Network setup dialog box is displayed.
2. Click the Options tab, and do the following:
46 Configuring connectivity
Figure 15. Options tab
a. Interpret DHCP Option IDs—Enter the supported DHCP options. Each value can only be used one time.
Configuring connectivity 47
Table 12. DHCP option tags (continued)
Option Description Additional information
server or the MQTT server is null, the Wyse Management Suite agent
sets the values to the default server values.
b. Interpret DHCP Vendor-Specific Info—Select this check box for automatic interpretation of the vendor information.
c. DHCP Vendor ID—Displays the DHCP vendor ID when the Dynamically allocated over DHCP/BOOTP option is
selected.
d. DHCP UserClass ID—Displays the DHCP user class ID when the Dynamically allocated over DHCP/BOOTP option is
selected.
3. Click OK to save your settings.
NOTE: The User Class option for DHCP standard is changed to RFC 3004. You must go to user class settings in DHCP
and add the user class length as in head.
Steps
1. From the desktop menu, click System Setup > Network setup.
The Network setup dialog box is displayed.
2. Click the ENET tab, and do the following:
48 Configuring connectivity
a. From the Ethernet Select drop-down list, select a wired network connection.
NOTE: For Wyse 5070 Thin Client without SFP or RJ45 module, the ENET0 option is selected by default. For
Wyse 5070 thin client with SFP or RJ45 module and Wyse 5470 Thin Client that is connected to Dell WD19 docking
station, select either ENET0 or ENET1 based on your network preference.
b. From the Ethernet Speed drop-down list, select a value for the Ethernet speed. The default value is Auto-Detect. If
your network equipment does not support the automatic negotiation, select any of the following values:
● 10 MB Half-Duplex
● 10 MB Full-Duplex
● 100 MB Half-Duplex
● 100 MB Full-Duplex
● 1 GB Full-Duplex
NOTE: The 10 MB Full-Duplex value can be selected locally. However, this mode can be negotiated through
Auto-Detect.
c. Click the IPv4 button, and then click Properties to configure the following options:
● Dynamically allocated over DHCP/BOOTP—Select this option to enable your thin client to automatically receive
information from the DHCP server. The network administrator must configure the DHCP server by using DHCP
options to provide information. Any value that is entered locally in the Options tab is replaced by the DHCP value. If
the DHCP server fails to provide replacement values, the locally entered value is used.
● Statically specified IP Address—Select this option to manually enter the IP address, subnet mask, and default
gateway.
○ IP Address—Enter a valid network address in the server environment. The network administrator must provide
this information.
○ Subnet Mask—Enter the value of the subnet mask. A subnet mask is used to gain access to machines on other
subnets. The subnet mask is used to differentiate the location of other IP addresses with two choices—same
subnet or other subnet. If the location is a different subnet, messages that are sent to that address must be
sent through the default gateway. This does not depend on the value that is specified through local configuration
or through DHCP. The network administrator must provide this value.
○ Default Gateway—Use of gateways is optional. Gateways are used to interconnect multiple networks—routing
or delivering IP packets between them. The default gateway is used for accessing the Internet or an intranet with
multiple subnets. If no gateway is specified, the thin client can only address other systems on the same subnet.
Enter the address of the router that connects the thin client to the Internet. The address must exist on the same
subnet as the thin client as defined by the IP address and the subnet mask. If DHCP is used, the address can be
supplied through DHCP.
d. Click the IPv6 button, and on the Properties tab, configure the following options:
NOTE: The limitation of the dual IPv6 network is that the device cannot automatically determine which connection
to use among the two.
● Select the Dynamically allocated over DHCP/BOOTP option to enable your thin client to automatically receive
information from the DHCP server. The network administrator must configure the DHCP server (using DHCP options)
to provide information. Any value that is entered locally in the Options tab is replaced by the DHCP value. If the
DHCP server fails to provide replacement values, the locally entered value is used.
● Select the Statically specified IP Address option to manually enter the IP address, subnet mask, and default
gateway.
○ IP Address—Enter a valid network address in the server environment. The network administrator must provide
this information.
○ Subnet Prefix Len—Enter the prefix length of the IPv6 subnet.
○ Default gateway—Use of gateways is optional. For more information, see various IPv4-supported options in this
section.
e. Select the Enable the IEEE 802.1x authentication check box, and from the EAP type drop-down list, select TLS,
LEAP, PEAP or FAST.
● TLS—Select this option, and click Properties to configure the Authentication Properties dialog box.
○ Select the Validate Server Certificate check box because it is mandatory to validate your server certificate.
NOTE: The CA certificate must be installed on the thin client. The server certificate text field supports a
maximum of approximately 255 characters, and supports multiple server names.
○ Select the Connect to these servers check box, and enter the IP address of the server.
○ Click Browse to find and select the client certificate file and the private key file you want.
Configuring connectivity 49
NOTE: Ensure that you select the PFX file only.
○ From the Authenticate drop-down list, select either user authentication or machine authentication that is based
on your choice.
The following kinds of server names are supported—all examples are based on Cert Common name
company.dell.com:
■ *.dell.com
■ *dell.com
■ *.com
NOTE: Using only the FQDN, that is, company.dell.com does not work. Use one of the options, for example
servername.dell.com (*.dell.com is the most common option as multiple authentication servers may
exist).
● LEAP—Select this option, and click Properties to configure the Authentication Properties dialog box. Be sure to
use the correct username and password for authentication. The maximum length for the username or the password is
31 characters.
● PEAP—Select this option, and click Properties to configure the Authentication Properties dialog box. Be sure to
select either EAP_GTC or EAP_MSCHAPv2, and then use the correct username, password, and domain. Validate
Server Certificate is optional.
● FAST—Select this option, and click Properties to configure the Authentication Properties dialog box. Be sure to
select either EAP_GTC or EAP_MSCHAPv2, and then use the correct username, password, and domain.
NOTE: During the initial connection with EAP-FAST, when there is a request for a Tunnel PAC from the
authenticator, the PAC is used to complete the authentication. The first-time connection always fails, and
the subsequent connections succeed. Only automatic PAC provisioning is supported. The user/machine PAC
provisioning that is generated with CISCO EAP-FAST utility is not supported.
When EAP-MSCHAPV2 or EAP-GTC is selected for PEAP or FAST authentication, an option to hide the domain
is available. Username and password boxes are available for use, but the domain text box is disabled. When EAP-
MSCHAPV2 or EAP-GTC is selected for PEAP or FAST authentication, a check box to enable the single sign-on
feature is available.
Steps
1. From the desktop menu, click System Setup > Network setup.
The Network Setup dialog box is displayed.
2. Click the WLAN tab, and configure the following options:
50 Configuring connectivity
Figure 17. WLAN tab
● Add—Use this option to add and configure a new SSID connection. You can configure the SSID connection from the
available security type options. After you configure the SSID connection, the added SSID connection is listed on the
WLAN tab.
● Remove—Use this option to remove an SSID connection from the list.
● Properties—Use this option to view and configure the authentication properties of an SSID connection that is displayed
in the list.
● IPv4 Config—Click this option to configure the IPv4 settings for the wireless connection.
To set IPv4 connection using either DHCP or static IP address, configure any one of the following options:
○ If you want to enable your thin client to automatically receive information from the DHCP server, click Dynamically
allocated over DHCP/BOOTP.
○ If you want to manually configure the IP address, click Statically specified IP Address, and provide the IPv4 details.
● IPv6 Config—Click this option to configure the IPv6 settings for the wireless connection.
a. To enable the wireless IPv6, click the IPv6 slider switch. This option is added from ThinOS 9.0 MR1 release onwards.
b. To set IPv6 connection using either DHCP or static IP address, configure any one of the following options:
○ If you want to enable your thin client to automatically receive information from the DHCP server, click
Dynamically allocated over DHCP/BOOTP.
○ If you want to manually configure the IP address, click Statically specified IP Address, and provide the IPv6
details.
● Disable Wireless Device—Select this check box to disable a wireless device.
○ Always—Click this radio button if you want to keep the wireless options always disabled.
○ EnetUp—Click this radio button if you want to disable the wireless device whenever the wired network is connected.
3. Click OK to save your settings.
Configuring connectivity 51
Steps
1. From the desktop menu, click System Setup > Network setup.
The Network setup dialog box is displayed.
52 Configuring connectivity
● Select the Use the first proxy server for all protocols check box to enable all the protocols to use the same
server in the HTTP Proxy fields. Both HTTP and HTTPS proxy use the same host and port, and SOCKS5 proxy agent
uses HTTP host with default Socks5 port (1080).
b. Specify the supported applications as Wyse Management Suite, FR, and RTME separated by a semicolon in the Apply
proxy server on field.
3. Click OK to save your settings.
User scenario
1. Configure the SOCKS5 proxy server host and port.
2. Configure the user credentials according to the proxy server settings.
After you restart your system, the client checks in to the Wyse Management Suite server through the SOCKS5 proxy server.
MQTT connection is established through the SOCKS5 proxy server. Real-time commands work fine through the SOCKS5
proxy server.
3. Connect to the Citrix desktop, configure proxy in the Internet options of the browser, and playback HDX FR through the
HTTP/HTTPS proxy authentication.
Steps
1. From the desktop menu, click System Setup > Remote Connections.
The Remote Connections dialog box is displayed.
Configuring connectivity 53
2. On the Broker Setup tab, select the Citrix option from the Broker type drop-down list. You can configure the broker
setup to connect to the Citrix virtual desktop environments. For instructions about configuring the Citrix broker setup, see
Configuring the connection brokers.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. Click the General Options tab, and do the following:
a. Click one of the following options to set the action that the thin client should perform after you exit all sessions:
● None
● Sign-off automatically
● Shutdown the system automatically—If you select this option, you must specify a time period after which the thin
client shuts down.
● Restart the system automatically—If you select this option, you must specify a time period after which the thin
client restarts.
NOTE: By default, None is selected and the thin client automatically returns to the terminal desktop.
54 Configuring connectivity
Configure the authentication settings
About this task
This section describes how to configure the authentication settings on your thin client.
Steps
1. From the desktop menu, click System Setup > Remote connections.
The Remote Connections dialog box is displayed.
2. Click the Authentication tab, and select one of the following authentication types:
Steps
1. From the desktop menu, click System Setup > Remote Connections .
The Remote Connections dialog box is displayed.
2. Click the Authentication tab, and select the authentication as Imprivata.
3. In the OneSign Server field, enter either https://ip or https://FQDN values of the OneSign server.
The security setting for OneSign server in the Admin Policy Tool controls the security level of OneSign. The security level
is set as high by default and you must import the certificate of the OneSign server before using the OneSign feature. The
certificate is not required if the security level is set as low.
Configuring connectivity 55
The following OneSign features or actions are supported:
● Client and Broker authentication
○ Citrix Virtual Apps (formerly Citrix XenApp)
○ Citrix Virtual Apps and Desktops (formerly Citrix XenDesktop)
● Kiosk Mode
● Fast User Switching
● Non-OneSign user VDI access
● Hotkey Disconnect
● Proximity card reader redirection
● Guided Question and Answer login
● Authenticate w/Password
● Authenticate w/Password + Password Change
● Authenticate w/Password + Password Change | New Password is Invalid
● Authenticate w/Proximity Card + Password
● Authenticate w/Proximity Card + Pin
● Authenticate w/Proximity Card + Pin | Pin not enrolled
● Authenticate w/Proximity Card Alone | Retrieve Password
● Retrieve User Identity Password
● Reset User Identity Password
● Update User Identity Password
● Enroll Proximity Card
● Lock/Unlock Terminal with Proximity CardLock/Unlock Terminal with Proximity Card
NOTE: ThinOS supports Imprivata WebAPI version 13. It includes OneSign Objects (WebAPI v13) and Fingerprint
Authentication (WebAPI v13).
Steps
1. To configure the general configuration object, do the following:
a. On the Imprivata server, click Computer policy, and then click General tab.
b. Select the check box to enable users to shut down and restart the device from the lock screen.
● Shutdown Allow
○ Select the check box to enable the feature. If enabled, the shutdown and restart icons are displayed in the
ThinOS login and locked windows.
○ Clear the check box to disable the feature. If disabled, the shutdown and restart icons are not available.
● FailedOneSignAuth Allow—Click either Yes or No. If you are a non-OneSign user, click No to log in to the broker.
● Display name format— Use this option to set different formats for the account name that is displayed in pop-up
notifications.
2. To configure the walkway configuration object, do the following:
a. On the Imprivata server, click Computer policy, and then click the Walk Away tab.
● Key mouse inactivity enabled and behavior—Use this option to set the action when the keyboard and mouse are left
idle or inactive. The In addition to keyboard and mouse inactivity check box is not supported.
● Passive proximity cards—Use this option to enable the proximity card usage.
○ If you want to use a proximity card to lock the thin client, select the Tap to lock check box.
○ If you want to lock the thin client and log in as a different user. Select the Switch users check box.
● Lock warning enabled and type—Use this option to enable or disable warning messages. The following three types are
supported:
○ None—No warning messages are displayed.
○ Notification balloon—ThinOS displays a notification window.
○ Screensaver—Hide the display contents before the thin client locks.
● Warning message—Use this option to customize your warning messages
56 Configuring connectivity
● Lock Screen type—Use this option to set the lock screen type. Only obscure type is supported.
● Hot key to lock workstation or log off user—Use this option to set Hot keys for ThinOS. The following keys are
supported:
○ F1
○ F12
○ Backspace
○ Del
○ Down
○ End
○ Enter
○ Esc
○ Home
○ Insert
○ Left Alt
○ Left
○ Left Ctrl
○ NumLock
○ Page Down
○ Page Up
○ Right Ctrl
○ Right
○ Right Alt
○ Space
○ Tab
○ Up
○ a~z
○ A~Z
○ 0~9
○ Modifier +, %, ^ (Shift, Alt, and Control)
● Suspend action—The server configuration controls this feature on ThinOS.
3. To configure the Self-Service Password Reset (SSPR) configuration object, select the appropriate options on the screen.
The SSPR configuration object controls the Self-Service Password Reset behavior for a user. The enabled attribute specifies
whether the user is allowed to reset their password as part of emergency access. The mandatory attribute specifies whether
the user must reset their password as part of emergency access.
4. To configure the RFIDeas configuration object, select the appropriate options on the screen.
The RFIDeas configuration object controls the behavior of the RFIDeas readers.
5. To configure the custom background configuration object, do the following:
a. On the Imprivata server, click Computer policy.
b. Click the Customization tab and upload a custom background file.
6. To configure the cobranding configuration object, do the following:
a. On the Imprivata server, click Computer policy.
b. Click the Customization tab and upload a logo image file.
The logo image impacts all the dialog boxes in ThinOS with raw logo.
7. To modify the text that is displayed in the sign-on UI and lock window, configure the SSPR customization configuration
object.
NOTE: ThinOS supports maximum of 17 characters.
8. To configure the password self-services force enrollment feature, select the check box. This enables you to reset the
primary authentication password.
Configuring connectivity 57
Steps
1. Tap the proximity card. The card enrollment page is displayed.
2. Enter the credentials and click OK.
Proximity card is enrolled successfully.
Steps
1. Log in to the OneSign Administrator console.
2. Go to the Policies page and click Computer Policy.
3. In the Smart card readers section, select the Treat smart card authentications as proximity card authentications
check box.
Next steps
To authenticate the user using a proximity card, connect a supported reader to the thin client. Before you tap the card, ensure
that your card is already enrolled to the user. When you tap your card on the reader, the thin client authenticates the user and
starts the VDI connection.
58 Configuring connectivity
If you enter a wrong password or PIN, the second authentication factor window is displayed with the warning message OneSign
could not authenticate you. Try again.
Configuring connectivity 59
Table 15. Imprivata ProveID Embedded feature matrix (continued)
Feature Description ThinOS 9.0
Smart card Not applicable
Fingerprint biometrics Supported
Question and Answer Supported
Authentication/ Re-Authentication Modalities using Proximity card Supported
Virtual Channel
Smart card Not applicable
Fingerprint biometrics Supported
Imprivata Hands Free Authentication Supported
60 Configuring connectivity
● Using Wyse Management Suite. For more information, see Upload and push ThinOS application packages using Wyse
Management Suite.
● Using Admin Policy Tool. For more information, see Upload and install ThinOS application packages using Admin Policy
Tool.
Steps
1. Open the Admin Policy Tool on your thin client or go to the ThinOS 9.x policy settings on Wyse Management Suite.
2. In the Configuration Control | ThinOS window, click the Advanced tab.
3. Expand Login Experience and click the 3rd Party Authentication option.
The Imprivata Settings window is displayed.
4. From the Select Authentication Type drop-down list, select Imprivata.
5. In the OneSign Server field, enter the list of host names or IP addresses with optional TCP port number, or URLs of
Imprivata OneSign servers.
6. Click the Enable ProveID Embedded Mode slider switch to enable the ProveID Embedded mode on ThinOS.
7. In the Delay PIE agent start field, enter the delay time in seconds. Setting this option postpones the start of the PIE agent
on the ThinOS client. The default value is set to 0.
8. In the Connection Timeout field, enter the time-out value for the OneSign connection. Setting the time-out period
retransmits the sent data and again tries to connect to the server until the connection is established.
9. From the Security Mode drop-down list, select the value as High or Low. This option specifies the SSL certification
validation policy of the OneSign connection. If the value is set to High, you must upload the OneSign appliance SSL
certificate. For more information about how to upload the SSL certificate, see Upload the OneSign appliance SSL certificate.
If the value is set to Low, you are not required to upload the appliance OneSign SSL certificate.
10. From the Enable Logging Level drop-down list, select a log level value. Each log message has an associated log level. You
can access the log files using the Export Logs option in the Troubleshooting window. For more information about how to
export logs, see the Troubleshooting your thin client.
Configuring connectivity 61
Import the OneSign appliance SSL certificate automatically
Prerequisites
● Ensure that you have created a group in Wyse Management Suite with a valid group token.
● Ensure that you have registered the ThinOS devices to Wyse Management Suite.
● Ensure that you have uploaded the SSL certificate to Apps & Data > File Repository > Inventory.
Steps
1. Log in to Wyse Management Suite.
2. Go to the Groups & Configs page, and select your preferred group.
3. Click Edit Policies > ThinOS 9.x.
The Configuration Control | ThinOS window is displayed.
4. Click the Advanced tab.
5. Expand Privacy & Security, and click Certificates.
6. Click the Auto Install Certificates slider switch to enable autoinstall of certificates on ThinOS.
7. From the Select Certificates to Upload drop-down list, select the SSL certificate.
8. Click Save & Publish.
The certificate is installed on your thin client.
Steps
1. Connect the USB drive to the thin client.
2. On the ThinOS client, go to System Tools > Certificates.
3. From the Import From drop-down list, select USB Storage.
4. Click Import.
5. Browse and select the SSL certificate that is stored in the USB drive.
6. Click OK.
The certificate is imported to your thin client.
Prerequisites
● Ensure that you have configured your virtual desktop.
● Ensure that you have configured the policies on the OneSign server.
● Ensure that you have enabled the PIE mode and configured the OneSign server on Admin Policy Tool or Wyse Management
Suite. For more information, see Enable PIE mode on ThinOS.
For more information about how to configure the virtual desktop and OneSign server policies, see the documentation at
www.imprivata.com.
Steps
1. On ThinOS, go to System Setup > Remote Connection > Broker Setup.
2. In the Broker Server field, specify the Citrix Broker agent server details. The format of the Broker agent server must be
https://FQDN/citrix/storeweb.
3. In the Auto Connect List, enter the desktop name to automatically log in to the Citrix session.
62 Configuring connectivity
4. Click OK.
5. Go to System Setup > Remote Connection > General Options.
6. Enter the default sign-on username, password, and domain.
7. Click OK.
Steps
1. From the desktop menu, click System Setup > Central Configuration.
The Central Configuration dialog box is displayed.
2. On the WMS tab, do the following:
a. Select the Enable Wyse Management Suite (WMS) check box to enable the Wyse Management Suite to discover
your thin client. By default, this option is selected. Wyse Management Suite service automatically runs after the client
boots.
NOTE: If the first discovery, for example, the Wyse Management Suite service is not successful, it continues until a
discovery is successful. If all discoveries fail, it is started again automatically.
b. Select the DNS SRV record check box if you want the thin client to obtain the Wyse Management Suite values through
DNS server, and then try to register into the Wyse Management Suite server. By default, the check box is selected. If
the check box selection is canceled, the thin client cannot obtain the Wyse Management Suite values through the DNS
server.
Configuring connectivity 63
c. In the Group Registration Key field, enter the group registration key as configured by your Wyse Management Suite
administrator for your group. To verify the key, click Validate Key.
NOTE: A Group Registration Key is not required for the private Wyse Management Suite server. You can provide
the Wyse Management Suite server details to enable the device to check in to Wyse Management Suite. ThinOS
registers to a quarantine tenant in Wyse Management Suite.
d. Select the Enable WMS Advanced Settings check box to enter the Wyse Management Suite server, MQTT server
details, and to enable the CA validation. By default, the MQTT server option is disabled. The MQTT server value is
populated after the ThinOS device is checked in to the Wyse Management Suite.
e. Select the CA validation check box if you want to enable the CA validation feature.
The CA validation is required when you import certificates into your Wyse Management Suite server. By default, the CA
Validation check box is selected to improve the security when using the Wyse Management Suite cloud. This change
affects connections to any of the following servers:
● *.dellmobilitymanager.com
● *.cloudclientmanager.com
● *.wysemanagementsuite.com
Steps
1. From the desktop menu, click System Setup > VPN Manager.
The VPN Manager dialog box is displayed.
2. To create a session, click the + icon and do the following:
64 Configuring connectivity
Figure 23. VPN Manager
a. Enter the name of the session in the Name field. This option is mandatory. The maximum character limit is 21 characters.
b. Enter the IP address of the VPN server in the Server field. This option is mandatory and is defined as either an IP
address or a hostname. The maximum character limit is 63 characters.
c. Enter the login username in the Username field. This option is mandatory. The maximum character limit is 31 characters.
d. Enter the password in the Password field. This option is not mandatory. The maximum character limit is 31 characters.
e. Click the Auto-connection on system startup button to automatically connect to the VPN when the device restarts.
f. Click the Show progress in detail button to display the VPN connection progress.
g. Click the Show debug information button to display the VPN debug details for better troubleshooting.
h. Click OK.
When connections are created, the Auto column displays which connection is automatically connected when the device
restarts. Only one session can be set to autoconnect.
3. Select a session and click Connect.
4. Click OK to save your changes.
Configuring connectivity 65
6
Configuring the connection broker—Citrix
In a Virtual Desktop Infrastructure (VDI) environment, a connection broker is a software entity that enables you to connect
to an available desktop. The connection broker facilitates the VDI environment to securely and efficiently manage the centrally
hosted desktop environments. ThinOS 9.0 enables you to configure the Citrix connection broker for accessing Citrix Virtual
Apps and Desktops.
Citrix offers a complete virtualization solution, where all applications and resources are deployed on a centralized server, and
published to remote devices. In ThinOS 9.0, Citrix Receiver is replaced by Citrix Workspace app. Citrix Workspace app, a client
software released by Citrix, enables you to access all your virtual apps, desktops, and other Citrix products from a single
workspace UI. For more information about Citrix Workspace App, see the Citrix documentation at docs.citrix.com.
To access Citrix sessions using Citrix Workspace app, do the following:
1. Deploy the Citrix Workspace app package using Wyse Management Suite.
2. Go to System Setup > Remote Connections > Broker setup, and configure the Citrix broker.
*For definitions of each feature, see the Citrix Workspace app feature list at docs.citrix.com.
¹HDX RealTime Webcam Video Compression does not work except for Microsoft Skype for Business Optimization pack and
Cisco Jabber Unified Communications Optimization.
²ICA session is not launched if you enable only IPv6 client network.
Steps
1. From the desktop menu, click System Setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. On the Broker Setup tab, select Citrix from the Select Broker Type drop-down list, and do the following:
a. Select the Workspace Mode check box if you want to enable the Citrix Workspace based layout of published
applications and desktops.
b. In the Broker Server field, enter the IP address or hostname or FQDN of the Citrix server. You can enter the Citrix
NetScaler Gateway URL, StoreFront URL, or the web interface URL.
c. In the Auto Connect List field, enter the name of the connection that is displayed in Connection Manager to
automatically connect after you log in the Citrix broker. You can enter more than one connection name. Each connection
name is separated by semi-colon, and is case-sensitive.
d. Select the Enable automatic reconnection at logon check box if you want to automatically reconnect to the
disconnected sessions or both active and disconnected sessions during login. You must click either of the following
options:
● Connect to disconnected session only
● Connect to active and disconnected sessions
e. Select the Enable automatic reconnection from button menu check box if you want to automatically reconnect to
the disconnected sessions or both active and disconnected sessions by using the Reconnect button in the button menu.
You must click either of the following options:
● Connect to disconnected session only
Switch account Displays all icons of desktop and applications. Click the button menu in the upper-right corner of
when logged in with You cannot switch the account. the screen, and then click Sign out.
multi server
Refresh Citrix Click the PNAmenu button on the taskbar, and Click the button menu in the upper-right corner of
application then click Refresh. the screen, and then click Refresh.
Reconnect a session Click the PNAmenu button on the taskbar, and Click the button menu in the upper-right corner of
then click Reconnect. the screen, and then click Connection Center >
Reconnect.
Disconnect from the Click the PNAmenu button on the taskbar, and Click the button menu in the upper-right corner of
session then click Disconnect. the screen, and then click Connection Center >
Disconnect .
NOTE: In every ThinOS release, the Citrix package version may be updated to newer versions.
Steps
1. Upgrade the ThinOS firmware and install the Citrix package on the thin client using Wyse Management Suite. For more
information about firmware upgrade and package installation, see Firmware upgrade and Upload and publish ThinOS 9.0
application packages.
2. Go to www.citrix.com and download the appropriate version of the Citrix RealTime Optimization Pack that contains the
Citrix HDX RealTime Connector.
3. Install the Citrix HDX RealTime Connector on the Citrix Virtual Desktops or Citrix Virtual Apps servers.
NOTE: If you are running an earlier 1.8 version, you must uninstall the earlier version and install the latest version. If you
are running an earlier 2.x version, you can upgrade the connector to the latest version.
4. Log in to your Citrix desktop and start the Skype for Business application.
Steps
1. Install the correct connector on the Citrix Virtual Desktop or Virtual Apps Server.
2. Install the Citrix package on the ThinOS device.
3. Connect the audio or video devices.
NOTE: Disable the USB redirection for audio or video devices.
4. Connect to a Citrix desktop and start the Skype for Business application.
5. Check the RTOP (bow-tie) icon in the system tray on the taskbar of the virtual desktop.
6. Open the About page from the RTOP icon in the system tray and verify the connection attributes.
If the remote RealTime Media Engine version matches the mediaEngine.Net version, the status is displayed as
Connected.
7. Verify the Settings option from the RealTime connector icon.
8. Verify the audio and video devices from the Skype For Business client menus.
9. Establish the video and audio calls.
10. Answer the calls by either clicking the mouse or using the headset button.
11. Click the RealTime connector icon and verify the call statistics.
For more information about verifying your installation and the collecting troubleshooting information, see the Citrix
documentation at docs.citrix.com.
*The call statistics data is displayed in the Call Statistics window in the Sent column.
Steps
1. Go to www.cisco.com, and download the following software:
● Cisco JVDI Agent 12.8
● Cisco Jabber application 12.8
2. On the Citrix virtual desktop, install Cisco JVDI Agent. Double-click the file and follow the installation wizard steps.
3. On the Citrix virtual desktop, install Cisco Jabber.
For information about the installation procedure, see the installation guide at www.cisco.com.
4. Update the ThinOS firmware, and install the JVDI.pkg on the ThinOS client using Wyse Management Suite.
For more information about firmware upgrade and package installation, see Firmware upgrade and Upload and publish
ThinOS 9.0 application packages.
NOTE: If ThinOS running Cisco Jabber (JVDI) fails to register with Cisco Unified Communications Manager, add the
DNS servers and DNS domains that are used by the Citrix host and the Cisco Unified Communications Manager servers
to ThinOS. You can either specify the domain name and server IP on the General tab in Network Setup, or add the
DNS server and domain value to the DHCP server by providing the IP address information to the ThinOS client. For
issues related to Cisco Unified Communications, contact Cisco support.
5. Log in to the Citrix virtual desktop, and sign in to Cisco Jabber using your user credentials.
When you log in for the first time, do the following:
a. On the Cisco Jabber interface, click Advanced Settings.
b. Select your account type as Cisco Communications Manager 9 or later.
c. Enter the login server address.
NOTE: If the Use my computer for calls option is selected, the Cisco Jabber is automatically registered with Cisco
Unified Communications Manager. This option enables Jabber to work as a Softphone, and use the microphone or
speaker that is connected to the thin client for phone calls.
For information about troubleshooting your Cisco Jabber, see the Deployment and Installation Guide for Cisco Jabber Softphone
for VDI at www.cisco.com.
For information about Cisco Jabber-related issues, see the Release notes for Cisco Jabber Softphone for VDI document at
www.cisco.com.
For information about accessories for headsets and speakers, see the Unified Communications Endpoint and Client Accessories
article at www.cisco.com.
Steps
1. In the Windows notification area, click the Device Selector icon.
The available devices are listed.
2. Click a device to make it active.
Steps
1. Install the correct connector on the remote desktop.
2. Install the correct package on the ThinOS device.
3. Connect any audio or video devices.
4. Connect to a Citrix desktop, and start the Cisco Jabber application.
5. Open the Settings menu, and go to Help > Show connection status.
The Connection Status window is displayed.
6. Click JVDI Details, and confirm the following attributes:
● JVDI Client version
● JVDI Agent version
● Virtual Channel status
● SIP status
● Softphone CTI status
7. Establish a video or an audio call.
8. Answer the call by either clicking the mouse or using the headset button.
9. Verify the call statistics.
For more information about verifying your installation and collecting the troubleshooting information, see the Cisco
documentation at www.cisco.com.
Limitations
● When you minimize a VDI desktop, the video screen on the Cisco Jabber application remains on the ThinOS desktop.
● When you launch a VDI desktop in window mode, the position of the video screen on the Cisco Jabber application is offset.
● When you are making video calls on the Wyse 3040 Thin Client, it is recommended to restrict the video to 360p on the
server side. Due to high CPU usage, video calls in 720p are not supported on the Wyse 3040 Thin Client.
● Due to poor video performance, it is recommended not to use 4K displays to make video calls. This limitation is applicable for
all the ThinOS platforms.
¹When using a headset, you cannot answer or end the call. This issue is due to a limitation on Citrix Workspace app 2004 for
Linux.
²Video call and share screen features are not supported on Wyse 3040 Thin Client.
For limitations on Microsoft Teams Optimization, see the latest Dell Wyse ThinOS 9.0 Release Notes at www.dell.com/support.
Citrix ADC
ThinOS supports Citrix Application Delivery Controller (ADC), formerly known as Citrix NetScaler. The following authentication
methods are supported on ThinOS:
● Lightweight Directory Access Protocol (LDAP)
● RSA
● DUO
● SMS PASSCODE
● Native OTP
Steps
1. Go to NetScaler > NetScaler Gateway > Virtual Servers, and click Edit.
2. Set the primary and secondary authentications based on the following scenarios:
● If you use LDAP and RSA login, ensure that the primary authentication is LDAP and secondary authentication is RADIUS.
You must also ensure that the NetScaler Gateway Authentication Method in the Wyse Management Suite policy or
the Admin Policy Tool is configured as LDAP+RSA.
● If you use RSA and LDAP login, ensure that the primary authentication is RADIUS and secondary authentication is LDAP.
● If you use only LDAP login, ensure that the primary authentication is LDAP and secondary authentication is none.
3. Go to System Setup > Remote Connections > Broker setup, enter the Citrix ADC server address in the Broker Server
field.
4. Log off from the client desktop, or restart the thin client.
The login window for Citrix ADC is displayed.
For more information about configuring Citrix ADC with LDAP, RSA authentication, see the Citrix NetScaler Gateway Guide
at www.citrix.com.
Steps
1. Go to NetScaler > NetScaler Gateway > Virtual Servers, and click Edit.
2. Ensure that the primary authentication is RADIUS that is configured with the DUO authentication RADIUS.
3. Ensure that the secondary authentication is none.
4. Enter the broker address in the ThinOS user interface.
Steps
1. Log in to ThinOS and connect to the ADC URL.
2. Enter your credentials, and press Enter.
The PASSCODE dialog box is displayed. You will receive a push notification from the CensorNet App on your phone with the
code.
3. Click OK.
If the authentication is successful, you are logged into the Citrix session.
Steps
1. From the desktop menu, click System setup > Remote Connections.
Enable Azure Multiple Factor Authentication for Citrix ADC Single Sign-on
with SAML Authentication
Prerequisites
● Create an Azure AD user in Azure Active Directory.
● Enable the Multiple Factor Authentication (MFA) for the user.
● Add the user to Azure AD Citrix ADC (formerly NetScaler) Enterprise application users and groups.
● Ensure that the shadow account of the user exists in local domain users group.
● Ensure that the SAML authentication policy is enabled. For more information, see the NetScaler Gateway documentation at
docs.citrix.com.
Steps
1. From the desktop menu, click System setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. On the Broker Setup tab, select Citrix from the Broker type drop-down list.
3. Enter the Citrix ADC Gateway URL in the Broker field, and click OK.
The login window is displayed.
4. Enter the username of the Azure AD user and click Next.
5. Enter the initial password for the Azure AD user, and click Sign in.
6. In the More information required window, click Next.
7. On the Additional Security Verification page, do the following:
a. From the How should we contact you? drop-down list, select any one of the following methods:
● Authentication phone
● Mobile app
b. If you select Authentication phone, enter your phone number. If you select Mobile App, click Set up and follow the
on-screen instructions to add an account to the Microsoft authenticator app.
c. Click Save.
8. Enter the Azure AD username with the initial password again.
Enable Azure AD Self-Service Password Reset function for Citrix ADC Single
Sign-on with SAML authentication
Prerequisites
1. Create an Azure AD user in Azure Active Directory.
2. Add the user to Azure AD Citrix ADC (formerly NetScaler) Enterprise application users and groups.
3. Ensure that the shadow account of the user exists in local domain users group.
4. Ensure that Self-Service Password Reset Enabled option is selected in Azure AD for the user.
Steps
1. On the Broker setup tab, enter the Citrix ADC Gateway URL, and click OK.
The login window is displayed.
2. Enter the user credentials of the Azure AD user and click Next.
3. On the Don't lose access to your account! page, configure the following options:
● Authentication Phone
a. Click Set it up now.
b. From the drop-down list, select your country code.
c. Enter your phone number.
d. Click either text me or call me.
A verification code is received on your phone by call or text message.
e. Enter the verification code and click Verify.
● Authentication Email
a. Click Set it up now.
b. Enter the valid email address.
c. Click email me.
A verification code is sent to your email.
d. Enter the verification code and click Verify.
4. Click Finish.
5. Continue with the user login.
Steps
1. From the desktop menu, click System Setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. On the Broker Setup tab, select Citrix from the Select Broker Type drop-down list, and do the following:
a. Select the Workspace Mode check box if you want to enable the Citrix Workspace-based layout of published
applications and desktops. If this option is not selected, you are logged in to the classic mode.
b. In the Broker Server field, enter the Citrix Cloud URL.
c. In the Auto Connect List field, enter the name of the desktops that you want to launch automatically after logging
in to Citrix Cloud. You can enter more than one desktop. Each desktop name is separated by a semi-colon and is case
sensitive.
d. Select the Enable automatic reconnection at logon check box if you want to automatically reconnect to the
disconnected sessions or both active and disconnected sessions during login. You must click either of the following
options:
● Connect to disconnected session only
● Connect to active and disconnected sessions
e. Select the Enable automatic reconnection from button menu check box if you want to automatically reconnect to
the disconnected sessions or both active and disconnected sessions by using the Reconnect button in the button menu.
You must click either of the following options:
● Connect to disconnected session only
● Connect to active and disconnected sessions
3. Click OK to save your settings.
4. In the login dialog box, enter your domain username and password to log in to Citrix Cloud.
ICA icons are displayed in Connection Manager and on the client desktop.
Prerequisites
● Install a valid server certificate on the StoreFront/AppController server and Access Gateway appliance.
● The full chain or path to the root certificate must be correct.
Steps
1. Go to Citrix Studio > HDX Adaptive Transport policy.
2. Set the value for HDX Adaptive Transport to either Preferred or Diagnostic mode.
For more information about configuration on Citrix Studio, see the Adaptive Transport article at docs.citrix.com.
3. On the ThinOS client, start a session from the Citrix Workspace app.
The connection is established using adaptive transport.
NOTE: If the connection type is HDX and the protocol is UDP, EDT is active for the session. If the protocol is TCP, the
session is in fallback mode.
For information about how to verify if HDX Adaptive Transport is active, see the FAQs section in this guide.
Steps
1. Go to Citrix Studio > Use video codec for compression policy.
2. Select the For actively changing regions option.
3. On the ThinOS client, launch an ICA desktop.
4. Open the web browser and play your preferred video.
HDX adaptive display V2 is used for video decoding on the ThinOS client. Thinwire uses JPEG (lossy) for complex or
photographic imagery and RLE (lossless) for text imagery. The rest of the screen is decomposed by Thinwire.
For more information about the Use video codec for compression policy, see the Graphics Policy Settings article at
docs.citrix.com.
Steps
1. Go to Citrix Studio > Browser Content Redirection policy.
2. Select the Allowed option.
This enables the Browser Content Redirection policy.
3. In the Browser Content Redirection Access Control List (ACL) policy settings, add URLs that can use the browser
content redirection.
NOTE: Ensure that the URL is not listed in the Browser Content Redirection Blacklist Configuration policy.
Steps
1. On the ThinOS desktop, click Connection Manager.
2. Click Global Connection Settings.
3. Select the Enable HDX/MMR check box for the ICA connection.
4. Go to System Setup > Remote Connections.
5. On the Broker Setup tab, enter the Citrix server in the Broker Server field, and click OK.
6. Launch an ICA desktop.
7. Open Windows Media Player and play a video or an audio file.
The following types are supported:
● H.264 video
● WMV-9 video
● WMV-8 video
● WMV-7 video
● WMC1 video
● MP4 video
● 4K video
● MOV/AVI video
● AAC/MP3/WMA file
For information about how to check if Windows Media Redirection is working, see the FAQs section in this guide.
For more information about the ICA Multimedia policy settings, see Citrix Product documentation at docs.citrix.com.
Steps
1. Start the Admin Policy Tool on your ThinOS 9.0-based device or open the ThinOS 9.x Policy settings in Wyse
Management Suite.
If you are using the Admin Policy Tool on ThinOS, you must first select the audio quality as Medium and then enable UPD
audio. UPD audio is automatically disabled when you select the audio quality as High on Admin Policy Tool. However, the
UPD audio is not automatically disabled when you are configuring the setting using Wyse Management Suite. UPD audio may
not work if you set the audio quality as High using Wyse Management Suite.
2. On the Advanced tab, expand Session Settings, and click Citrix Session Settings.
3. In the Basic Settings section, click the Enable UPD Audio toggle key to ON state.
4. From the Audio Quality drop-down list, select Medium.
If you are using the Admin Policy Tool on ThinOS, you must first select the audio quality as Medium and then enable UPD
audio. UPD audio is automatically disabled when you select the audio quality as High on Admin Policy Tool. However, the
UPD audio is not automatically disabled when you are configuring the setting using Wyse Management Suite. UPD audio may
not work if you set the audio quality as High using Wyse Management Suite.
Prerequisites
Ensure that the Windows Media redirection policy is set to Allowed in Citrix Studio. By default, the value is set to Allowed.
Steps
1. Configure the Citrix server in the Broker setup window.
2. Launch an ICA desktop.
3. Download and install the QUMU Media Player on the remote desktop.
NOTE: Contact your QUMU partner to get the QUMU media player.
4. Open the Internet Explorer browser and play a QUMU published video.
For more information about the ICA Multimedia policy settings, see Citrix Product documentation at docs.citrix.com.
Table 25. Citrix Workspace app keyboard layout configuration for VDA users on ThinOS
VDA user scenario ThinOS Wyse VDA settings Summary
build Management
Suite settings
The client keyboard is Disabled in Configure the Set the VDA Keyboard output follows the client Linux
synchronized to VDA, ThinOS required keyboard policy for Dynamic keyboard layout and not the Windows
and the keyboard 9.0.4024 layout for local synchronization. layout. As a result, there can be
layout is not switched client users and unpredictable mismatch in the keyboard
in the VDA desktop or remote VDA users. output. Citrix Workspace app Linux
application. keyboard sync mode does not support
switching the layout in VDA.
The client keyboard is
synchronized to VDA,
and the keyboard
layout is switched
in the VDA desktop
using the IME
language bar.
The client keyboard is
synchronized to VDA,
and the keyboard
layout is switched
in VDA published
applications using the
IME language bar.
The client keyboard Supported in Configure the No specific settings Keyboard layout follows the VDA Windows
is not synchronized ThinOS required keyboard are required. layout with predictable output.
to VDA, and the 9.0.4024 with layout for using the For recommended
Opening a new application in a VDA session,
keyboard layout is Citrix client locally. For settings, see the
locking or unlocking the VDA session, the
not switched in the package example, sign on. VDA settings for
keyboard layout falls back to the VDA
VDA desktop or 2006_1146 There is no impact server default
default layout. For example, EN_US.
application. to the keyboard mode section.
usage on remote The following are the recommended settings
The client keyboard VDA. for VDA administrators:
is not synchronized
to VDA, and the ● Enable multiple layouts in VDA IME.
Specific ~/.ICAClient/wfclient.ini Setting is configured on the Set the mode on either the client
keyboard StoreFront server. For example, side or the server side. You must
[WFClient]
(This mode is set the value in /opt/Citrix/
C:\inetpub\wwwroot\Citrix\
disabled in keyboardlayout=French ICAClient/module.ini
[store name]
ThinOS [KeyboardLayout].
\App_Data\default.ica
9.0.4024).
[WFClient]
keyboardlayout=French
Dynamic /opt/Citrix/ICAClient/ XenApp server version 2006 and Set the mode on both the client
sync config/module.ini higher—Enable the following policies side and the server side.
(Available in on the server end:
[ICA 3.0]
subsequent ● Set the Client Keyboard
release KeyboardSync=On Layout synchronization and IME
versions of improvement policy to Support
~/.ICAClient/wfclient.ini
XenApp 1912 dynamic client keyboard
and Citrix [WFClient] layout sychronization and IME
Workspace improvement.
keyboardlayout=(User
App 1912. ● Set the Enable Unicode
Profile)
However, keyboard layout mapping to
this mode is Allowed.
disabled in
XenApp server version before 2006
ThinOS
—There are no policies available
9.0.4024).
to enable dynamic sync mode. You
must set the registry key in the
Windows VDA desktop Keyboard sync
configuration. The setting is enabled
by default on Windows Server 2012
and Windows 10. The setting is
disabled by default on Windows Server
2016 and Windows Server 2019.
To enable the setting, add the
following registry key:
HKLM\Software\Citrix\ICA\Ic
aIme\DisableKeyboardSync
value=DWORD.
To enable Unicode Keyboard Layout
Mapping for Windows VDA, add the
following registry keys:
● HKEY_LOCAL_MACHINE\SOFTWA
RE\Citrix\CtxKlMap\Enable
KlMap value= DWORD 1
● HKEY_LOCAL_MACHINE\SOFTWA
RE\Citrix\CtxKlMap\Disabl
eWindowHook value=DWORD 1
Limitations—Keyboard shortcut keys such as Ctrl+Alt+Down, Ctrl+Alt+Left, and Ctrl+Alt+Right do not work
inside the VDI session. To resolve this issue, press the Ctrl+Alt key combination inside the session. This is a Citrix limitation.
NOTE: Keyboard layout dynamic synchronization mode is disabled in ThinOS v9.0.4024 build.
Unlock an account
After you register the security questions, do the following to unlock your account:
1. Choose a task (Unlock account) in the Account Self-Service window.
2. Enter the username.
The Unlock Account dialog box is displayed.
3. Enter the registered answers to the security questions.
If the provided answers match the registered answers, then the Unlock Account dialog box is displayed.
4. Click OK to successfully unlock your account.
NOTE:
● If the provided answers are incorrect, an error message is displayed.
● If you provide the wrong answers more than three times, you cannot unlock the account or reset the password, and
error messages are displayed.
Reset a password
After you register the security questions, do the following to reset your password:
1. Choose a task (Reset password) in the Account Self-Service window.
2. Enter the username.
The Reset Password dialog box is displayed.
3. Enter the registered answers to the security questions.
If the provided answers match the registered answers, then the Reset Password dialog box is displayed.
4. Enter and confirm the new password.
5. Click OK to successfully change the password.
If you provide the wrong answers, you cannot reset the password, and an error message is displayed.
Citrix SuperCodec
Citrix SuperCodec is a H.264 decoder integrated on the ThinOS client side. The server encodes the session image into the
H.264 stream and sends it to the client side. The client decodes the H.264 stream by SuperCodec and display the image on the
screen. This feature improves the user experience, especially for HDX 3D Pro desktops.
Citrix SuperCodec is supported in Citrix Virtual Apps and Desktops (XenApp and XenDesktop) version 7.5 or later versions.
In Citrix Virtual Apps and Desktops version 7.9 and later, the default setting for Use video codec for compression is
Use when preferred. For best performance on ThinOS device, it is recommended that you set the Use video codec for
compression policy to For the entire screen. You can set the policy to Do not use video codec. This policy setting allows
ThinOS to use ThinWire Plus that saves bandwidth and reduces the CPU overhead. You can also set the policy to For actively
changing regions. This policy setting allows ThinOS to use Selective H.264.
● ThinWire Plus—Equivalent to the Do not use video codec option
● Fullscreen H.264—Equivalent to the For the entire screen option
● Selective H.264—Equivalent to the For actively changing regions
NOTE: Anonymous logon is not supported with legacy mode of StoreFront server.
Steps
1. On the taskbar, click Connection Manager.
The Connection Manager dialog box is displayed.
2. Select a Citrix connection from the list, and click Properties.
3. Click the Connection tab and do the following:
You can view Server or Published Application, Connection Description, Browser Servers, Host Name or Application
Name, and Encryption Level but cannot edit these options.
a. Display Resolution—Select the display resolution for this connection.
If you select the Published Application option, the connection display enables you to select the Seamless Display
Resolution option.
b. Window mode and Full screen mode—Select the initial view of the application and desktop in a windowed screen or
full screen.
c. Autoconnect on start-up—When this option is selected, the thin client automatically connects the session on start-up.
d. Reconnect after disconnect—When this option is selected, the thin client automatically reconnects to a session after
a non operator-initiated disconnect. The wait interval is the value that you set in the Delay before reconnecting box
(enter the number of s 1–3600). The default is 20 s if you are a stand-alone user.
4. Click the logon tab to view Logging on area.
You can view Login Username, Password, Domain name, and Logon Mode.
5. Click the Options tab, and do the following:
a. Autoconnect to local devices—Select any options—Printers, Serials, Smart Cards, Sound, and Disks—to have the thin
client automatically connect to the devices.
NOTE: USB devices that are connected are managed in Global Connection Settings.
b. Audio Quality—From the drop-down list, select your preferred audio quality.
c. Enable session reliability—When enabled, session reliability allows you to momentarily lose connection to the server
without having to re-authenticate upon regaining a connection. Instead of the connection time-out, the session is kept
alive on the server and is made available to the client upon regaining connectivity. Session reliability is most relevant for
wireless devices.
6. Click OK to save your settings.
Prerequisites
● Increase the value of MaxVideoMemoryBytes REG_DWORD to support one or more 4K resolution displays. For more
information, see the Citrix documentation at support.citrix.com.
● Increase the display memory limit to support more color depth and higher resolution. For more information, see the Citrix
documentation at citrix.com.
Steps
1. On the ThinOS desktop, open the Connection Manager window, and click Global Connection Settings.
The Global Connection Settings dialog box is displayed.
2. Clear the Exclude printer devices check box, and click OK.
3. Connect a USB printer to the thin client.
4. Log in to a Citrix session.
5. Go to Control Panel > Devices and Printer, and verify if the printer driver is automatically installed.
After the printer drive installation is complete, the redirected printer is listed in the Printers section.
Steps
1. Connect a printer to the ThinOS client.
2. From the desktop menu, click System Setup > Printer.
The Printer Setup dialog box is displayed.
3. Enter the name of the printer in the Printer Name box.
4. Enter any string of the Printer identification in the Printer Identification box.
5. Select the type of the printer class from the drop-down list, select the check box to enable the printer device, and click OK.
NOTE: In ThinOS 9.0, only PS class is supported.
Next steps
To enable the printer server policies for Citrix UPD printer, see the Citrix documentation at docs.citrix.com.
Steps
1. From the desktop menu, click System Setup > System Preferences.
The System Preferences dialog box is displayed.
2. Click the General tab, and do the following:
a. From the Screen Saver drop-down list, select a screensaver for your device. The default value is set to Turn Off
Screen.
The Disabled check box is available if you select the Screen Saver as None. Selecting the Disabled check box disables
the Timer option and the lock terminal function.
b. In the Timer box, select the idle time after which you want the screensaver to be activated on the thin client. When the
thin client is left idle for the specified idle time, the screensaver is initiated. The default value is set to 10 minutes.
c. From the Locale drop-down list, select a language to be activated for the user login-experience. The default language is
set to English.
NOTE: Locale changes the language for the user login-experience screens only that are displayed during boot-up
and login. The configuration or administrator screens remain unaltered.
Steps
1. From the desktop menu, click System Setup > System Preferences.
The System Preferences dialog box is displayed.
2. Click the Time/Date tab, and do the following:
a. From the Time Zone drop-down list, select a time zone where the thin client operates.
Steps
1. From the desktop menu, click System Setup > System Preferences.
The System Preferences dialog box is displayed.
NOTE: Power And Sleep tab is not available on Wyse 3040 Thin Client.
This section describes how to configure the power and sleep mode.
Steps
1. From the desktop menu, click System Setup > System Preferences.
The System Preferences dialog box is displayed.
2. Click the Power And Sleep tab.
3. To set the power and sleep options when the thin client is on battery, change the following options in When on battery:
a. From the Power And Sleep drop-down list, select Power off or Sleep.
b. From the Timer drop-down list, select the duration for the thin client to be idle to enter sleep mode or power off.
c. From the When I close the lid drop-down list, select any of the following options to set the behavior of the thin client
when the lid is closed:
● Turn off the built-in display—Turns off only the built-in display.
● Turn off the built-in and external displays—Turns off all the displays that are connected to the thin client.
● Shut down device—shuts down the thin client
NOTE: Power And Sleep > When on battery options are only available in Wyse 5470 Thin Client.
Steps
1. From the desktop menu, click System Setup > Display.
The Display Setup dialog box is displayed.
2. In the Display Setup dialog box, configure any of following options:
● Select the Mirror mode check box to enable all connected displays to use the same display settings configured on the
primary display.
Every display contains a unique display order number and display configuration. You can move the blocks horizontally or
vertically and construct the multidisplay layout in mixed directions. To construct a new display layout, move the blocks
to your preferred position, and click Apply. A new display layout is created. However, when the block is moved to an
incorrect position, the system sets the block to its default position.
NOTE: The Wyse 5070 Extended thin client supports up to six monitors. The Wyse 5470 Thin Client supports up to
three simultaneous displays.
● Select the Make this my main screen check box to set the display as primary display or the main screen. After you
set the display as the main screen, the display block is selected with an underline, and the Make this my main screen
option is disabled for that display block. The Make this my main screen option is now available for other display blocks.
NOTE: The Make this my main screen option is effective only in Span Mode and always disabled in Mirror Mode.
● From the Orientation drop-down list, select an option to rotate the display screen in different directions.
● From the Resolution drop-down list, select a supported display resolution.
Vertical Synchronization
Vertical Synchronization or V-Sync enables the ThinOS client to synchronize the frame rate of a video with the monitor refresh
rate to avoid screen tearing. Screen tearing occurs when the graphic processor delivers display frames more than your monitor
can process. As a result, the image appears to be cut in half. Enabling VSync synchronizes the output video of the graphics
card to the refresh rate of the monitor. V-Sync is enabled by default on ThinOS. V-Sync cannot be disabled in ThinOS 9.0 MR1
release.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Keyboard tab, and do the following:
a. From the Keyboard Layout drop-down list, select a keyboard layout. The default layout is set to English (United
States).
b. From the Delay before Repeat drop-down list, select the time for Repeat Delay. The time specifies the pause between
pressing the key on the keyboard and when the key starts repeating itself.
c. Click any of the following options to set the Repeat Rate:
● Slow
● Normal
● Fast
Repeat Rate specifies the speed at which the key repeats itself after you press and hold down a key on the keyboard.
d. Click any of the following options to set the Numlock status:
● None
● On
● Off
Numlock specifies whether the Numlock key on the keyboard must be turned on or turned off when you boot the
terminal.
e. In the Disabled keys field, enter the keys on the keyboard that must be disabled. Use a comma to separate multiple
entries.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Mouse tab, and do the following:
a. To increase or decrease the mouse speed, move the Mouse Speed slider either to the right or left.
b. From the Pointer size drop-down list, select a value to increase the size of the local mouse pointer. Restart the
computer for the change in pointer size to take effect.
c. Select the Swap left and right mouse buttons check box if you want to swap the mouse buttons for left-handed
operations.
d. Select the Reverse mouse wheel scroll direction check box if you want to invert the direction of the mouse scroll
wheel.
Touchpad gestures
This section is applicable to the Wyse 5470 Thin Client.
The touchpad on the Wyse 5470 Thin Client contains two buttons for the right and left mouse-clicks. The following table lists
the supported touchpad gestures on the Wyse 5470 Thin Client:
Left-click ● Tapping with one finger anywhere on the touchpad works as the mouse left-click.
● Pressing the left button on the touchpad works as the mouse left-click.
Right-click ● Tapping with two fingers anywhere on the touchpad works as the mouse right-click.
● Pressing the right button on the touchpad as the mouse right-click.
Double-click ● Tapping with two fingers anywhere on the touchpad works as the mouse double-click.
● Pressing the left button twice on the touchpad works as mouse double-click.
Moving windows ● Press and hold the left button, and move the window by dragging a second finger on the touchpad.
● Dragging a window by tapping twice on the touchpad with one finger.
Zoom Placing two fingers on the touchpad and pinching or stretching out—Not supported.
Scroll Tapping two fingers and moving up or down.
From ThinOS 9.0 MR1 release onwards, the touchpad scroll direction is reversed. Slide two fingers up to
scroll down, and slide two fingers down to scroll up.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Audio tab, and do the following:
a. From the Playback Devices drop-down list, select the type of the audio device.
● Move the slider either to the right or left to control the volume settings for playback devices.
● Select the Mute check box to mute the audio.
● Select the Speaker check box to enable the onboard speaker.
b. From the Recorded Devices drop-down list, select the type of the record device.
● Move the slider either to the right or left to control the volume settings for record devices.
● Select the Mute check box to mute the audio.
c. Use the Recorder tab to collect information about the speaker and microphone being used. You can examine the
performance of the speaker and microphone being used.
3. Click OK to save your changes.
PulseAudio
PulseAudio is a sound server that runs on ThinOS to deliver audio and manage audio devices. PulseAudio supports multiple audio
devices when using real-time audio applications in ICA sessions.
NOTE: You cannot disable the PulseAudio feature on your ThinOS client.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Serial tab and do the following:
a. Click any of the Select Port options to select a COM port. The default port is set to COM 1.
b. From the Baud Rate drop-down list, select the Baud Rate. The Baud rate specifies the number of signal changes that
occur per second. The default value is 9600.
c. Click any of the Parity options to set the parity property for the serial port connection.
d. Click any of the Stop options to set the stop bits for the serial port connection. The default value is 1.
e. Click any of the Size options to set the character size for the serial port connection. The default value is 8.
f. Click any of the Flow Control options to set the flow control of bytes in the serial port connection.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Camera tab.
Steps
1. From the desktop menu, click System Setup > Peripherals.
The Peripherals dialog box is displayed.
2. Click the Bluetooth tab.
Bluetooth-enabled devices such as headsets and mouses that are available in the thin client environment are listed on the
Bluetooth page. The following attributes are displayed in the list:
● Name—Specifies the name of the Bluetooth-enabled device.
● Type—Specifies the type of the Bluetooth-enabled devices, such as headsets, mouses, and keyboards.
ThinOS supports Human Interface Devices (HID) devices. HID includes mouse and keyboard. The maximum number of
HIDs that can be connected is seven.
NOTE: ThinOS supports Bluetooth headsets, but only one headset can be connected. Call level audio quality on
headsets is supported. However, multimedia is not supported. Other types of Bluetooth devices are not scanned and
supported.
● Status—The Bluetooth page has two columns, namely, Status and Paired.
The following are the user scenarios and corresponding Bluetooth statuses that are displayed on the Bluetooth page:
Steps
1. From the desktop menu, click System Setup > Printer.
The Printer Setup dialog box is displayed.
2. Click the Ports tab, and do the following:
a. Select Port—Select a port from the drop-down list. Selecting LPT1 or LPT2 sets the connection to a direct-connected
USB printer. If you are using the Wyse 5070 Extended Thin Client, select LPT2 for the USB printer.
b. Printer Name—(Required) Enter the name of the printer.
c. Printer Identification—(Required) Enter the type or model of the printer in the exact text of the Windows printer
driver name—including capitalizations and spaces.
Printer mapping in a Citrix session on ThinOS uses Citrix UPD (Universal Printer Driver). You can enter any string in the
Printer Identification field. If not specified, the default name is set to Generic/Text Only.
d. Printer Class—Select the printer class from the drop-down list as PS.
e. Enable the printer device—Select this option to enable the directly-connected printer. It enables the device to be
displayed on the remote host.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Printer.
The Printer Setup dialog box is displayed.
2. Click the LPDs tab, and do the following when printing to a non-Windows network printer:
NOTE: Be sure to check with your vendor that the printer can accept Line Printer Request print requests.
f. Printer Class—Select the printer class from the drop-down list as PS.
g. Enable the printer device—Must be selected to enable the printer. It enables the device to be displayed on the remote
host.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Printer.
The Printer Setup dialog box is displayed.
2. Click the SMBs tab, and do the following when printing to a Windows network printer:
d. \\Host\Printer—(Required) Enter the IP address, computer name, or FQDN of the host and specify the shared name
of the printer. After you specify the values and move the cursor, the SMB credentials dialog box is displayed which
prompts you to enter the host username, password, and the domain name.
NOTE: If the host has not joined any domain, enter WORKGROUP in the domain name field.
e. Printer Class —Select the printer class from the drop-down list as PS.
f. Enable the printer device—Must be selected to enable the printer. It enables the device to be displayed on the remote
host.
3. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Printer.
The Printer Setup dialog box is displayed.
2. Click the Options tab, and select a printer from the Default Printer drop-down list.
Steps
1. From the desktop menu, click Shutdown.
The Shutdown dialog box is displayed.
2. Select the Reset the system setting to factory default check box to restore your system settings to default factory
settings.
3. Click OK.
Steps
1. From the desktop menu, click System Tools.
The System Tools dialog box is displayed.
2. Click the Devices tab to view all the locally attached devices, including USB, on applicable platforms. The details about the
displays connected to the thin client are also displayed.
3. Click the Certificates tab to view the list of certificates that are imported to the thin client.
● Use the Enable/Disable FIPS slide switch to enable or disable the Federal Information Processing Standard (FIPS)
Publication 140-2 authentication compliance.
● From the Import From drop-down list, select USB Storage, and click Import. Browse and select the appropriate
certificate that is stored in the USB drive.
● Select a certificate from the list, and click View Certificate to details such as version, validity, and serial number. You
can also view the certificate path and certificate status.
● To manually request a certificate for your client, Click Request Certificate, provide the required details, and then click
Request Certificate again.
4. Click the Packages tab to view the list of ThinOS packages installed on the thin client.
● To delete a single package, select the package and click Delete.
● To delete all the packages, click Delete all.
The following package is displayed on the Package tab:
● Citrix package—This package is introduced to support Citrix Workspace app and RealTime Media Engine. You can see
additional details such as the versions and the name of the package by double-clicking the Citrix package.
● JVDI package—The package is introduced to support Cisco Jabber.
● Imprivata package—The package is introduced to support Imprivata ProveID Embedded feature.
NOTE: In every ThinOS release, the packages may be updated to the latest version.
Steps
1. Go to System Tools > Certificates > Request Certificate.
The Request Certificate dialog box is displayed.
Steps
1. On the Groups & Configs page, click the Default Device Policy Group option.
2. Click .
3. In the Add New Group dialog box, enter the Group Name, Description, Domain and AD Attribute Name.
4. In the Registration tab, select the Enabled check box under Group Token.
5. Enter the group token.
6. In the Administration tab, you can select the name of group administrators who are tasked with managing this group. From
the Available Group Admins box, select the particular group and click the right arrow to move it to the Assigned Group
Admins box. To move one group from the Assigned Group Admins to Available Group Admins, do the reverse. This step
is optional.
7. Click Save.
The group is added to the list of available groups on the Groups & Configs page.
NOTE: The devices can be registered to a group by entering the group token which is available in the Groups and
Configs page for the respective group.
2. Click .
3. In the Add New Group dialog box, enter the Group Name and Description.
4. Select the This is a ThinOS Select group parent option.
5. Select the name of the group administrators who are tasked with managing this group. From the Available Group Admins
box, select the particular group and click the right arrow to move it to the Assigned Group Admins box. To move one
group from the Assigned Group Admins to Available Group Admins, do the reverse. This step is optional.
6. Click Save.
The group is added to the list of available groups on the Groups & Configs page.
To add sub groups to the created parent group, click the parent group on the Groups & Configs page, and follow the steps
that are mentioned in Create device policy group.
NOTE: The parent select group can have 10 child select group and you can register the devices to child select group.
NOTE: Profiles can be configured for other operating systems. The created profiles are the same as other custom
groups.
2. Click .
3. In the Editing Default Policy group dialog box, edit the group information such as Group Name and Description.
4. In the Administration tab, you can select the name of group administrators who are tasked with managing this group. From
the Available Group Admins box, select the particular group and click the right arrow to move it to the Assigned Group
Admins box. To move one group from the Assigned Group Admins to Available Group Admins, do the reverse. This step
is optional.
5. Click Save.
Steps
1. On the Groups & Configs page, click the Default User Policy Group option.
2. Click .
3. In the Add New Group dialog box, enter the Group Name, Description, Domain, AD Attribute and AD Attribute Name.
4. Select the name of the group administrators who are tasked with managing this group.
5. From the Available Group Admins box, select the particular group and click the right arrow to move it to the Assigned
Group Admins box.
To move one group from the Assigned Group Admins to Available Group Admins, do the reverse.
6. Click Save.
The group is added to the list of available groups on the Groups & Configs page.
NOTE: A user policy group must be mapped to an AD group or an organizational unit, but not both.
7. Select the Device Group Mapping option to import user groups with device mapping to control the configurations that are
applied to all device groups by default.
NOTE: This feature is available only on Wyse Management Suite Pro license. You can import 100 user groups to Wyse
Management Suite.
2. Click .
3. In the Editing Default User Policy group dialog box, edit the required group information.
4. Click Save.
Steps
1. On the Groups & Configs page, select Unmanaged Group.
2. Click .
The Editing Unmanaged Group page is displayed. The Group Name displays the name of the group.
3. Edit the following details:
● Description—Displays a brief description of the group.
● Group Token—Select this option to enable the group token.
4. Click Save.
NOTE: For a public cloud, the group token for an unmanaged group must be enabled to register devices. For a private
cloud, the group token for an unmanaged group is automatically enabled.
Steps
1. In the Groups & Configs page, select the group that you want to delete.
2. Click .
A warning message indicating that this action removes one or more groups from the group tree hierarchy is displayed.
3. From the drop-down list, select a new group for users and devices in the current group.
4. Click Remove Group.
NOTE: When you remove a group from the group hierarchy, all users and devices that belong to the deleted group are
moved to a selected group.
Steps
1. Go to the Groups & Configs page, and select a group.
2. From the Edit Policies drop-down menu, click ThinOS 9.x.
The Configuration Control | ThinOS window is displayed.
3. Click the Advanced option.
5. In the respective fields, click the option that you want to configure.
6. Configure the options as required.
Managing devices
The Device page enables you tp perform a routine device management task by using the management console. To locate the
inventory of the devices, click the Devices tab. You can view a subset of the devices by using various filter criteria, such as
groups or subgroups, device type, operating system type, status, subnet, platform, or time zone.
You can sort the device list based on the following:
● Type
● Platform
● Operating system version
● Serial number
● IP address
● Last user details
● Group details
● Last check-in time
● Registration status
● Write filter status
To view the Device Details page of a particular device, click the device entry that is listed on the page. All the configuration
parameters of the device and the group level at which each parameter is applied are displayed on the Device Details page.
You can set the configuration parameter that is specific to the device.
NOTE: Parameters that are configured in this section override any parameters that were configured at the groups and/or
at the global level.
Steps
1. Go to the Devices page.
2. From the Configuration Groups drop-down list, select either the default policy group or the groups which are added by an
administrator.
3. From the Status drop-down list, select any one of the following options:
● Registration
○ Registered
○ Pre-registered
○ Not Registered
○ Compliant
○ Pending
○ Non-Compliant
● Online Status
○ Online
○ Offline
○ Unknown
● Others
○ Recently Added
4. From the OS Type drop-down list, select ThinOS.
5. From the OS Subtype drop-down list, select a subtype for your operating system.
6. From the Platform drop-down list, select a platform.
Managing Jobs
The Jobs page enables you to schedule and manage jobs in the management console.
In this page you can see jobs based on the following filtering options:
● Configuration Groups—From the drop-down menu, select the configuration group type.
● Scheduled by—From the drop-down menu, select a scheduler who performs the scheduling activity. The available options
are:
○ Admin
■ App Policy
■ Image Policy
■ Device Commands
○ System
■ Publish Group Configuration
■ Others
● Detail Status—From the drop-down menu, select the status in detail. The available options are:
○ 1 or more failed
○ 1 or more pending
○ 1 or more In progress
○ 1 or more canceled
○ 1 or more completed
● More Actions—From the drop-down menu, select the Sync BIOS Admin Password option. The Sync BIOS Admin
Password Job window is displayed.
Managing rules
The Rules page enables you to add and manage the rules in the Wyse Management Suite console. The following filtering options
are provided:
● Registration
● Unmanaged Device Auto Assignment
● Alert Notification
Steps
1. Go to the Rules page.
2. Click Registration and select the unmanaged devices option.
3. Click Edit Rule.
The Edit Rule window is displayed.
You can view the following details:
● Rule
● Description
● Device Target
● Group
4. From the drop-down menu, select a target client to apply the Notification Target option and the time duration to apply the
Notification Frequency option.
NOTE: The notification frequency can be configured for every 4 hours, every 12 hours, daily, or weekly basis to the
target device.
5. Enter the number of days until you want to apply the rule in the Apply rule after (1–30 days) box.
NOTE: By default, registration of an unmanaged devices are unregistered after 30 days.
6. Click Save.
Steps
1. Click the Rules tab.
2. Select the Unmanaged Device Auto Assignment option.
3. Click the Add Rules tab.
4. Enter the Name, and select the Destination group.
5. Click the Add Condition option, and select the conditions for assigned rules.
6. Click Save.
The rule is displayed in the unmanaged group list. This rule is applied automatically, and the device is listed in the destination
group.
NOTE:
● If a select group is set as the Destination Group, the condition Assign device to the destination group is not
available.
● If a select group is set as the Destination Group, the condition Create a group under the destination group for
each unique value is not available.
Steps
1. Click the Rules tab.
2. Select the Alert Notification option.
3. Click Add Rule.
An Add Rule window is displayed.
4. From the Rule drop-down list, select a rule.
5. Enter the Description.
6. From the Group drop-down list, select the preferred option.
7. From the drop-down menu, select a target device to apply Notification Target and the time duration to apply Notification
Frequency.
8. Click Save.
Managing Events
The Events page enables you to view all events and alerts in the management system using the management console. It also
provides instructions on viewing an audit of events and alerts for system auditing purposes.
A summary of events and alerts is used to obtain an easy-to-read daily summary of what has happened in the system. The Audit
window arranges the information into a typical audit log-view. You can view the timestamp, event type, source, and description
of each event in the order of time.
Managing users
The Users page enables you to perform a routine user management task in the management console. The following are the two
types of users:
● Administrators—Wyse Management Suite administrator can be assigned the role of a global administrator, group
administrator, or viewer.
○ A Global Administrator has access to all the Wyse Management Suite functions.
○ A Group Administrator has access to all assets and functions for specific groups that are assigned to them.
○ A viewer has read-only access to all the data and can be assigned permissions to trigger the specific real-time
commands, such as shutdown and restart.
If you select administrator, you can perform any of the following actions:
○ Add Admin
○ Edit Admin
○ Activate Admin (s)
○ Deactivate Admin (s)
○ Delete Admin (s)
○ Unlock Admin (s)
● Unassigned Admins—Users imported from the AD server are displayed on the Unassigned admins page. You can later
assign a role to these users from the portal.
For better and faster management of users, select the users of your choice based on the available filter options. If you select
Unmanaged Users, you can perform any of the following actions:
○ Edit User
○ Activate User (s)
○ Deactivate User (s)
○ Delete User (s)
NOTE: To import users from the .CSV file, click Bulk Import.
Add a user
Steps
1. Click the Users tab.
2. Click End Users.
3. Click Add User.
The Add User window is displayed.
4. Enter the username, domain, first name, last name, email address, title, and phone number.
5. Click Save.
Steps
1. Click the Users tab.
2. Click End Users.
3. Select a user.
The End User Details page is displayed.
4. Click the Edit Policies drop-down menu and select the operating system.
5. Configure the required policies and click Save and Publish.
NOTE: This feature is applicable only to thin clients running ThinOS 9.x operating system. There is no limit on the
number of end users in the on-premise environment. You can add 10000 users in a public cloud.
Portal administration
The Portal administration page enables the system administration to perform tasks that are required to set up and maintain
your system.
Steps
1. Log in to the Wyse Management Suite private cloud.
2. Go to Portal Admin > Console Settings > Active Directory (AD).
3. Click the Add AD Server Information link.
4. Enter the server details such as AD Server Name, Domain Name, Server URL, and Port.
5. Click Save.
6. Click Import.
7. Enter the username and password.
NOTE: To search groups and users, you can filter them based on Search Base, and Group name contains options.
You can enter the values as following:
● OU=<OU Name>, for example, OU=TestOU
● DC=<Child Domain>, DC=<Parent Domain>, DC=com, for example, DC=Skynet, DC=Alpha, DC=Com
You can enter a space after a comma, but you cannot use single or double quotes.
The Wyse Management Suite portal displays a confirmation message with the number of imported active directory users.
The imported active directory users are listed at Users tab > Unassigned Admins.
14. To assign different roles or permissions, select a user and click Edit User.
After you assign the roles to the active directory user, they are moved to the Administrators tab on the Users page.
Next steps
Active directory users can log in to the Wyse Management Suite Management portal by using the domain credentials. To log in
to the Wyse Management Suite portal, do the following:
1. Start the Wyse Management Suite management portal.
2. On the login screen, click the Sign in with your domain credentials link.
3. Enter the domain user credentials, and click Sign In.
To log in to the Wyse Management Suite portal using child domain credentials, do the following:
1. Start the Wyse Management Suite management portal.
2. On the login screen, click the Sign in with your domain credentials link.
3. Click Change user domain.
4. Enter the user credentials and the complete domain name.
5. Click Sign In.
The imported Active Directory users can be activated or deactivated on the Users page by using the global administrator login.
If your account is deactivated, you cannot log in to the Wyse Management Suite Management portal.
NOTE: To import the users using LDAPS protocol, complete the following steps:
1. Import the AD Domain Server Root Certificate into Java Key Store Manually using
the keytool. For example, <C:\Program Files\DELL\WMS\jdk1.8.0_152\jre\bin>keytool.exe>
-importcert -alias "WIN-O358EA52H8H" -keystore "<C:\Program
Files\DELL\WMS\jdk1.8.0_152\jre\lib\security\cacerts>" -storepass changeit -file
"Root Certificate Path"
2. Restart Tomcat service.
Steps
1. On the Portal Admin page, under Console Settings, click Active Directory (AD).
2. Enter the Wyse Management Suite details to ADFS. To know the location details on the ADFS server where you must upload
the Wyse Management Suite .xml files, hover over the information (i) icon.
NOTE: To download the Wyse Management Suite .xml file, click the download link.
3. Set the Wyse Management Suite rules in ADFS. To know the custom claim rule details, hover over the information (i) icon.
NOTE: To view the Wyse Management rules, click the Show WMS Rules link. You can also download the Wyse
Management Suite rules by clicking the link that is provided in the Wyse Management Suite Rules window.
a. To upload the .XML file stored on your thin client, click Load XML file.
The file is available at https://adfs.example.com/FederationMetadata/2007–06/
FederationMetadata.xml.
b. Enter the details of the entity ID and X.509 signing certificate in the respective boxes.
c. Enter the ADFS login URL address and the ADFS logout URL address in the respective boxes.
d. To enable tenants to configure Single Sign-On by using ADFS, select the Enable SSO login using ADFS check box. This
feature follows the Security Assertion and Markup Language (SAML) standard specification.
e. To validate the configuration information, click Test ADFS Login. This enables tenants to test their setup before saving.
NOTE: Tenants can activate/deactivate SSO login by using ADFS.
5. Click Save.
6. After you save the metadata file, click Update Configuration.
NOTE: Tenants can log in and log out by using their AD credentials that are configured from their ADFS. You must
ensure that the AD users are imported to the Wyse Management Suite server. On the login page, click Sign in and
enter your domain credentials. You must provide the email address of your AD user and sign in. To import a user to
the public cloud , remote repository must be installed. For more information about the ADFS documentation, go to
Technet.microsoft.com.
Results
After the ADFS test connection is successful, import the users using AD connector present in the remote repository.
Subnet mapping
From Wyse Management Suite 2.0, you can assign a subnet to a file repository. You can associate a file repository up to 25
subnets or ranges. You can also prioritize the subnets that are associated with the repository.
You can deploy the BIOS packages using subnet mapping from Wyse Management Suite 2.1 .You can upload and deploy multiple
firmware packages from the remote repository, tenant cloud repository, or operator cloud repository. This feature is applicable
only on Wyse Management Suite Pro license.
NOTE: Subnet Proximity is not supported on ThinOS 9.x devices.
Steps
1. Go to Portal Administration > File Repositories.
Steps
1. From the desktop menu, click Troubleshooting.
The Troubleshooting dialog box is displayed.
2. Click the General tab, and use the following guidelines:
● Click the Performance Monitor option to display the CPU usage history with the Memory, and Networking information.
The graphs display on top of all windows.
● Click the Export System Setting option to export the system settings file to the USB drive that is connected to the
thin client. Password is mandatory for the exported file. The file is stored in the /wnos/trouble_shoot/ folder of the
USB drive.
● Click the Export Screenshot option to export the system screenshots to the USB drive that is connected to the thin
client. The file is stored in the root folder of the USB drive.
● Click the Export logs option to export the system log files to the USB drive that is connected to the thin client. The file
is stored in the root folder of the USB drive—system_log_201910107_125610.tgz.
● Click the Import System Setting option to import the system settings file from the USB drive that is connected to the
thin client. The file is stored in the /wnos/trouble_shoot/ folder of the USB drive.
3. Click the Capture tab, and do the following:
Ping sends an echo request to a network host. The host parameter is either a valid hostname or an IP address. If the
host is operational and on the network, it responds to the echo request. Ping sends one echo request per second and
calculates round-trip times and packet loss statistics. It displays a brief summary upon completion of the calculation.
NOTE: Not all network equipment responds to ping packets, as it is a common mechanism that is used in denial-of-
service attacks. Lack of response does not necessarily indicate that the target of the ping is unusable for other
purposes.
a. Click Telnet.
b. Enter the hostname.
c. Enter a port number.
d. Select a color theme.
e. Click Connect to connect to a remote host or device.
7. Click OK to save your settings.
Steps
1. From the desktop menu, click System Setup > Admin Policy Tool.
The Configuration Control || ThinOS window is displayed.
2. In the Troubleshooting Settings window, click the Enable HTTP Log option.
The HTTP log feature is enabled on the thin client.
3. Log in to the Citrix session.
If the authentication fails, do the following:
a. Open the Troubleshooting window from the left menu on the ThinOS desktop.
b. Connect the USB drive to the thin client, and click Export logs.
All trace files including the event logs are exported to the USB drive. The log file is saved in the root folder of the USB
drive—system_log_20191107_125610.tgz.
c. Extract the tgz file, and verify if the http.log file is available.
Steps
1. Reboot the thin client.
2. Export relevant logs using one of the following methods:
● Use the Export logs option on the General tab in the Troubleshooting window on the ThinOS client.
● Use the Wyse Management Suite console.
3. Analyze the detailed error log report.
Steps
1. Reboot the thin client.
Steps
1. Reboot the thin client.
2. Export relevant logs using one of the following methods:
● Use the Export logs option on the General tab in the Troubleshooting window on the ThinOS client.
● Use the Wyse Management Suite console.
3. Analyze the detailed error log report.
Steps
1. Go to the Devices page, and click a particular device.
The device details are displayed.
2. Click the Device Log tab.
3. Click Request Log File.
4. After the log files are uploaded to the Wyse Management Suite server, click the Click here link, and download the logs.
NOTE: The ThinOS device uploads the system logs.
Important information
● The System configuration export is encrypted with a password and the administrator is prompted to provide password
protection upon using this option.
Steps
1. Launch a Citrix session on your thin client.
2. Open a web browser and play a QUMU published video.
3. Move the browser on the screen or scroll the browser.
4. Notice a delay or jump in the video window.
This noticeable lag in the video window indicates that the video is being redirected.
Steps
1. Connect to a Citrix server, and launch an ICA desktop.
2. Play a video or an audio file using Windows Media Player.
3. Drag and move the Windows Media Player.
Notice that the video graphic and the media player window frame are in different layer.
You can also determine if Windows Media Redirection is working using the method that is described in the CTX215173 article
at support.citrix.com.