UDS Enterprise Evaluation Version Installation, Administration & User Guide

Størrelse: px
Starte visningen fra side:

Download "UDS Enterprise Evaluation Version Installation, Administration & User Guide"

Transkript

1 UDS Enterprise Evaluation Version Installation, Administration & User Guide Versión 1.7 Rev July 2015

2 INDEX 1. INTRODUCTION Features VDI platform architecture with UDS Enterprise UDS Enterprise Components UDS Enterprise Broker UDS Tunneler UDS Database UDS Actor BEFORE INSTALLING UDS Installation of UDS Enterprise on VMware vsphere virtual platform Virtual platform requirements Network connections Storing UDS elements on VMware vsphere UDS Enterprise installation on ovirt virtual platform Virtual platform requirements Network connections UDS Enterprise installation on RHEV virtual platform Virtual platform requirements Network connections UDS Enterprise installation on Microsoft Hyper-V Virtual platform requirements Network connections UDS Enterprise installation on Citrix XenServer Virtual platform requirements Page 1 of 157

3 2.5.2 Network connections INSTALLING UDS ENTERPRISE UDS Enterprise Platform Requirements Infrastructure requirements Network requirements UDS Enterprise Platform installation UDS Broker installation UDS actor installation and configuration Windows UDS actor installation Linux UDS actor installation UDS Tunneler installation ADMINISTERING UDS Configuring Service Providers VDI platform with VMware vsphere Registering VMware Virtual Center Provider service provider Configuring service based on VMware Linked Clones VDI platform with ovirt Registration of service provider ovirt Platform Provider Configuring service based on ovirt Linked Clone VDI platform with RHEV Registration of service provider ovirt/rhev Platform Provider Configuring service based on ovirt Linked Clone VDI platform with Microsoft Hyper-V Registration of service provider Hyper-V Platform Provider Configuring service based on Hyper-V Linked Clone Connection to persistent hardware Registering service provider Physical Machine Providers Configuring service based on Physical Machines Providers Configuring Authenticators Page 2 of 157

4 4.2.1 Active Directory Authenticator edirectory Authenticator Internal Database IP Authenticator SAML Authenticator LDAP Authenticator Configuring users, user groups and user metagroups Creating "Internal Database" groups and users Creating IP Authenticator groups and users Configuring OS Managers Linux OS Manager Linux Random Password OS Manager Windows Basic OS Manager Windows Domain OS Manager Windows Random Password OS Manager Configuring Networks Configuring Transports HTML5 RDP Transport NX Transport (direct) NX Transport (tunneled) RDP Transport (direct) RDP Transport (tunneled) RGS Transport (direct) RGS Transport (tunneled) Configuring Services Pools DEPLOYING VIRTUAL DESKTOPS WITH UDS ENTERPRISE UDS ENTERPRISE ADVANCED CONFIGURATION UDS advanced parameters Page 3 of 157

5 6.1.1 UDS RGS SAML IPAUTH NX CLUSTER WYSE ENTERPRISE SECURITY VMWARE Image gallery Flush System Cache ABOUT VIRTUALCABLE Page 4 of 157

6 1. INTRODUCTION UDS Enterprise is a multiplatform VDI connection broker for Windows and Linux. It manages virtual desktop lifecycle and access for virtual desktop platforms and physical resources in the Data Center or Cloud. UDS Enterprise provides a set of software elements that forms a platform for managing and deploying IP services. One of these services is the lifecycle management, administration and connection to virtual desktops. This document contains basic instructions for installing UDS software on a virtual infrastructure and the administration and management of the service aimed at virtual desktop platforms. Page 5 of 157

7 1.1 Features The main features of UDS Enterprise include: Very easy installation and administration Multi-hypervisor, with the ability to migrate the platform to more efficient future solutions (currently it is compatible with VMware vsphere, KVM, Microsoft Hyper-V and la versión compatible con Citrix XenServer) Multi-authenticator, which permits users and user groups from different sources to be set up with a practically unlimited number of configurations Authentication system via multiple connectors, for example: Active Directory, edirectory, OpenLDAP, SAML, LDAP. Secure WAN access for publishing PCs on the Internet, using an SSL tunneler included in the subscription Client tool personalization using customized development Product road map based on client and community requests Ready for heterogeneous environments where other solutions do not have access because of functionalities or cost scaling, for example: AAPP or academic environment Subscription model based on support and updates for the implemented platform (UDS Broker) Non-redistributable subscription model by segments to an unlimited number of virtual desktops Page 6 of 157

8 1.2 VDI platform architecture with UDS Enterprise An optimal design of a VDI platform is essential in order to obtain all the benefits which may be provided by the architecture. Each layer that forms a VDI architecture may be designed to fulfill its function without affecting the other ones. The main elements that form a VDI architecture with UDS are: Connection clients: Devices used to access the virtual desktops, such as thin clients, zero clients, PCs, etc. It is important to identify if the access to the virtual desktops will be carried out from a LAN or from WAN UDS Servers: They are formed by a DB to storage all the data related to the environment, a connection broker which will manage the virtual desktops lifecycle and communication with the hypervisors and a tunnel server to allow secure access from outside. All of them will be served in virtual appliance format Authenticator/s: Active Directory, OpenLDAP, edirectory Servers, etc Through their integration with UDS they will control the users access to virtual desktops. Depending the environment, you may have from one to an unlimited number of authenticators Hypervisor platform: It executes the creation, switch on and removal of the virtual desktops which are managed from the broker. UDS integrates itself with Microsoft Hyper-V, VMware vsphere and KVM (ovirt and Red Hat Enterprise Virtualization) and Citrix XenServer hypervisors Storage: They will host the servers and/or virtual desktops of the platform. The choice of the type of storage is an important part of the design. Depending on the needs demanded by the users in the virtual desktops, we may select the most appropriate one regarding performance With a clear idea of the architecture design, you may start scaling the platform, bearing in mind the number of users that will access to it. Page 7 of 157

9 In the following image you can see an example of a VDI architecture with UDS Enterprise: Page 8 of 157

10 1.3 UDS Enterprise Components UDS Enterprise is made up of 4 elements that interact with each other. UDS Server. It is installed as a virtual machine (VM) and it is provided in virtual appliance format UDS Tunneler: It is installed as a virtual machine (VM) and it is provided in virtual appliance format UDS Data Base: It is installed as a virtual machine (VM) and it is provided in virtual appliance format. (it does not apply in the evaluation version) UDS Actor: it is installed on the VM as a service that will be used as a template for deploying the desktop groups The features and technical requirements of each component are defined below: : Page 9 of 157

11 1.3.1 UDS Enterprise Broker This is the software that mediates between clients and service providers. This is the basic piece of UDS, as it performs the functions of connection broker to the desktops and permits the administration and management of virtual desktop platforms defined as implemented services. Virtual Appliance with the following features: Virtual hard drive: 5 GB Memory: 1 GB CPU: 2 vcpu Network: 1 vnic Requirements: 1 IP Direction IP DNS Network mask IP Gateway Domain name Database IP DB port and instance name Activation code Page 10 of 157

12 1.3.2 UDS Tunneler Software that establishes secure connections to virtual desktops through WAN. It also provides HTML5 access to the virtual desktops. UDS tunneler allows the connection from any device/browser/client to the virtual desktops through a SSH tunnel without having installed any software beforehand. Moreover, it allows RDP access to virtual desktops through HTML5. Virtual Appliance with the following features: Hard drive: 5 GB Memory: 1 G CPU: 2 vcpu Network: 1 vnic Requirements: 1 IP Direction IP DNS Network mask IP Gateway Domain name IP UDS Server Page 11 of 157

13 1.3.3 UDS Database This component is responsible for storing all system UDS data, such as service providers, authenticators, connectivity and all the information needed to generate statistics. Currently, in UDS 1.7 version, only the database manager MySQL version 5.x is supported. It is necessary to have an appropriately configured MySQL database with a valid instance and user at the time of installation. IMPORTANT!: In the event that you do not have said database manager, VirtualCable can provide this component as a Virtual Appliance. This component is not included in the UDS support. Virtual Appliance with the following characteristics: Hard drive: 8 GB Memory: 1 GB CPU: 1 vcpu Network: 1 vnic Requirements: 1 IP address DNS IP Network mask IP Gateway Domain name User with instance permission THIS COMPONENT DOES NOT APPLY IN THE EVALUATION VERSION Page 12 of 157

14 1.3.4 UDS Actor This software performs the communication and interface functions for transmitting data (virtual desktop status, machine name ) and commands between the broker and the virtual desktops managed by UDS. It is installed on the virtual machine as a service that will be used as a template (Golden image) for generating virtual desktop groups based on linked clones. The supported operating systems are: Windows 8.1 Windows 8 Windows 7 Windows XP Windows 2008 Windows 2012 Linux (Debian, Ubuntu, CentOS, Fedora, OpenSuse, etc ) Requirements:.Net Framework 3.5 SP1 (Windows machines) Python 2.7 (Linux machines) UDS broker machine IP Page 13 of 157

15 2. BEFORE INSTALLING UDS The UDS Enterprise components can be hosted on different virtualization platforms. Even though the UDS Enterprise components are hosted on a single virtual platform, UDS is capable of managing the deployment of virtual desktops on multiple virtual platforms that are completely independent of the virtual platform where UDS Enterprise is hosted. The content of this section describes the requirements for installing UDS Enterprise on different virtualization platforms and the requirements of the virtual platform on which the software is to be installed. Page 14 of 157

16 2.1 Installation of UDS Enterprise on VMware vsphere virtual platform Virtual platform requirements UDS Enterprise will be able to be deployed on VMware vsphere platforms starting with version 5. To find out the requirements of a VMware vsphere platform, you can access the following documentation: VMware Compatibility Guide vcenter Server and vsphere Client Hardware Requirements The VMware platform on which UDS will be deployed must meet the following requirements: At least one VMware ESXi server with a valid license is needed for hosting the UDS servers and generating the virtual desktops The vsphere platform must be administered by a vcenter with a valid license For UDS to be installed and capable of sending requests to a vcenter, and for these requests to be carried out, the user must have administration rights credentials on the VMware vsphere platform on which the virtual desktops are to be deployed. At least one Virtual Machine Port Group to which the Virtual Appliance of the UDS platform is going to be connected must be established At least one Virtual Machine Port Group to which the different virtual desktops managed by UDS are going to be connected must be established There must be at least 18 GB of free space on the hard drive to host the Virtual Appliance that make up UDS There must be at least 3 GB of free RAM to host the Virtual Appliance that make up UDS Page 15 of 157

17 2.1.2 Network connections The following connections between the different elements which make up the UDS Enterprise platform must be enabled: Origin Destination Port UDS Broker DB MySQl 3306 UDS Broker vcenter 443 UDS Broker Authenticator 389, 636 (SSL) Tunnelerr UDS Broker 80, 443 UDS Broker Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Tunnelerr Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Users UDS Broker 80, 443 Users Tunneler 443 Users HTML5 (Tunel) Page 16 of 157

18 2.1.3 Storing UDS elements on VMware vsphere The main component of UDS evaluation release is provided in OVA format (Open Virtualization Alliance) to upload the VM to vsphere platform, using the vsphere client. Steps: 1.- Once established connection on the target platform though VMware vsphere client, please choose the menu option File \ deploy OVF Template... Page 17 of 157

19 2.- Select the source location of the virtual machine.ova file Page 18 of 157

20 3.- On next step the wizard displays virtual machine features to be hosted in the target virtual platform: 4.- Next step, select inventory name and location of the virtual machine on the target platform. Page 19 of 157

21 5.- Then, select the destination datastore where the virtual machine is going to be stored. 6.- Next step, the wizard displays the name and size of the selected datastore; you can choose the machine virtual hard drive format. It is recommended to select Thick Provision Lazy Zeroed format, as this provides better performance. Page 20 of 157

22 7.- Select the virtual network to connect the virtual machine. 8.- In the last step, wizard displays the virtual machine conversion details. Clicking "Finish" button starts the conversion process. Page 21 of 157

23 Once the conversion process has been completed, you now have the UDS Broker server in its Enterprise version stored on the vsphere virtual platform. NOTE: Steps 1 to 8 (if necessary) must be repeated for the Virtual Appliance of the tunneler and the MySQL Database server (only in the event that Virtual Cable provides the Virtual Appliance database). Page 22 of 157

24 2.2 UDS Enterprise installation on ovirt virtual platform Virtual platform requirements UDS can be deployed on ovirt platforms starting with version 3.2. The ovirt platform on which UDS is going to be deployed must meet the following requirements. At least one ovirt server node is needed to host the UDS servers and create the virtual desktops The ovirt platform must be administered by an ovirt-engine For UDS to be installed and capable of sending requests to an ovirt-engine, and for these requests to be carried out, the user must have administration rights credentials on the ovirt platform on which the virtual desktops are to be deployed. You must have at least one cluster set up for creating and configuring the different virtual desktops managed by UDS You must have at least one Logical network set up to which the virtual servers of the UDS platform are going to be connected You must have at least one Logical network set up to which the different virtual desktops managed by UDS are going to be connected There must be at least 18 GB of free space on the hard drive to host the virtual servers that make up UDS There must be at least 3 GB of free RAM to host the virtual servers that make up UDS Page 23 of 157

25 2.2.2 Network connections The following ports between the different elements that make up the UDS platform must be enabled: Origin Destination Port UDS Broker DB MySQL 3306 UDS Broker ovirt-engine 443 UDS Broker Authenticator 389, 636 (SSL) Tunneler UDS Broker 80, 443 UDS Broker Virtual desktops 3389 (RDP), 22 (NX), (RGS) Tunneler Virtual desktops 3389 (RDP), 22 (NX), (RGS) Users UDS Broker 80, 443 Users Tunneler 443 Users s HTML5 (Tunnel) Page 24 of 157

26 2.3 UDS Enterprise installation on RHEV virtual platform Virtual platform requirements UDS Enterprise can be deployed on Red Hat Enterprise Virtualization platforms version 3. The RHEV platform on which UDS is going to be deployed must meet the following requirements: At least one RHEV server is needed to host the UDS servers and create the virtual desktops The RHEV platform must be administered by a RHEV-Manager server For UDS to be installed and capable of sending requests to a RHEV-Manager, and for these requests to be carried out, the user must have administration rights credentials on the RHEV platform on which the virtual desktops are to be deployed. You must have at least one set up cluster for creating and configuring the different virtual desktops managed by UDS You must have at least one set up Logical network to which the virtual servers of the UDS platform are going to be connected You must have at least one set up Logical network to which the different virtual desktops managed by UDS are going to be connected There must be at least 18 GB of free space on the hard drive to host the virtual servers that make up UDS There must be at least 3 GB of free RAM to host the virtual servers that make up UDS Page 25 of 157

27 2.3.2 Network connections The following ports between the different elements that make up the UDS platform must be enabled: Origin Destination Port UDS Broker DB MySQL 3306 UDS Broker RHEV-Manager 80, 443 UDS Broker Authenticator 389, 636 (SSL) Tunneler UDS Broker 80, 443 UDS Broker Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Tunneler Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Users UDS Broker 80, 443 Users Tunneler 443 Users HTML5 (Tunnel) Page 26 of 157

28 2.4 UDS Enterprise installation on Microsoft Hyper-V Virtual platform requirements UDS can be deployed on Microsoft Hyper-V platforms starting with version 3 The Microsoft Hyper-V platform on which UDS is going to be deployed must meet the following requirements. At least one Microsoft Hyper-V server with a valid license to host the UDS servers and create the virtual desktops It is necessary that Microsoft Hyper-V servers are not part of a Microsoft cluster For UDS to work properly against a Microsoft Hyper-V server, it is necessary that this server is not part of a Microsoft cluster. The support for clustered Microsoft Hyper-V will be supported in next UDS versions. You must have at least one Virtual Switch to connect the virtual servers of UDS platform You must have at least one Virtual Switch to connect the different virtual desktops managed by UDS You must have the credentials of one user with administration privileges on the Microsoft Hyper-V platform where the virtual desktops are going to be deployed There must be at least 18 GB of free space on the hard drive to host the virtual servers that make up UDS There must be at least 3 GB of free RAM to host the virtual servers that make up UDS You must enable WSMan on every Hyper-V host used with UDS so that Microsoft Hyper-V with UDS will perform properly To enable it through HTTPS, you must have a valid certificate. Page 27 of 157

29 To enable it through HTTP, we run: winrm quickconfig winrm set winrm/config/service winrm set winrm/config/service/auth Page 28 of 157

30 2.4.2 Network connections The following connections between the different elements which make up the UDS platform must be enabled: Origin Destination Port UDS Broker DB MySQL 3306 UDS Broker Hyper-V 80, 443 UDS Broker Authenticator 389, 636 (SSL) Tunneler UDS Broker 80, 443 UDS Broker Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Tunneler Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Users UDS Broker 80, 443 Users Tunneler 443 Users HTML5 (Tunnel) Page 29 of 157

31 2.5 UDS Enterprise installation on Citrix XenServer Virtual platform requirements UDS can be deployed on Citrix XenServer 6.5 platforms. The XenServer platform on which UDS is going to be deployed must meet the following requirements: At least one XenServer server to host the UDS servers and create the virtual desktops For UDS to work properly against a XenServer server, it is necessary to have the credentials for a user with administration rights on the XenServer platform where the virtual desktops are going to be deployed. You must have at least one network to connect the virtual servers of UDS platform You must have at least one network to connect the different virtual desktops managed by UDS There must be at least 18 GB of free space on the hard drive to host the virtual servers that make up UDS There must be at least 3 GB of free RAM to host the virtual servers that make up UDS Page 30 of 157

32 2.5.2 Network connections The following connections between the different elements which make up the UDS platform must be enabled: Origin Destination Port UDS Broker DB MySQL 3306 UDS Broker XenServer 80, 443 UDS Broker Authenticator 389, 636 (SSL) Tunneler UDS Broker 80, 443 UDS Broker Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Tunneler Virtual Desktops 3389 (RDP), 22 (NX), (RGS) Users UDS Broker 80, 443 Users Tunneler 443 Users HTML5 (Tunnel) Page 31 of 157

33 3. INSTALLING UDS ENTERPRISE At this point, we will detail the installation of UDS Enterprise components. The installation procedure will be the same for the different virtualization platforms supported by UDS Enterprise. 3.1 UDS Enterprise Platform Requirements Infrastructure requirements The infrastructure requirements needed to be able to deploy UDS are: Virtualization platform. This will be responsible for hosting the virtual desktops generated by UDS and running the servers that make up UDS o Username and Password of the manager of the virtualization platform with administrator permission DNS server. This service is necessary for both the proper operation of the virtual platform as well as for the UDS platform to be deployed DHCP server. A DHCP server that permits you to assign IP addresses to the virtual desktop groups created by Linked Clones is needed Network requirements In order to configure the UDS network, you must have at least 2 IP addresses to configure UDS (broker, tunneler and MySQL Database). It is also necessary to have the following components available: Network mask IP address of the DNS server Gateway IP address Domain name (if there is one) IP address of the virtualization platform manager Page 32 of 157

34 3.2 UDS Enterprise Platform installation UDS Broker installation Once the virtual machine that makes up the broker server UDS is turned on, a client console will be opened to access the virtual machine. NOTE: In order to successfully configure a UDS Broker server, a MySQL database server with a completely empty database must be configured. If you use a database which has already been used and it contains data from another UDS versión, all data will be migrated in order to be used in UDS Server 1.7 version (database migrations are only allowed from 1.5 version onwards). In this moment the UDS broker server configuration process starts: Page 33 of 157

35 Step 1.- You must enter the subscription activation code. Step 2.- You should configure the following parameters: Host Name. This name has to be created in the appropiate name server Domain. Domain where the broker server UDS is going to be hosted Broker Server UDS network data (IP Address, Network Mask, Gateway and DNS) Page 34 of 157

36 Step 3.- Configuration of UDS administration user. In this step, a username will be created in order to Access for the first time to UDS Administration. The Access of such user can be disabled in UDS advanced configuration options. The information to fill in is the following: Username: User with administrator permission for managing the UDS platform Password: Password for the administrating user created in the previous step NOTE: The assigned password to the UDS system administrator user will be also valid for the Linux SO root user that hosts UDS software. It may be changed via console inside the virtual appliance. Page 35 of 157

37 Step 4.- Configuration summary. If all the data entered in the configuration wizard are right, click on Continue to start the UDS Server virtual appliance configuration. Page 36 of 157

38 Once all the steps are completed, we will have to restart the broker server UDS. If you need to run again the configuration wizard to modify any data, you ll have to validate yourself on the server (using the root user and the password for UDS system administration user fixed in Step 3) and execute SetupUDS.sh. Once the configuration has been set up, it is necessary to reboot the server manually. Page 37 of 157

39 3.2.2 UDS actor installation and configuration In order to install the UDS actor, you must have previously downloaded the UDS Broker by selecting the suitable actor for each platform (Windows and Linux). In order to do that, you connect to the UDS Broker via web browser and using credentials for a user with administration privileges to access the downloads. In the user menu we choose Downloads : Page 38 of 157

40 The UDS actors available for download will be shown in the browser. Select the actor corresponding to the operating system that is installed on the template on which the desktops are going to be deployed: UDSActorSetup.exe: UDS actor for Windows machines Udsactor-opensuse noarch.rpm: UDS actor for Linux OpenSuse machines Udsactor noarch.rpm: UDS actor for Linux CenOS, Fedora, RHEL, etc Udsactor_1.7.0_all.deb : UDS actor for Linux, Debian, Ubuntu, Xubuntu machines Page 39 of 157

41 3.2.3 Windows UDS actor installation Once the UDS actor has been downloaded and it has been transferred to the template, it can now be installed: NOTE: Before UDS actor has been installed, you need the IP address of the UDS server broker. In the first dialogue window, we accept the license agreement: Page 40 of 157

42 In the next dialogue window, we select the installation location for the UDS actor: Click on Install and the UDS actor will begin its installation process: Page 41 of 157

43 Once the installation has been completed, the UDS actor is configured: Enter the IP address of the UDS server broker and indicate if you will use a secure connection and the level of logs generated. We need to indicate the UDS Master Key that the UDS server broker (this code provides more security to the system). In order to obtain this code you have to access UDS administration (with an user with administration rights), go to Tools section and there select Security tab and copy the code from the Master Key parameter. Page 42 of 157

44 Once these parameters have been configured, run the connection test to check the connectivity with the server broker. Once the UDS actor has been configured and installed, you can switch off the virtual machine and it is now ready to be used as an UDS system virtual desktop template. NOTE: To make the connection through RDP transport, it will be necessary to enable the remote Access to the virtual desktop template. Page 43 of 157

45 3.2.4 Linux UDS actor installation Once we have downloaded the appropiate UDS actor for the chosen Linux distro and it has been transferred to the base template, we run the actor in order to install it. NOTE: Before installing the UDS actor we need the UDS server broker IP address. We enter the UDS server broker address in the configuration wizard: Page 44 of 157

46 Select how communication with the UDS server broker will be carried out. Enter the UDS Master Key generated by the UDS server broker (this code provides the system with more security). To obtain this code, we have to access UDS administration (with a user with administration rights), go to Tools section and click on Security tab and copy the code from Master Key parameter. Page 45 of 157

47 Click on ok and the UDS actor installation and configuration process ends here. The virtual machine is now ready to be used as a UDS system virtual desktop template and can be switched off. NOTE: To make the connection through RDP transport, you must install XRDP package in order to enable the remote access to the virtual desktop template. Yo may follow the steps explained in this article. Yo can modify any configuration parameter of the UDS actor for Linux desktops in the actor configuration file localet in: /etc/udsactor/udsactor.cfg If the desktop s base template already has a previous versión of the UDS actor, it is necessary to completely uninstall it and install the new actor. Yo may follow the steps explained in this article. Page 46 of 157

48 3.2.5 UDS Tunneler installation Once the virtual machine that makes up the UDS tunneler is turned on, a client console will be opened to access the virtual machine. NOTE: To configure a UDS server tunneler successfully you must configure a UDS server broker and to know its IP address. At this moment the UDS tunneler configuration process starts: Page 47 of 157

49 Step 1.- The following parameters will be configured: Host Name. This name must be defined in the corresponding DNS server Domain. Domain where the UDS Server Tunneler will be hosted UDS server Tunneler Network data (IP Address, Network Mask, Gateway and DNS) Page 48 of 157

50 Step 2.- Fill in connection data to UDS Broker server: Broker Address: UDS server broker IP address or DSN name Broker Port: Communication Port with UDS server broker. By default 443 Use SSL secure connection Page 49 of 157

51 Step 3.- Configuration of the Linux OS root user that hosts the UDS software tunneler. Fill in the following data: Username: Linux OS root user`s password Password: root user`s password Step 4.- Start the UDS server tunneler configuration: Page 50 of 157

52 Once all the steps have been completed, the UDS server tunneler has to be rebooted. If a rerun of the configuration wizard is needed to modify any data, we will have to validate us in the server using the credentials we obtained in the Step 3 and run SetupTunneler.sh Once the configuration is finished, we will have to manually restart the server for the changes to be made. Page 51 of 157

53 4. ADMINISTERING UDS Once the UDS platform has been installed, the system will be ready for its initial administering and configuration. To do this, enter the IP address or UDS Broker server name through http or https access. Page 52 of 157

54 The first time you enter UDS administration dashboard, you must enter using the administrator user and the password indicated in the UDS Broker Virtual Appliance configuration script (step 3.2.1). Once you access the administration dashboard, you will be able to change the password and create or select new users to enter administration dashboard. If you already have an user with administration privileges for UDS platform, enter that user, password and select the authenticator that will validate the user. Page 53 of 157

55 If we have more than one authenticator connected to UDS platform and we would like to access the administration dashboard with the administrator user and password indicated in the configuration script of the UDS broker Virtual Appliance (see section), the selected authenticator won t be used, because this user won t be validated against any authenticator. In the user menu, select "Dashboard" to enter UDS administration: Page 54 of 157

56 Once inside UDS administration, the initial configuration of the services will begin. The configuration of each "Services Pools" must be approached like the building of a puzzle, made up of different elements: Each "Services Pool" is made up of different elements or pieces (Base Services, OS Managers, Transports and Authenticators) Once the elements of the first "Services Pool" have been configured, the creation thereof will begin, repeating the process with the next "Services Pool", if there is one All of the configured "Services Pool" together will form the type of virtual desktop deployment managed by the UDS platform Page 55 of 157

57 4.1 Configuring Service Providers A Service Provider is the organization responsible for offering IP services. The services offered by UDS will be on-demand virtual desktops provided by a virtualization platform or persistent physical/virtual desktops assigned to specific users via assignment of IPs. In order to build a Service Pool, it is necessary to at least have created a Service Provider. Currently, UDS allows the following Service Providers: Page 56 of 157

58 4.1.1 VDI platform with VMware vsphere Deployment of VDI platform via the VMware vsphere virtual infrastructure Registering VMware Virtual Center Provider service provider Enter "Services", click "New" and select VMware Virtual Center Provider. Page 57 of 157

59 In a VMware Virtual Center Provider, the minimum parameters to configure are: Service Name, vcenter server IP ( Host field), an username and password with administrator rights on vcenter. We can also select Timeout in the connection with vcenter and specify a range of MAC addresses for creating the virtual desktops. By clicking the Test button, we check if the connection has been made correctly. Page 58 of 157

60 When saving this configuration, we already have a valid "Service Providers" to start creating base services in the VMware vcenter platform. We can register all VMware Virtual Center Provider Service Providers we need in the UDS platform. In order to modify any parameter in an existing Service Provider, we have to select it and click on Edit. Clicking the Maintenance button we can stop all operations executed in UDS broker on a service provider. It is recommended to enter a maintenance service provider when the communication with thos service provider is lost or you re planning a maintenance shutdown. Page 59 of 157

61 Configuring service based on VMware Linked Clones Once the vsphere platform where the desktops will be created has been configured, you must create Base Services based on VMWare Linked Clones. Select the Service Providers where we are going to create a VMware Linked Clone and click "New". Page 60 of 157

62 Choose a descriptive name for the template and configure the service parameters: Datacenter: Datacenter where the service will be hosted. Network: Network to which the desktops will be connected. Pub. Resource Pool: vcenter resources Pool where the Linked Clones virtual desktops will be hosted (if there are no Pools in the VMware infrastructure, they will be created in the root). Clones Folder: Location of the Linked Clones virtual desktops in the VMs view and the vcenter templates. Resource Pool: vcenter resources pool where the template to be used by the service is located. Base Machine: Template for deploying the virtual desktops. Memory: Amount of memory to be assigned to the Linked Clones virtual desktops. Pub. Datastores: Location where the publication of the service will be stored. We can select one, several or all the datastores. If you select more than one, the system will always locate the new publications in the Datastore with more free space (By default, the system won t generate new publications in datastores with less than 30GB of free space. This parameter can be modified entering the UDS system advanced options). Inc. Datastores: Location where the created Linked Clones will be stored. We can select one, several or all the datastores. If you select more than one, the system will always locate the new Linked Clone desktops in the Datastore with more free space (By default, the system won t generate new virtual desktops in datastores with less than 30GB of free space. This parameter can be modified entering the UDS system advanced options). Machine Names: Root name of all of the Linked Clones virtual desktops to be deployed on this service. (ex: Machine Names= UDSW8). Page 61 of 157

63 Name Length: Number of digits of the counter attached to the root name of the desktops (ex: Name Length= 3, UDSW UDSW8-999). Page 62 of 157

64 When saving this configuration, we already have a valid "VMware Linked Clone Base" in the VMware vcenter platform. We can register all VMware Linked Clone Base" we need in the UDS platform. Once the entire UDS environment has been configured and the first Service Pools has been created, we will be able to observe how the virtual desktops based on VMWare Linked Clones are deployed on the vcenter server. The first task that the vcenter will perform will be to create a base machine (this machine will be created each time we make a publication of a service) which will be a clone of the template selected when registering the service, with a hard drive size and characteristics equal to those of said template. Page 63 of 157

65 Once the process of creating the base machine has been completed (the UDS system calls it: UDS Publication name_service number_publication ), the creation of virtual desktops in the vcenter automatically begins (the UDS system calls it: UDS service Machine_Name+Name_Length ). The hard drive space taken up by the virtual desktops ( Linked Clones ) will be exclusively that which is taken up by the changes made by the users on the machines after their initial connection. NOTE: UDS Enterprise doesn t support E1000E virtual card, we recommend using VMXNET 3. Page 64 of 157

66 4.1.2 VDI platform with ovirt Deploying the VDI platform via the virtual ovirt infrastructure Registration of service provider ovirt Platform Provider Enter "Services", click "New" and select ovirt/rhev Platform Provider : In an ovirt/rhev Platform Provider, you must configure at least the following parameters: Service Name, ovirt-engine IP server ( Host field), username (with user@domain format) and password with administration rights on the ovirt- engine. We can also indicate the Timeout in the connection with ovirt-engine and specify a range of MAC addresses for creating the virtual desktops. Page 65 of 157

67 We will check that the connection has been correctly made by clicking on the Test button. When saving this configuration, we already have a valid "Service Providers" to start creating base services in the ovirt platform. We can register all ovirt/rhev Platform Provider Service Providers we need in the UDS platform. Page 66 of 157

68 In order to modify any parameter in an existing Service Provider, we may select it and click on Edit. Clicking the Maintenance button we can stop all operations executed in UDS broker on a service provider. It is recommended to enter a maintenance service provider when the communication with thos service provider is lost or you re planning a maintenance shutdown Configuring service based on ovirt Linked Clone Once the ovirt platform where the desktops will be created has been configured, you must create base services based on ovirt/rhev Linked Clones. Select the Service Providers where we are going to create an ovirt/rhev Linked Clone and click "New". Page 67 of 157

69 Type a descriptive name for the template and configure the service parameters: Base Machine: Template for deploying the virtual desktops. Cluster: ovirt node cluster that will host the deployed Linked Clones. Datastore Domain: Storage established for deploying the Linked Clones. Reserved Space: Minimun free space a Datastore may have to be used by UDS system. Memory: Amount of memory that will be assigned to the Linked Clones. Memory Guaranteed: Amount of memory that will be guaranteed to the Linked Clones. Machine Names: Root name of all of the Linked Clones to be deployed in this service (ex. Machine Names= Win7lab2). Name Length: Number of counter digits attached to the root name of the desktops (ex: Name Length= 3, Win7lab Win7lab2999). Display: Connection protocol of the virtual desktops deployed via Linked Clones. Page 68 of 157

70 When saving this configuration, we already have a valid "ovirt Linked Clone" in the ovirt platform. We can register all "ovirt Linked Clone" we need in the UDS platform. Page 69 of 157

71 When the entire UDS environment has been configured and the first deployed service has been created, we will be able to observe how the virtual desktops based on ovirt Linked Clones are deployed on the ovirt-engine server. Page 70 of 157

72 4.1.3 VDI platform with RHEV Deploying the VDI platform via virtual Red Hat Enterprise Virtualization infrastructure Registration of service provider ovirt/rhev Platform Provider Enter "Services", click "New" and select ovirt/rhev Linked Clone : When we use an ovirt/rhev Linked Clone to connect a RHEV platform you must configure at least the following parameters: Service Name, RHEV-Manager IP server ( Host field), username (with user@domain format) and password with administration rights on RHEV-Manager. We can also indicate the Timeout in the connection with RHEV-Manager and specify a range of MAC addresses to create the virtual desktops. Page 71 of 157

73 We will check that the connection has been correctly made by clicking on the Test button. When saving this configuration, we already have a valid "Service Providers" to start creating base services in the RHEV platform. We can register all ovirt/rhev Linked Clone Service Providers we need in the UDS platform. Page 72 of 157

74 Configuring service based on ovirt Linked Clone Once the RHEV platform through ovirt/rhev Platform Provider service provider, where the desktops will be created, has been configured, you must create base services based on ovirt/rhev Linked Clones. Select the Service Providers where we are going to create an ovirt/rhev Linked Clone and click "New". Page 73 of 157

75 Type a descriptive name for the template and configure the service parameters: Base Machine: Virtual Machine Image the Linked Clokes will be deployed from. Cluster: RHEV cluster that will host the deployed Linked Clones. Datastore Domain: Storage established for deploying the Linked Clones. Reserved Space: Minimun free space a Datastore may have to be used by UDS system. Memory: Amount of memory that will be assigned to the Linked Clones. Memory Guaranteed: Amount of memory that will be guaranteed to the Linked Clones. Machine Names: Root name of all of the Linked Clones to be deployed in this service (ex. Machine Names= Win7lab2). Name Length: Number of counter digits attached to the root name of the desktops (ex: Name Length= 3, Win7lab Win7lab2999). Display: Connection protocol of the virtual desktops deployed via Linked Clones. Page 74 of 157

76 When saving this configuration, we already have a valid "ovirt Linked Clone" in RHEV platform. We can register all "ovirt Linked Clone" we need in the UDS platform. Page 75 of 157

77 When the entire UDS environment has been configured and the first Service Pools has been created, we will be able to observe how the virtual desktops based on ovirt Linked Clones are deployed on the RHEV-Manager server. Page 76 of 157

78 4.1.4 VDI platform with Microsoft Hyper-V Deploying the VDI platform via the virtual Microsoft Hyper-V infrastructure Registration of service provider Hyper-V Platform Provider Enter "Services", click "New" and select Hyper-V Platform Provider. In a Hyper-V Platform Provider you must configure at least the following parameters: Service Name, Microsoft Hyper-V IP server ( Host field), user name and password with administration rights on the Microsoft Hyper-V. We can also indicate the Timeout in the connection with Microsoft Hyper-V and specify a range of MAC addresses for creating the virtual desktops. Page 77 of 157

79 We will check that the connection has been correctly made by clicking on the Test button. When saving this configuration, we already have a valid "Service Providers" to start creating base services in the Microsoft Hyper-V platform. We can register all Hyper-V Platform Provider Service Providers we need in the UDS platform. Page 78 of 157

80 We will be able to register all Hyper-V Platform Provider "Service Providers" we need on the UDS platform. Page 79 of 157

81 Configuring service based on Hyper-V Linked Clone Once the Microsoft Hyper-V platform where the desktops will be created has been configured, you must create base services based on "Hyper-V Linked Clone". Select the Service Providers where we are going to create a "Hyper-V Linked Clone" and click "New". Page 80 of 157

82 Type a descriptive name for the template and configure the service parameters: Base Machine: Template for deploying the virtual desktops. Network: Network to which the desktops will be connected. Memory: Amount of memory to be assigned to the Linked Clones virtual desktops. Datastores Drives: Location where the publication of the service and the Linked Clones created will be stored. We can select one, several or all of the datastores clicking the Ctrl button. If you select more than one, the system will always locate the new publications and desktops in the Datastore with more free space. Machine Names: Root name of all of the Linked Clones virtual desktops to be deployed on this service. (ex: Machine Names= W1). Name Length: Number of digits of the counter attached to the root name of the desktops (ex: Name Length= 3, W W7999). Page 81 of 157

83 Once the entire UDS environment has been configured and the first Service Pools have been created, we will be able to observe how the virtual desktops based on Microsoft Hyper-V are deployed on the Microsoft Hyper-V server. The first task that the Microsoft Hyper-V server will perform will be to create a base machine (this machine will be created each time we make a publication of a service) which will be a clone of the template selected when registering the service, with a hard drive size and characteristics equal to those of said template. Once the process of creating the base machine has been completed (the UDS system calls it: UDS Publication name_service number_publication ), the creation of virtual desktops in the Microsoft Hyper-V automatically begins (the UDS system calls it: UDS service Machine_Name+Name_Length. The hard drive space taken up by the virtual desktops ( Linked Clones ) will be exclusively that which is taken up by the changes made by the users on the machines after their initial connection. Page 82 of 157

84 4.1.5 Connection to persistent hardware Access persistent hardware by assigning fixed-user IP addresses. Assigning IP addresses and usernames will be done by order of access, that is, the first user that accesses this service will be assigned the first IP address on the list. In order to connect to the machine to which the assigned IP address to a user belongs, the machine must have previously been switched on, the Terminal Services for Windows machines must be enabled and the NX software for Linux machines must be installed Registering service provider Physical Machine Providers Enter "Services", click "New" and select Physical Machines Provider. Page 83 of 157

85 Choose a name for the Physical Machine Provider. Page 84 of 157

86 Configuring service based on Physical Machines Providers Once the Service Provider for persistent equipment has been created, you must register Base Service based on Physical machines accessed by IP. Select the "Service Providers" where we are going to create a "Physical machines accessed by IP" and click "New". Page 85 of 157

87 Choose a name for the service and enter the IP addresses to which they will provide access. Click List of IPS to add IPs addresses: Enter the IP addresses of the machines to which it will have access and save the changes: Page 86 of 157

88 When saving we ll have a valid Physical machines accesed by IP. We ll be able to create all Physical machines accesed by IP we need on UDS platform. NOTE: The user & IP address assignation will be made according to the order of access; the first user accessing the service will be assigned the first machine (IP assigned in the list) and so on with the rest of them. Page 87 of 157

89 4.2 Configuring Authenticators An Authenticator is a basic component within a desktop platform since it allows the users and user groups to whom you have granted sign in credentials to connect to the different virtual desktops. An Authenticator is not needed to create a Service Pools. But if the Service Pool hasn t at least one authenticator assigned, there will be no users able to connect to UDS platform virtual desktops. You can choose between different types of authenticators. Page 88 of 157

90 4.2.1 Active Directory Authenticator In an Active Directory Authenticator, we configure the authenticator name, the domain controller IP ( Host field), a username ( Ldap User field) and password with reading rights on the Active Directory. The username ( Ldap User field) must be typed in with the format user@domain. We can also indicate: the priority of this authenticator, the lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). We can also choose if we want to use an SSL connection and the Timeout in the connection with the Active Directory. If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 89 of 157

91 By clicking on the Test button, we can check to see whether the connection has been made correctly. Page 90 of 157

92 4.2.2 edirectory Authenticator This authenticator is available to provide Novell network users and user groups access to UDS virtual desktops. In an edirectory Authenticator, we configure the authenticator name, the edirectory IP server (Host field), a username (Admin User field) and password with reading rights on the edirectory. We can also indicate: the priority of this authenticator, the lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). We can also choose if we want to use an SSL connection and the Timeout in the connection with the Active Directory. If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 91 of 157

93 By clicking on the Test button, we can check to see whether the connection has been made correctly. Page 92 of 157

94 4.2.3 Internal Database In environments where no external authenticator is available, it is possible to use the internal authenticator. This authenticator is included in the UDS broker and permits you to manually create users and user groups so that they can subsequently access the different Service Pools provided by UDS. In an Internal Database, we configure the authenticator name. We can also indicate the priority of this authenticator. The lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 93 of 157

95 In this section, we see two options: Different user for each host. This option allows connections to virtual desktops by using a single connection user ID. These types of connections are made by creating multiple users in the internal database with the following username structure: Hostname terminal ID + Connection User ID Reverse DNS The behavior is exactly the same as in the previous option, but the username structure would be: Hostname terminal ID + User ID Page 94 of 157

96 In order to be able to use this option, you must have the reverse DNS resolution in the connection terminal IDs. In the event that this does not exist, the username structure would continue using the IP address connection terminal ID. Page 95 of 157

97 4.2.4 IP Authenticator It is possible to assign virtual desktops to connecting devices via the IP identifier. Ex: Thin Clients in kiosk mode, Call Center environments, proprietary applications, etc... Page 96 of 157

98 In an IP Authenticator, we configure the authenticator name. We can also indicate the priority of this authenticator. The lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 97 of 157

99 4.2.5 SAML Authenticator SAML is used to exchange authentication and authorization data between security domains, that is, between an identity provider (an assertion producer) and a service provider (an assertion consumer). In a SAML Authenticator, we configure the authenticator name and data: Private Key, Certificate IDP Metedata, Entity ID, User name attrs, Group name attrs and Real name attrs. We can also indicate the priority of this authenticator. The lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 98 of 157

100 Page 99 of 157

101 4.2.6 LDAP Authenticator This is a generic authenticator available within the UDS platform. By configuring the correct parameters according to each case, we can define practically any authentication service based on LDAP. In an LDAP Authenticator (Simple or Regex), we configure the authenticator name, the LDAP server IP ( Host field), the connection port, a username ( Ldap User field) and password with reading rights on LDAP, the name of the user and groups search base ( base field) in the format: dc=name_domain,dc=extension_domain The username (Ldap User field) must be typed in with the format: cn=user,dc=name_domain,dc=extension_domain We can also indicate the priority of this authenticator. The lower that priority is, the higher it will appear on the list of authenticators available in the user access window (this field admits negative values). If the Small Name field is chosen, it only allows this authenticator to appear on the user login screen; to do this, we have to access the login screen with the following format: address_server_broker/small_name For example: Page 100 of 157

102 Page 101 of 157

103 4.3 Configuring users, user groups and user metagroups Once the authenticator or authenticators have been configured, you must configure the user groups that contain the users to whom access to the virtual desktops is to be granted. It is also possible to create metagroups, which will be used to combine several groups. To create a group, select the authenticator where we want to create or add the group. In the new window that appears at the bottom of the window, select Groups tab and click "new". Page 102 of 157

104 Searching for user groups is done automatically in all of the defined authenticators in UDS, with the exception of Internal and by IP authenticators (Sometimes the search option doesn t work in OpenLdap or edirectory authenticators. In that case, you may indicate manually the group name), in which the groups are registered without being able to perform a search. To look for a group, click "Search". We can write down a root name to enclose the search. If we leave this field empty, all the available groups on the authenticator will appear. If we need to add more than one group, we ll have to do it one by one. Once the group is selected, click Accept. If you know the name, you can write it down directly, but it is recommended to check that it appears in the right way in the search option. The groups, metagroups and users can be temporarily activated or deactivated. Page 103 of 157

105 To create a metagroup, we select the groups that will form part of the metagroup, we choose a name for the new group and we click Accept. A user will belong to this metagroup if he belongs to all the groups which form the metagroup. The users of the configured groups are automatically added to the system when they connect to the UDS platform for the first time, except in Internal or by IP authenticators, in which the users will have to be manually registered. If we need to register new users manually, to assign special permissions, before they connect for the first time and they add themselves automatically, we ll have to select the authenticator and in Users tab click "New". Page 104 of 157

106 The additional Staff parameter allows access to downloads (UDS actor) and to the UDS administration. The additional Admin parameter allows access to downloads (UDS actor), to the administration and also allows for the modification of advanced UDS configurations (Tab Tools - Configuration ). An Admin user has to simultaneously be a Staff member. By clicking "Search" button we can search users created in the authenticator and add them. Once the user has been created, click "Edit" to check that the user has been automatically assigned to the group it belongs. Page 105 of 157

107 If we register a user that belongs to a group which is not registered in the authenticator, it will appear without group and we won t be able to use that user. The "Staff member" and "Admin" user options can be modified anytime. To delete a user, a group or a metagroup, select it and click "Delete" button. If we have registered users in the system that belong to a group and this group is deleted, the users won t have an assigned group and they couldn t be validated in the system. Page 106 of 157

108 4.3.1 Creating "Internal Database" groups and users In an Internal Database authenticator the first thing we have to do is create a group or groups of users. Select the Internal Database authenticator and in Groups tab click "New". Once the group or groups of users are created, register the users and assign them to one or several groups. Select the Internal Database authenticator and in Users tab click "New". Page 107 of 157

109 4.3.2 Creating IP Authenticator groups and users The creation of a group in the by IP authenticator is different from the other ones, because in this case it will be a range of IPs addresses which will be registered to allow access to all the hardware within this range. This range of addresses is defined as follows: IP address start range IP address end range Select IP Authenticator" authenticator and in "Groups" tab click "New". Page 108 of 157

110 The IP addresses that will be those of the new users, will be automatically added to the Users tab the first time they log in. Page 109 of 157

111 4.4 Configuring OS Managers An OS Manager initiates a previously configured type of service. The UDS Actor, hosted on the virtual desktop, is responsible for the interaction between the OS and the broker based on the configurations or type of OS Manager chosen. In order to perform VDI deployments via Linked Clones, you will have to select the disconnection behavior of the Linked Clones, within the configuration of each OS Manager. If you configure a non persistent desktop policy, you can indicate the idle user time before the system will automatically log out. You can choose different types of OS Managers. Page 110 of 157

112 4.4.1 Linux OS Manager A Linux OS Manager is used for virtual desktops based on Linux systems. It performs the rename machine tasks. In order to configure Linux OS Manager, enter the name and configure which action the system will perform when a user disconnects: Keep service assigned: When a user logs out the desktop won t undergo any change. If this same user requests again a virtual machine to the system, the system will provide the same virtual desktop Remove service: When a user logs out, the system will destroy the desktop. If this same user requests again a virtual machine to the system, the system will provide a new virtual desktop When we configure non persistent desktops (Remove service) we can specify a máximum idle time (in seconds) in the virtual desktop. When it finishes, the UDS actor will automatically log out from the virtual desktop. The Max. Idle time field doesn t apply to persistent desktops (keep service assigned) Page 111 of 157

113 4.4.2 Linux Random Password OS Manager A Linux Random Password OS Manager is used for virtual desktops based on Linux systems which require a higher level of security in user access. When used, a random password is assigned to an existing local user, which has been previously defined during the configuration process, in each new deployed virtual desktop, thus providing a higher level of security in the access. Page 112 of 157

114 In order to configure a Linux Ramdom Password OS Manager, enter the following data: OS Manager name Local user defined on the template The action that the system will perform when the user logs out is configured: o o Keep service assigned: When a user logs out the desktop won t undergo any change. If this same user requests again a virtual machine to the system, the system will provide the same virtual desktop Remove service: When a user logs out, the system will destroy the desktop. If this same user requests again a virtual machine to the system, the system will provide a new virtual desktop When we configure non persistent desktops (Remove service) we can specify a máximum idle time (in seconds) in the virtual desktop. When it finishes, the UDS actor will automatically log out from the virtual desktop. The Max. Idle time field doesn t apply to persistent desktops (keep service assigned) Page 113 of 157

115 4.4.3 Windows Basic OS Manager A Windows Basic OS Manager is used for virtual desktops based on Windows systems which aren t part of a domain. In order to configure a Windows Basic OS Manager, enter the name and configure which action the system will perform when a user disconnects. Keep service assigned: When a user logs out the desktop won t undergo any change. If this same user requests again a virtual machine to the system, the system will provide the same virtual desktop Remove service: When a user logs out, the system will destroy the desktop. If this same user requests again a virtual machine to the system, the system will provide a new virtual desktop When we configure non persistent desktops (Remove service) we can specify a máximum idle time (in seconds) in the virtual desktop. When it finishes, the UDS actor will automatically log out from the virtual desktop. The Max. Idle time field doesn t apply to persistent desktops (keep service assigned) Page 114 of 157

116 4.4.4 Windows Domain OS Manager A Windows Domain OS Manager is used for virtual desktops based on Windows systems which are part of a domain. Page 115 of 157

117 In order to configure a "Windows Domain OS Manager", enter the following data: The name of the OS Manager The domain name to which the virtual desktops deployed with this OS Manager are going to belong User credentials with permission to add machines to the domain Information of the Organizing Unit (OU) where the virtual desktops deployed with this OS Manager are going to be registered (if we don t write anything, the desktops will be located in the branch by default) Configure the action the system will perform when a user logs out: o o Keep service assigned: When a user logs out the desktop won t undergo any change. If this same user requests again a virtual machine to the system, the system will provide the same virtual desktop Remove service: When a user logs out, the system will destroy the desktop. If this same user requests again a virtual machine to the system, the system will provide a new virtual desktop When we configure non persistent desktops (Remove service) we can specify a máximum idle time (in seconds) in the virtual desktop. When it finishes, the UDS actor will automatically log out from the virtual desktop. The Max. Idle time field doesn t apply to persistent desktops (keep service assigned) Page 116 of 157

118 4.4.5 Windows Random Password OS Manager A Windows Random Password OS Manager is used for virtual desktops based on Windows systems that are not part of a domain and require a higher level of security in the user access. Using this assigns a random password to an existing user, previously defined during configuration, in each new deployed virtual desktop, thus providing a higher level of access security. Page 117 of 157

119 To configure a Windows Random Password OS Manager enter the following data: OS Manager Name Local user defined in the template Password initially established for the local user in the template Configure which action the system will perform when a user disconnects: o o Keep service assigned: When a user logs out the desktop won t undergo any change. If this same user requests again a virtual machine to the system, the system will provide the same virtual desktop Remove service: When a user logs out, the system will destroy the desktop. If this same user requests again a virtual machine to the system, the system will provide a new virtual desktop When we configure non persistent desktops (Remove service) we can specify a máximum idle time (in seconds) in the virtual desktop. When it finishes, the UDS actor will automatically log out from the virtual desktop. The Max. Idle time field doesn t apply to persistent desktops (keep service assigned) Page 118 of 157

120 4.5 Configuring Networks UDS allows registering several networks to allow or deny access to virtual desktops. These networks, together with Transports will define what kind of access the users will have to their virtual desktops generated by UDS. To add a network, go to "Connectivity" section and click "New" in "Current Networks" section. Page 119 of 157

121 Write a descriptive name and a network range (most existing formats are supported). If no network is registered, access to the virtual desktops will be allowed from any network. Page 120 of 157

122 4.6 Configuring Transports In order to connect to the virtual desktops, you must create Transports. These are small applications that will be run on the client and which will be responsible for providing access to the implemented service. Depending on what type of virtual desktop is configured, the location and way of connection to our virtual desktops, we must create different types of transports. The following Transports are currently available: We can configure the "Transport" indicated as "direct" for users accesses from an internal LAN, VPN, LAN Extension, etc... We can configure the "Transport" indicated as "Tunneled" to user Access through a WAN. These "Transport" will be supported in the UDS Tunneler server to make the connection against the virtual desktops. The HTML5 "Transport" can be used for any type of Access. This "Transport" uses the UDS Tunneler server to make the connection against the virtual desktops. Page 121 of 157

123 To create a "Transport", in the "Connectivity" section, click "New" in the section "Current Transports". Page 122 of 157

124 4.6.1 HTML5 RDP Transport A "HTML5 RDP Transport" allows Access to Windows and Linux virtual desktops through RDP protocol using a browser which supports HTML5 (for Linux desktops the machines must have the XRDP packet installed. For Windows desktops the RDP access need to be set up). This transport uses UDS Tunneler server to make the connection against the virtual desktops. It has to be configured beforehand in order to work properly. For HTML5 RDP Transport, we configure the name of the transport, the IP address of the UDS tunneler server and port ( Tunnel Server field) with the format (port by default). We indicate whether we want to redirect specific credentials to the virtual desktop, and if the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password (it is also possible to enter a domain name), these credentials will be redirected to the virtual desktops. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). Page 123 of 157

125 We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). Page 124 of 157

126 4.6.2 NX Transport (direct) A "NX Transport (direct)" allows Access to Linux virtual desktops through NX software (the virtual machines and the connection clients must have NX installed). Currently, the NX supported version is 3.5. For a NX Transport (direct), we configure the transport name, we indicate whether we want to redirect specific credentials to the virtual desktop. If the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password, these credentials will be redirected to the virtual desktops. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate what port and optimization connection parameters we want to use for the connection, such as: "Connection", "Session", "Disk Cache" and "Memory Cache". Page 125 of 157

127 Page 126 of 157

128 4.6.3 NX Transport (tunneled) A "NX Transport (tunneled)" allows Access to Linux virtual desktops through NX software (the virtual machines and the connection clients must have NX installed). Currently, the NX supported version is 3.5 This transport uses UDS tunneler server to make the connection against the virtual desktops, and it needs to be configured beforehand in order to work properly. For a NX Transport (tunneled), we configure the transport name, the UDS Tunneler server IP address and a port ( tunnel server field) with the format IP_Tunneler:443 (port by default). We indicate if we want to redirect specific credentials to the virtual desktop. If we check the Empty creds box, no credential will be passed to the virtual desktop. If we don t check the Empty creds box and we indicate a username and password, these credentials will be redirected to the virtual desktop. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate what port and optimization connection parameters we want to use for the connection, such as: "Connection", "Session", "Disk Cache" and "Memory Cache". Page 127 of 157

129 Page 128 of 157

130 4.6.4 RDP Transport (direct) A "RDP Transport (direct)" allows access to Windows virtual desktops through RDP protocol (the virtual machines must have RDP service enabled). For the RDP Transport (direct), we configure the transport name, we indicate whether we want to redirect specific credentials to the virtual desktop. If the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password (it is also possible to enter a domain name), these credentials will be redirected to the virtual desktop. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate the parameters Allow Smartcards, Allow Printers, Allow Drives and Allow Serials. Page 129 of 157

131 Page 130 of 157

132 4.6.5 RDP Transport (tunneled) A "RDP Transport (tunneled)" allows access to Windows virtual desktops through RDP protocol (the virtual machines must have RDP service enabled). This transport uses UDS Tunneler server to make the connection against the virtual desktops. It must be configured beforehand in order to work properly. For the RDP transport (tunneled), we configure the transport name, the IP address of the UDS tunneler server and port ( Tunnel server field) with the format: IP_Tunneler:443 (port by default). We indicate whether we want to redirect specific credentials to the virtual desktop, and if the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password (it is also possible to enter a user domain), these credentials will be redirected to the virtual desktop. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate the parameters Allow Smartcards, Allow Printers, Allow Drives and Allow Serials. Page 131 of 157

133 Page 132 of 157

134 4.6.6 RGS Transport (direct) A "RGS Transport (direct)" allows access to Windows virtual desktops through RGS protocol (the virtual machines and the connection clients must have RGS service installed). For the RGS transport (direct), we configure the transport name and we indicate whether we want to redirect specific credentials to the virtual desktop. If the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password (it is also possible to enter a user domain), these credentials will be redirected to the virtual desktop. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate the parameters Image Quality, Adjustable Quality, Min Adjustable Quality, Adjustable Frame Rate, Match Local Resolution, Redirect USB, Redirect Audio and Redirect Mic. Page 133 of 157

135 Page 134 of 157

136 4.6.7 RGS Transport (tunneled) A "RGS Transport (tunneled)" allows access to Windows virtual desktops through RGS protocol (the virtual machines and the connection clients must have RGS service installed). This transport uses UDS Tunneler server to make the connection against the virtual desktops. It must be configured beforehand in order to work properly. For the RGS Transport (tunneled), we configure the transport name, the IP address of the UDS Tunneler server and port ( Tunnel server field) with the format IP_Tunneler:443 (port by default). We indicate whether we want to redirect specific credentials to the virtual desktop, and if the Empty creds box is checked, no credential will pass through to the virtual desktop. If we do not check the Empty creds box and enter a username and password (it is also possible to enter a user domain), these credentials will be redirected to the virtual desktop. In the "Network access" section, we indicate if in the selected network in "Networks" access to users through this Transport will be allowed (the available networks will be the configured ones in the "Networks" section). We can also indicate the priority of this transport. The lower that priority is, the higher it will appear on the list of transports available in virtual desktop window of each user (this field admits negative values). We can also indicate the parameters Image Quality, Adjustable Quality, Min Adjustable Quality, Adjustable Frame Rate, Match Local Resolution, Redirect USB, Redirect Audio and Redirect Mic. Page 135 of 157

137 Page 136 of 157

138 4.7 Configuring Services Pools Once the different pieces of UDS platform are configured, it is time to create a Service Pools. This will be made up by a Base Service created from a Service Provider and an OS Manager. We will have to indicate one or several Transports, one or several access Network (if no access network is specified, all networks will be allowed) and a group or groups of users to access this service. To create a "Service Pools" click on "New". To configure a Service Pools it is necessary to indicate: Name: Service name which will be shown to the user to access the virtual desktop. Base Services: Base service configured beforehand in a "Service Provider", where it will be used to make the virtual desktops based in Linked Clones deployment. OS Manager: We will indicate an OS Manager" created beforehand which configuration will be applied to each virtual desktop generated in this "Services Pool". Associated image: image associated to the service, It must first be added to the image repository accessible from the "Tools" - "Gallery" section. Initial available services: Virtual desktops that will be created, configured and will be initially in the system. Services to keep in cache: Virtual desktops available in the system cache. These desktops will be configured and ready to be assigned (this number of desktops will be automatically generated until the maximum number of machines indicated in the field "Maximum number of services to provide" will be reached). Page 137 of 157

139 Services to keep in L2 cache: Virtual desktops in sleeping mode. These desktops will be configured and ready to be assigned when the system demands new desktops. Maximum number of services to provide: Maximum number of virtual desktops created by UDS system in this "Service Pool". Show Transports: If checked, the users can select and access a desktop through different transports in case more than one is available. If it is not checked, users only will be able to access the desktop through the transport by default (the one with less priority). Publish on creation: If this option is set up, the system will publish the new Service Pool when the user saves the creation of the new "Service Pool". It is is not checked, the desktops will have to be manually published (from the Publications tab). Page 138 of 157

140 When we save the creation of a "Service Pools" and if we have selected the option "Publish on creation", the system will start the publication of the service generating the base machine on which the virtual desktops will be deployed. Clicking the "Delete" button, we will be able to completely delete a "Service Pool" and clicking Edit" we will be able to change the service pool name, the image associated to the service, the access to all transports and all system cache values (Initial available services, Services to keep in cache, Services to keep in L2 cache and Maximum number of services to provide). But the "Base Service" and "OS Manager" can t be modified once the Service Pool is created. Page 139 of 157

141 Once a "Service Pool" is created, we select it and we ll have the following control and configuration menus available: Assigned Services: Virtual desktops assigned to users. It shows information about the desktop creation date, revision number (or publication) on which the desktop is generated, the MAC address of the VM network card, the virtual desktop DNS and IP name, the current desktop state, if it is being used, the IP name of the connection client, the machine owner and the UDS agent version installed on the base machine Selecting the virtual desktop and clicking on "Delete" we can delete it manually. Cache: Virtual desktops available in the system cache (including level 2 cache machines). These desktops will go through different states: o In Preparation: In this state the virtual desktops are being created in the virtualization platform Page 140 of 157

142 o Waiting OS: In this state the virtual desktops are being configurated with the parameters indicated in the OS Manager o Valid: When a virtual desktop is in this state, it is available for use Groups: To allow the users connection, it is necessary to assign access groups or metagroups. These groups or metagroups must be created in the Authenticators section and we will be able to assign one or several access groups or metagroups to each Service Pools Page 141 of 157

143 We select the Authenticator and based on this choice we select the Group Name. Transports: The Transport to make the connection with the virtual desktop (beforehand added in the Transports section) will be indicated. The "Transport" with less priority will be configured by the system by default. For the other ones, the user will have to open the pull- down menu in the virtual desktops access window and select the one that corresponds Select the Transport" we want to use in this "Service Pool" and save. Page 142 of 157

144 Publications: From this menu we will be able to make a new service publication. Once the publication process has finished, the whole system cache with the new Linked Clones based on this last publication will be regenerated If we make a new publication, a new base machine will be generated and once it will be available, the system will delete the virtual desktops from the previous version and it will generate new ones based on the new publication. Page 143 of 157

145 5. DEPLOYING VIRTUAL DESKTOPS WITH UDS ENTERPRISE Once one or several Service Pools are available, we can initiate a connection to a virtual desktop. We will gain access via a web browser (the supported browsers are Internet Explorer, Chrome and Firefox) to the broker address or name, enter a valid username and password and select the authenticator if we have more than one available. In the available services screen, the services that the user with which we initiated the session in the UDS system has access to will appear. Click on the one with which we want to start the connection. Page 144 of 157

146 By default, if we click directly on the service image we will make the connection with the Transport which has the lower priority. If we have configured several Transports, a pull-down menu will appear, where we will be able to select the Transport we are going to use to connect to the virtual desktop. To start the connection to the virtual machine, you must have Java installed in the client machine to start the connection for all the transports except HTML5. For connections by NX we will have to have the software NX installed and for connections by RGS you must have the RGS software installed. RDP connection example: Page 145 of 157

147 HTML5 connection example: NX connection example: Once the connection is made, the virtual desktop will be available for use. Page 146 of 157

148 6. UDS ENTERPRISE ADVANCED CONFIGURATION UDS provides a series of advanced parameters which will define the running of the system. These parameters will be responsible for defining aspects like security, connectivity, operating mode both of UDS system and its communication with the virtual platforms (VMware, ovirt/rhev, Hyper-V and XenServer) registered on UDS. In this document we will only show the system variables that are considered to be the more useful ones to manage the virtual desktops. When using the variables which aren t mentioned here, it is recommended not to modify the default values, as some of them indicate how the system has to work (number of simultaneous tasks, time for tasks execution, programmed checks, etc ) and a wrong parameter modification may completely stop the system or make it work in a wrong way. Once the values of one of the UDS advanced configuration variables have been modified, it will be necessary to reboot the UDS Server so that the changes will be applied. If you want to modify any value which isn t included in this section, we recommend you to contact the UDS Enterprise support team in order to verify that change and confirm that it doesn t affect in a negative way to the running of UDS system. Page 147 of 157

149 6.1 UDS advanced parameters In order to access the UDS advanced configuration parameters, access Tools section and click Configuration : UDS The most important parameters regarding UDS internal procedures, appearance and communication with the hypervisor platforms. AutorunService = It makes the direct access to the virtual desktop when a user only has one service assigned (0 = off 1 = on). If you turn this parameter on, the users who only have one virtual desktop assigned will connect to it straightaway, the window where you select the service won t appear and the first configured transport will be used. Default value 0. Page 148 of 157

150 CustomHtmlLogin= HTML code for partial customization of the UDS login page. The code you enter will appear under the user login box in the UDS Access dashboard. Empty by default. DisallowGlobalLogin = If it is turned on, the entire authenticators list won t appear (0 = off 1 = on). If this variable is turned on, you must use a short name to see an authenticator and allow user access to the system. Default value 0 RedirectToHttps = It automatically redirects UDS Enterprise access from http to https (0 = off 1 = on). Default value 0 SessionExpireTime = It indicates the maximum time a user session will be opened after publishing something new. After, the user session will be closed and the system will delete the service. Default value 24 Hours. StatsDuration = It indicates how long the system will keep the statistics. Default value 365 days. UDSTheme = Name of the folder which contains the HTML templates for the login Windows, user, preferences, downloads, etc Default name html RGS Find below the description of the parameters related to the RGS Transport: DownloadUrl = Web address to download RGS software. TunnelOpenedTime = Maximum time the tunnel will wait for the RGS connection to be opened. If the connection isn t carried out in the time indicated in this variable, it will be canceled and you will have to make the connection again (if you make the connection using slow clients, it is recommended to increase this value) Default value 30 seconds. Page 149 of 157

151 6.1.3 SAML Find below the description of the parameters related to the SAML authenticator: Global logout on exit = It indicates the logout mode (0 = off 1 = on). If it is enabled, when you logout from UDS you also logout from SAML. Default value 0. IDP Metadata Cache = Time the IDP.m searched metadata are kept. Default value seconds (24 hours). Organization Display Name = Organization name displayed. Organization Name = Organization name. Organization URL = Organization web address. User cleanup = It indicates how often the system cleans up the users without activity. If a user remains inactive for the time indicated in this variable, the system will delete it. Default value seconds (30 days) IPAUTH These variables are inactive in this UDS Enterprise version NX Find below the description of the parameters related to the NX Transport: DownloadUrl = Web address to download NX software. DownloadUrlMACOS = Web address to download NX software for MAC. Page 150 of 157

152 6.1.6 CLUSTER These variables are inactive in this UDS Enterprise version WYSE Find below the description of the parameters related to the connection with Wyse clients: Autoconnect = It allows the automatic connection of the device. Default value no. Colors = It defines the quality of the colours displayed during the connection. Default value High. DefaultUser = Default user redirected to the device. Default value UDS. Language = Device language. Default value us. Privilege = User privilege level. Default value NONE. For more details about these parameters see Wyse official documentation or the following reference guide: arameters.pdf ENTERPRISE Find below the description of the parameters related to UDS Enterprise subscription: Serial Number = Subscription activation code. During the UDS Server configuration you must indicate a valid serial number. Using this variable you can update or change it. Page 151 of 157

153 6.1.9 SECURITY Find below the description of the parameters related to UDS system security: AdminIdleTime = It indicates how long an administrator session will be opened. After this period, you must authenticate yourself again in the system. Default value seconds (4 hours). AllowRootWebAccess = It allows the root user login via web (0 = off 1 = on). The modification of this variable doesn t affect the root user access through the administration client. Default value 1. RootPass = Root user password, previously indicated in the UDS Server configuration script. SuperUser = User with UDS system administration rights. By default: root. Trusted Hosts = Hosts considered to be secure by UDS. These host can make sensitive requests to UDS, for example tunnelers (it is recommended to modify this variable so that the only displayed option is the list of tunnelers). By default * (all allowed), it admits addresses range values. UserSessionLength = It indicates how long the user session will be opened. After this period, it will be necessary for the user to authenticate himself again in the system. Default value seconds (4 hours) Page 152 of 157

154 VMWARE Find below the description of the parameters related to VMware vsphere virtual platform: MaxRetriesOnError = Number of times and operation is retried in case VMware reports an error to UDS system. Default value 63 retries. MinUsableDatastoreGB = Minimum free space in a datastore to create the virtual desktops. If the VMware platform datastores selected to create services in UDS have less free space than the value of this variable, the virtual desktops won t be created. Once this value is modified or the needed space is available, the system will work properly. Default value 30. Page 153 of 157

155 6.2 Image gallery UDS has a repository of images that may be associated to a Service Pool" to facilitate the identification of the virtual desktop. The supported formats are: PNG, JPEG and GIF. The maximum image size is 256 Kb. To access UDS image Gallery, enter "Tools" section and select "Gallery": Click on New to add the image to the repository and write a name. Click on Select image to search the image we want to save. Page 154 of 157

156 Once the image is stored, it will be available in order to be assigned to a Service Pool (see more details in 4.7). Page 155 of 157

157 6.3 Flush System Cache In order to flush the UDS system s cache, enter the Tools section and click on Flush cache. The most common reasons to flush the system cache are: Blocking of a user: when a user enters an invalid password up to 4 consecutive times, UDS blocks that user. To unlock it it will be necessary to flush the cache system Inventory update: it is possible that when you edit a "Service", some elements as datastores, networks, base machines, etc. recently added, are not available. To view them, we will have to flush the system cache. In this way the broker will again make the request to the hypervisor and the data will be updated Page 156 of 157

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1 IBM Network Station Manager esuite 1.5 / NSM Integration IBM Network Computer Division tdc - 02/08/99 lotusnsm.prz Page 1 New esuite Settings in NSM The Lotus esuite Workplace administration option is

Læs mere

Portal Registration. Check Junk Mail for activation . 1 Click the hyperlink to take you back to the portal to confirm your registration

Portal Registration. Check Junk Mail for activation  . 1 Click the hyperlink to take you back to the portal to confirm your registration Portal Registration Step 1 Provide the necessary information to create your user. Note: First Name, Last Name and Email have to match exactly to your profile in the Membership system. Step 2 Click on the

Læs mere

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index DET KONGELIGE Index Download driver... 2 Find the Windows 7 version.... 2 Download the Windows Vista driver.... 4 Extract driver... 5 Windows Vista installation of a printer.... 7 Side 1 af 12 DET KONGELIGE

Læs mere

Status på det trådløse netværk

Status på det trådløse netværk Status på det trådløse netværk Der er stadig problemer med det trådløse netværk, se status her: http://driftstatus.sdu.dk/?f=&antal=200&driftid=1671#1671 IT-service arbejder stadig med at løse problemerne

Læs mere

E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss

E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss Brugervejledning (side 2-6) Userguide (page 7-11) Bedienungsanleitung 1 - Hvordan forbinder du din E-PAD hængelås med din

Læs mere

Online kursus: Content Mangement System - Wordpress

Online kursus: Content Mangement System - Wordpress Online kursus 365 dage DKK 1.999 Nr. 90213 P ekskl. moms Wordpress er et open-source content management system, som anvendes af mere end 23% af verdens 10 millioner mest besøgte hjemmesider. Det er et

Læs mere

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov.

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. På dansk/in Danish: Aarhus d. 10. januar 2013/ the 10 th of January 2013 Kære alle Chefer i MUS-regi! Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. Og

Læs mere

Serverteknologi I Project task list

Serverteknologi I Project task list Dato: 31. marts 2016 Skrevet af John Have Jensen & Anders Dahl Valgreen Introduktion Velkommen til faget ServerTeknologi I. Denne uge er planlagt som en projektuge hvor du selv eller din gruppe skal opbygget

Læs mere

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1 Project Step 7 Behavioral modeling of a dual ported register set. Copyright 2006 - Joanne DeGroat, ECE, OSU 1 The register set Register set specifications 16 dual ported registers each with 16- bit words

Læs mere

Installation og brug af DMUs VPN klient Installation and use of DMU s VPN client

Installation og brug af DMUs VPN klient Installation and use of DMU s VPN client Installation og brug af DMUs VPN klient Installation and use of DMU s VPN client Bernhard Fabricius, IT-afdelingen Version 0.1, 2009-05-23 Tilmelding For at få adgang til VPN klienten skal der udfyldes

Læs mere

Aktivering af Survey funktionalitet

Aktivering af Survey funktionalitet Surveys i REDCap REDCap gør det muligt at eksponere ét eller flere instrumenter som et survey (spørgeskema) som derefter kan udfyldes direkte af patienten eller forsøgspersonen over internettet. Dette

Læs mere

Vejledning til at tjekke om du har sat manuel IP på din computer.

Vejledning til at tjekke om du har sat manuel IP på din computer. Indhold Vejledning til at, komme på nettet. (DANSK)... 2 Gælder alle systemer.... 2 Vejledning til at tjekke om du har sat manuel IP på din computer.... 2 Windows 7... 2 Windows Vista... 2 Windows XP...

Læs mere

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU OUTLINE INEFFICIENCY OF ATTILA WAYS TO PARALLELIZE LOW COMPATIBILITY IN THE COMPILATION A SOLUTION

Læs mere

User Manual for LTC IGNOU

User Manual for LTC IGNOU User Manual for LTC IGNOU 1 LTC (Leave Travel Concession) Navigation: Portal Launch HCM Application Self Service LTC Self Service 1. LTC Advance/Intimation Navigation: Launch HCM Application Self Service

Læs mere

PMDK PC-Side Basic Function Reference (Version 1.0)

PMDK PC-Side Basic Function Reference (Version 1.0) PMDK PC-Side Basic Function Reference (Version 1.0) http://www.icpdas.com PMDK PC-Side Basic Function Reference V 1.0 1 Warranty All products manufactured by ICPDAS Inc. are warranted against defective

Læs mere

Hosted Exchange. Setup guide for e-mail clients & mobile devices. Date: 2011-09-13. Version: 15. Author: SBJ/ANB. Target Level: Customer

Hosted Exchange. Setup guide for e-mail clients & mobile devices. Date: 2011-09-13. Version: 15. Author: SBJ/ANB. Target Level: Customer Hosted Exchange Setup guide for e-mail clients & mobile devices Date: 2011-09-13 Version: 15 Author: SBJ/ANB Target Level: Customer Target Audience: End User Language: en-us Page 1 of 35 LEGAL INFORMATION

Læs mere

how to save excel as pdf

how to save excel as pdf 1 how to save excel as pdf This guide will show you how to save your Excel workbook as PDF files. Before you do so, you may want to copy several sheets from several documents into one document. To do so,

Læs mere

Accessing the ALCOTEST Instrument Upload Data - NJSP Public Website page -

Accessing the ALCOTEST Instrument Upload Data - NJSP Public Website page - Accessing the ALCOTEST Instrument Upload Data - NJSP Public Website page - www.njsp.org Public Information Access Public Information Page Selection Within the Public Information Drop Down list, select

Læs mere

MOC On-Demand Administering System Center Configuration Manager [ ]

MOC On-Demand Administering System Center Configuration Manager [ ] E-learning 90 dage DKK 7.999 Nr. 90111 P ekskl. moms Dato Sted 29-12-2019 Virtuelt kursus MOC On-Demand Administering System Center Configuration Manager [20703-1] Online undervisning når det passer dig

Læs mere

Black Jack --- Review. Spring 2012

Black Jack --- Review. Spring 2012 Black Jack --- Review Spring 2012 Simulation Simulation can solve real-world problems by modeling realworld processes to provide otherwise unobtainable information. Computer simulation is used to predict

Læs mere

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende Changes for Rottedatabasen Web Service The coming version of Rottedatabasen Web Service will have several changes some of them breaking for the exposed methods. These changes and the business logic behind

Læs mere

Dell Cloud Client Computing Hvordan virtualisere vi de tunge grafisk applikationer?

Dell Cloud Client Computing Hvordan virtualisere vi de tunge grafisk applikationer? Dell Cloud Client Computing Hvordan virtualisere vi de tunge grafisk applikationer? Christian Eilskov Sales Engineer, christian_eilskov@dell.com +45 40 60 13 92 Dell Cloud Client Computing Dell lever produkter

Læs mere

Vejledning til Sundhedsprocenten og Sundhedstjek

Vejledning til Sundhedsprocenten og Sundhedstjek English version below Vejledning til Sundhedsprocenten og Sundhedstjek Udfyld Sundhedsprocenten Sæt mål og lav en handlingsplan Book tid til Sundhedstjek Log ind på www.falckhealthcare.dk/novo Har du problemer

Læs mere

Hosted Exchange. Setup guide for e-mail clients & mobile devices. Date: 2014-06-02. Version: 15. Author: SBJ/ANB. Target Level: Customer

Hosted Exchange. Setup guide for e-mail clients & mobile devices. Date: 2014-06-02. Version: 15. Author: SBJ/ANB. Target Level: Customer Hosted Exchange Setup guide for e-mail clients & mobile devices Date: 2014-06-02 Version: 15 Author: SBJ/ANB Target Level: Customer Target Audience: End User Language: en-us Page 1 of 42 LEGAL INFORMATION

Læs mere

QUICK START Updated:

QUICK START Updated: QUICK START Updated: 24.08.2018 For at komme hurtigt og godt igang med dine nye Webstech produkter, anbefales at du downloader den senest opdaterede QuickStart fra vores hjemmeside: In order to get started

Læs mere

MOC On-Demand Identity with Windows Server 2016 [20742]

MOC On-Demand Identity with Windows Server 2016 [20742] E-learning 90 dage DKK 7.999 Nr. 89067 P ekskl. moms Dato Sted 29-12-2019 Virtuelt kursus MOC On-Demand Identity with Windows Server 2016 [20742] Online undervisning når det passer dig MOC On-Demand er

Læs mere

Shooting tethered med Canon EOS-D i Capture One Pro. Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8

Shooting tethered med Canon EOS-D i Capture One Pro. Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8 Shooting tethered med Canon EOS-D i Capture One Pro Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8 For Canon EOS-D ejere der fotograferer Shooting tethered med EOS-Utility eller

Læs mere

Online kursus: Google Cloud

Online kursus: Google Cloud Online kursus 365 dage DKK 9.999 Nr. 90209 P ekskl. moms Bliv grundigt sat ind i Google Cloud SQL med en kursuspakke, der hjælper dig til let at oprette, vedligeholde, styre og administrere dine databaser.

Læs mere

Boligsøgning / Search for accommodation!

Boligsøgning / Search for accommodation! Boligsøgning / Search for accommodation! For at guide dig frem til den rigtige vejledning, skal du lige svare på et par spørgsmål: To make sure you are using the correct guide for applying you must answer

Læs mere

Contents. ESXi installation og basisk konfiguration

Contents. ESXi installation og basisk konfiguration Contents ESXi installation og basisk konfiguration... 1 Opsætning af ESXi virtuelle netværk... 7 Vælge netværk som et GuestOS skal tilsluttes... 9 Installation af virtuelle maskiner... 11 Arbejde med Guest

Læs mere

3D NASAL VISTA 2.0

3D NASAL VISTA 2.0 USER MANUAL www.nasalsystems.es index index 2 I. System requirements 3 II. Main menu 4 III. Main popup menu 5 IV. Bottom buttons 6-7 V. Other functions/hotkeys 8 2 I. Systems requirements ``Recommended

Læs mere

3D NASAL VISTA TEMPORAL

3D NASAL VISTA TEMPORAL USER MANUAL www.nasalsystems.es index index 2 I. System requirements 3 II. Main menu 4 III. Main popup menu 5 IV. Bottom buttons 6-7 V. Other functions/hotkeys 8 2 I. Systems requirements ``Recommended

Læs mere

QUICK START Updated: 18. Febr. 2014

QUICK START Updated: 18. Febr. 2014 QUICK START Updated: 18. Febr. 2014 For at komme hurtigt og godt igang med dine nye Webstech produkter, anbefales at du downloader den senest opdaterede QuickStart fra vores hjemmeside: In order to get

Læs mere

IBM SmartCloud Control Desk Version 7 Release 5. Installation Guide. (VM Image)

IBM SmartCloud Control Desk Version 7 Release 5. Installation Guide. (VM Image) IBM SmartCloud Control Desk Version 7 Release 5 Installation Guide (VM Image) Note Before using this information and the product it supports, read the information in Notices on page 27. Contents Installing

Læs mere

Help / Hjælp

Help / Hjælp Home page Lisa & Petur www.lisapetur.dk Help / Hjælp Help / Hjælp General The purpose of our Homepage is to allow external access to pictures and videos taken/made by the Gunnarsson family. The Association

Læs mere

KDRMS - Online Registration ( к)

KDRMS - Online Registration ( к) KDRMS - Online Registration ( к) 'DEVAJAALIKA' is a web based Software system for managing the recruitment activities of Kerala Devaswom Recruitment Board constituted for identifying suitable staffs against

Læs mere

Before you begin...2. Part 1: Document Setup...3. Part 2: Master Pages Part 3: Page Numbering...5. Part 4: Texts and Frames...

Before you begin...2. Part 1: Document Setup...3. Part 2: Master Pages Part 3: Page Numbering...5. Part 4: Texts and Frames... InDesign Basics Before you begin...................2 Part 1: Document Setup................3 Part 2: Master Pages................ 4 Part 3: Page Numbering...............5 Part 4: Texts and Frames...............6

Læs mere

Serverteknologi I * Projekt * Opgaveliste

Serverteknologi I * Projekt * Opgaveliste Skrevet af John Have Jensen & Anders Dahl Valgreen Dato: 4. januar 2017 Introduktion Velkommen til faget ServerTeknologi I. Denne uge er planlagt som en projektuge hvor du selv eller din gruppe skal opbygget

Læs mere

IPTV Box (MAG250/254) Bruger Manual

IPTV Box (MAG250/254) Bruger Manual IPTV Box (MAG250/254) Bruger Manual Når din STB (Set top Box) starter op, bliver der vist en pop up boks på skærmen, hvor du kan åbne EPG ved at trykke på F2 (Nogle bokse kan fortælle at den har brug for

Læs mere

Contents. John Have Jensen Mercantec 2011

Contents. John Have Jensen Mercantec 2011 Contents ESXi installation og basisk konfiguration... 1 Oprette Guest OS virtuelle maskiner... 5 Uploade ISO filer til en ESXi server... 8 Installere Guest OS... 9 Opsætning af ESXi networking... 11 Tilslutte

Læs mere

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0 Userguide NN Markedsdata for Microsoft Dynamics CRM 2011 v. 1.0 NN Markedsdata www. Introduction Navne & Numre Web Services for Microsoft Dynamics CRM hereafter termed NN-DynCRM enable integration to Microsoft

Læs mere

Revit Server og Clarity løsninger

Revit Server og Clarity løsninger Revit Server og Clarity løsninger Peter Tranberg AEC Systemkonsulent NTI CADcenter A/S pt@nti.dk Reidar Ristesund Senior systemkonsulent bygg/bim NTI CADcenter A/S rer@ntinestor.no Agenda Autodesk - Revit

Læs mere

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1)

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1) Fejlbeskeder i SMDB Validate Business Rules Request- ValidateRequestRegist ration (Rules :1) Business Rules Fejlbesked Kommentar the municipality must have no more than one Kontaktforløb at a time Fejl

Læs mere

United Nations Secretariat Procurement Division

United Nations Secretariat Procurement Division United Nations Secretariat Procurement Division Vendor Registration Overview Higher Standards, Better Solutions The United Nations Global Marketplace (UNGM) Why Register? On-line registration Free of charge

Læs mere

VPN VEJLEDNING TIL MAC

VPN VEJLEDNING TIL MAC VPN VEJLEDNING TIL MAC MAC OS X 1 VPN VEJLEDNING TIL MAC Formålet med en VPN forbindelse er, at du kan tilgå nogle af Aarhus Universitets services hjemmefra, som ellers kun er tilgængelige, når du er på

Læs mere

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User Hosted CRM 2011 Outlook client connector setup guide Date: 2011-06-29 Version: 1 Author: anb Target Level: Customer Target Audience: End User Language: da-dk Page 1 of 16 LEGAL INFORMATION Copyright 2011

Læs mere

VPN-klienten SecureClient for TDC Managed Firewall

VPN-klienten SecureClient for TDC Managed Firewall Installationsvejledning VPN-klienten SecureClient for TDC Managed Firewall Denne installationsvejledning beskriver, hvordan Check Point s VPN-klient SecureClient (version NGX R60) installeres. Med SecureClient

Læs mere

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004)

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Unitel EDI MT940 June 2010 Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Contents 1. Introduction...3 2. General...3 3. Description of the MT940 message...3 3.1.

Læs mere

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances.

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. System Model Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. Each process utilizes a resource as follows: request use e.g., request

Læs mere

Online kursus: Programming with MongoDB

Online kursus: Programming with MongoDB Online kursus 365 dage DKK 6.499 Nr. 90211 P ekskl. moms MongoDB er et gratis, open-source documentations database program, der er nemt at skalere og udvikle. Det kan installeres på forskelige operativsystemer.

Læs mere

User guide - For testing SFTP and HTTP/S data communication

User guide - For testing SFTP and HTTP/S data communication User guide - For testing SFTP and HTTP/S data communication with Nets Danmark A/S P. 1-9 Index General information... 3 Introduction... 3 Rights... 3 Limitations... 3 Prerequisites... 3 Preparations...

Læs mere

CHAPTER 8: USING OBJECTS

CHAPTER 8: USING OBJECTS Ruby: Philosophy & Implementation CHAPTER 8: USING OBJECTS Introduction to Computer Science Using Ruby Ruby is the latest in the family of Object Oriented Programming Languages As such, its designer studied

Læs mere

WINDCHILL THE NEXT STEPS

WINDCHILL THE NEXT STEPS WINDCHILL THE NEXT STEPS PTC/user, 4. marts 2015 Jens Christian Jensen, Econocap Agenda Windchill the next steps Bliv opdateret og inspireret til at se hvor Windchill kan hjælpe dig med andet end blot

Læs mere

IPv6 Application Trial Services. 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd.

IPv6 Application Trial Services. 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd. IPv6 Application Trial Services 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd. Outline Our Trial Service & Technology Details Activity & Future Plan 2 Outline Our Trial Service & Technology Details

Læs mere

MultiProgrammer Manual

MultiProgrammer Manual MultiProgrammer Manual MultiProgrammeren bruges til at læse og skrive værdier til ModBus register i LS Controls frekvensomformer E 1045. Dansk Version side 2 til 4 The MultiProgrammer is used for the writing

Læs mere

USER GUIDE Version 2.9. SATEL Configuration Manager. Setup and configuration program. for SATELLINE radio modem

USER GUIDE Version 2.9. SATEL Configuration Manager. Setup and configuration program. for SATELLINE radio modem USER GUIDE Version 2.9 Setup and configuration program for SATELLINE radio modem 1 TABLE OF CONTENTS 1 TABLE OF CONTENTS... 2 2 GENERAL... 3 2.1 ABOUT SATEL CONFIGURATION MANAGER... 3 3 QUICK GUIDE TO

Læs mere

Mustafa Saglam SAP Integration & Certification Center

Mustafa Saglam SAP Integration & Certification Center SAP Enterprise Portal Business Package Certification Mustafa Saglam SAP Integration & Certification Center EP-BP 6.0 Certification Agenda Introduction to EP-BP 6.0 Certification Criteria Implementation

Læs mere

BACK-END OG DATA: ADMINISTRATION HVAD ER DE NYE MULIGHEDER MED VERSION 7.1? STEFFEN BILLE RANNES, 4. FEBRUAR 2015

BACK-END OG DATA: ADMINISTRATION HVAD ER DE NYE MULIGHEDER MED VERSION 7.1? STEFFEN BILLE RANNES, 4. FEBRUAR 2015 BACK-END OG DATA: ADMINISTRATION HVAD ER DE NYE MULIGHEDER MED VERSION 7.1? STEFFEN BILLE RANNES, 4. FEBRUAR 2015 SAS VISUAL ANALYTICS 7.1 ADMINISTRATOR Mulighed for at udføre handlinger på flere servere

Læs mere

Business Rules Fejlbesked Kommentar

Business Rules Fejlbesked Kommentar Fejlbeskeder i SMDB Validate Business Request- ValidateRequestRegi stration ( :1) Business Fejlbesked Kommentar the municipality must have no more than one Kontaktforløb at a time Fejl 1: Anmodning En

Læs mere

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User Hosted CRM 2011 Outlook client connector setup guide Date: 2011-09-08 Version: 1 Author: anb Target Level: Customer Target Audience: End User Language: da-dk Page 1 of 19 LEGAL INFORMATION Copyright 2011

Læs mere

Instruktioner i installation og afinstallation af Windows PostScript- og PCLprinterdrivere

Instruktioner i installation og afinstallation af Windows PostScript- og PCLprinterdrivere Instruktioner i installation og afinstallation af Windows PostScript- og PCLprinterdrivere version 8 Denne fil med vigtige oplysninger indeholder en vejledning til installation af Custom PostScript- og

Læs mere

MSE PRESENTATION 2. Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft

MSE PRESENTATION 2. Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft CAPABILITY CONTROL LIST MSE PRESENTATION 2 Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft PRESENTATION OUTLINE Action items from phase 1 presentation tti Architecture

Læs mere

WIKI & Lady Avenue New B2B shop

WIKI & Lady Avenue New B2B shop WIKI & Lady Avenue New B2B shop Login Login: You need a personal username and password Du skal bruge et personligt username og password Only Recommended Retail Prices Viser kun vejl.priser! Bestilling

Læs mere

WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST FORMIDDAG:

WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST FORMIDDAG: WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST 2019 - FORMIDDAG: EU Login er EU s NemID. Det er blot adgangsnøglen til en række EU-applikationer. Vælg

Læs mere

IBM WebSphere Operational Decision Management

IBM WebSphere Operational Decision Management IBM WebSphere Operational Decision Management 8 0 45., WebSphere Operational Decision Management 8, 0, 0. Copyright IBM Corporation 2008, 2012. ........... 1 1:........ 2....... 3 Event Runtime...... 11...........

Læs mere

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen. og

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen.  og 052431_EngelskD 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau D www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling

Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling 6.5.2009 Jacob Schaumburg-Müller jacobs@microsoft.com Direktør, politik og strategi Microsoft

Læs mere

Forslag til implementering af ResearcherID og ORCID på SCIENCE

Forslag til implementering af ResearcherID og ORCID på SCIENCE SCIENCE Forskningsdokumentation Forslag til implementering af ResearcherID og ORCID på SCIENCE SFU 12.03.14 Forslag til implementering af ResearcherID og ORCID på SCIENCE Hvad er WoS s ResearcherID? Hvad

Læs mere

Basic statistics for experimental medical researchers

Basic statistics for experimental medical researchers Basic statistics for experimental medical researchers Sample size calculations September 15th 2016 Christian Pipper Department of public health (IFSV) Faculty of Health and Medicinal Science (SUND) E-mail:

Læs mere

Fejlbeskeder i Stofmisbrugsdatabasen (SMDB)

Fejlbeskeder i Stofmisbrugsdatabasen (SMDB) Fejlbeskeder i Stofmisbrugsdatabasen (SMDB) Oversigt over fejlbeskeder (efter fejlnummer) ved indberetning til SMDB via webløsning og via webservices (hvor der dog kan være yderligere typer fejlbeskeder).

Læs mere

RPW This app is optimized for: For a full list of compatible phones please visit radiation. result.

RPW This app is optimized for: For a full list of compatible phones please visit   radiation. result. TM TM RPW-1000 Laser Distance Measurer This app is optimized for: For a full list of compatible phones please visit www.ryobitools.eu/phoneworks IMPORTANT SAFETY S READ AND UNDERSTAND ALL INSTRUCTIONS.

Læs mere

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet. ATEX direktivet Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.dk tlf: 7220 2693 Vedligeholdelse af Certifikater / tekniske dossier / overensstemmelseserklæringen.

Læs mere

Online kursus: Managing Citrix XenDesktop 7 Solution

Online kursus: Managing Citrix XenDesktop 7 Solution Online kursus 365 dage DKK 2.499 Nr. 90208 P ekskl. moms Kom hele vejen rundt om XenDesktop og få en dyb forståelse for software, der tillader flere brugere at tilgå og køre Microsoft Windows fra en centraliseret

Læs mere

Sortering fra A-Z. Henrik Dorf Chefkonsulent SAS Institute

Sortering fra A-Z. Henrik Dorf Chefkonsulent SAS Institute Sortering fra A-Z Henrik Dorf Chefkonsulent SAS Institute Hvorfor ikke sortering fra A-Å? Det er for svært Hvorfor ikke sortering fra A-Å? Hvorfor ikke sortering fra A-Å? Hvorfor ikke sortering fra A-Å?

Læs mere

Design til digitale kommunikationsplatforme-f2013

Design til digitale kommunikationsplatforme-f2013 E-travellbook Design til digitale kommunikationsplatforme-f2013 ITU 22.05.2013 Dreamers Lana Grunwald - svetlana.grunwald@gmail.com Iya Murash-Millo - iyam@itu.dk Hiwa Mansurbeg - hiwm@itu.dk Jørgen K.

Læs mere

Danish Language Course for International University Students Copenhagen, 12 July 1 August Application form

Danish Language Course for International University Students Copenhagen, 12 July 1 August Application form Danish Language Course for International University Students Copenhagen, 12 July 1 August 2017 Application form Must be completed on the computer in Danish or English All fields are mandatory PERSONLIGE

Læs mere

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com.

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com. 052430_EngelskC 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau C www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

Exploring Subversive Eclipse SVN Team Provider

Exploring Subversive Eclipse SVN Team Provider Exploring Subversive Eclipse SVN Team Provider Eclipse Summit Europe 2007 Presenter: Igor Vinnykov (igor.vinnykov@polarion.org), Polarion Software 2007 by Igor Vinnykov; made available under the EPL v1.0

Læs mere

Vina Nguyen HSSP July 13, 2008

Vina Nguyen HSSP July 13, 2008 Vina Nguyen HSSP July 13, 2008 1 What does it mean if sets A, B, C are a partition of set D? 2 How do you calculate P(A B) using the formula for conditional probability? 3 What is the difference between

Læs mere

FPS User Manual. Print Server w/ 1 Parallel Port. Ver

FPS User Manual. Print Server w/ 1 Parallel Port. Ver FPS-1031 Print Server w/ 1 Parallel Port User Manual Ver. 1.00-0803 i The LevelOne Support Team can not support questions or compatibility issues with the following operating systems: Windows NT/95/98/98se/Me

Læs mere

SPECIALTRYKKERIETS KUNDE WEBPORTAL KOM GODT I GANG

SPECIALTRYKKERIETS KUNDE WEBPORTAL KOM GODT I GANG SPECIALTRYKKERIETS KUNDE WEBPORTAL KOM GODT I GANG Jeg håber du får fornøjelse af vores nye værktøj. WebApproval skal gøre det nemmere og mere sikkert for dig at godkende din tryksager. Har du spørgsmål,

Læs mere

SERVICE GUIDE. AFCS ENTERPRISE ASSETWORKS M5 INTERFACE Model

SERVICE GUIDE. AFCS ENTERPRISE ASSETWORKS M5 INTERFACE Model 343590 SERVICE GUIDE Model 343590 Alemite, LLC 167 Roweland Drive, Johnson City, Tennessee 37601 www.alemite.com Copyright 2017 by Alemite, LLC FORM: 671115 Version 1 Contents Introduction.... 2 Sites....

Læs mere

LINK-56K. Emulator for Motorola s DSPs. A Product of Domain Technologies, Inc.

LINK-56K. Emulator for Motorola s DSPs. A Product of Domain Technologies, Inc. LINK-56K Emulator for Motorola s DSPs A Product of Domain Technologies, Inc. LINK-56K User s Guide, Version1.05 September, 2003 DSPs supported by this product: Motorola DSP56001 Motorola DSP56002 and derivatives

Læs mere

DANSK INSTALLATIONSVEJLEDNING VLMT500 ADVARSEL!

DANSK INSTALLATIONSVEJLEDNING VLMT500 ADVARSEL! DANSK INSTALLATIONSVEJLEDNING VLMT500 Udpakningsinstruktioner Åben indpakningen forsigtigt og læg indholdet på et stykke pap eller en anden beskyttende overflade for at undgå beskadigelse. Kontroller at

Læs mere

Det moderne datacenter. Jesper Ryder NetApp

Det moderne datacenter. Jesper Ryder NetApp Det moderne datacenter Jesper Ryder NetApp Hvad er det moderne datacenter? Høj effektivitet og plads udnyttelse Vækst uden begrænsninger Evnen til at gøre ALT uden afbrydelser og nedetid Tilpasse performance

Læs mere

Generalized Probit Model in Design of Dose Finding Experiments. Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US

Generalized Probit Model in Design of Dose Finding Experiments. Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US Generalized Probit Model in Design of Dose Finding Experiments Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US Outline Motivation Generalized probit model Utility function Locally optimal designs

Læs mere

Danish Language Course for Foreign University Students Copenhagen, 13 July 2 August 2016 Advanced, medium and beginner s level.

Danish Language Course for Foreign University Students Copenhagen, 13 July 2 August 2016 Advanced, medium and beginner s level. Danish Language Course for Foreign University Students Copenhagen, 13 July 2 August 2016 Advanced, medium and beginner s level Application form Must be completed on the computer in Danish or English All

Læs mere

ISA Server 2006 Del 5. Jesper Hanno Hansen Jphan@wmdata.dk

ISA Server 2006 Del 5. Jesper Hanno Hansen Jphan@wmdata.dk ISA Server 2006 Del 5 Jesper Hanno Hansen Jphan@wmdata.dk Agenda Overblik over sessionen Konfigurerer RDP publisering Konfigurerer Exchange Access (OWA, RPC http og EAS) Næste Webcast Overblik over sessionen

Læs mere

Installation af Bilinfo på Windows

Installation af Bilinfo på Windows Installation af Bilinfo på Windows Eksempler i denne vejledning er taget fra Windows 7 og Internet Explorer 8 Download det nødvendige program. Gå ind på www.bilinfo.dk/download Klik på download ud for:

Læs mere

Digitaliseringsstyrelsen

Digitaliseringsstyrelsen NemLog-in 29-05-2018 INTERNAL USE Indholdsfortegnelse 1 NEMLOG-IN-LØSNINGER GØRES SIKRERE... 3 1.1 TJENESTEUDBYDERE SKAL FORBEREDE DERES LØSNINGER... 3 1.2 HVIS LØSNINGEN IKKE FORBEREDES... 3 2 VEJLEDNING

Læs mere

Integrated Total Facility Management for Real Estate, Infrastructure & Facility Management

Integrated Total Facility Management for Real Estate, Infrastructure & Facility Management Integrated Total Facility Management for Real Estate, Infrastructure & Facility Management Udfordringen Top down Lederskab visioner Buttom up Fakta om Informi GIS 90 medarbejdere Full-size IT hus; salg/rådgivning/

Læs mere

POSitivitiES Positive Psychology in European Schools HOW TO START

POSitivitiES Positive Psychology in European Schools HOW TO START POSitivitiES Positive Psychology in European Schools HOW TO START POSitivitiES Positive Psychology in European Schools PositivitiES er et Comenius Multilateral europæisk projekt, som har til formål at

Læs mere

SAS USER FORUM DENMARK 2017 USER FORUM. Rune Nordtorp

SAS USER FORUM DENMARK 2017 USER FORUM. Rune Nordtorp SAS USER FORUM USER FORUM Rune Nordtorp Agenda Logning Audit logning Og hvorfor er det lige pludselig blevet vigtigt Logning i SAS -platformen Ressource Inventory Model Introduktion til opsætning af logning

Læs mere

frame bracket Ford & Dodge

frame bracket Ford & Dodge , Rev 3 02/19 frame bracket 8552005 Ford & Dodge ITEM PART # QTY DESCRIPTION 1 00083 8 NUT,.50NC HEX 2 00084 8 WASHER,.50 LOCK 3 14189-76 2 FRAME BRACKET 4 14194-76 1 411AL FRAME BRACKET PASSENGER SIDE

Læs mere

Vore IIoT fokus områder

Vore IIoT fokus områder Vore IIoT fokus områder INDUSTRI FORSYNINH & INFRASTRUKTUR BYGNING & DATACENTER TRANSPORT & LOGISTIK Ewon & Talk2M - A proven success! ewons connected Talk2M servers Alle taler om det! Fjernadgang og Industrial

Læs mere

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen The X Factor Målgruppe 7-10 klasse & ungdomsuddannelser Engelskundervisningen Læringsmål Eleven kan give sammenhængende fremstillinger på basis af indhentede informationer Eleven har viden om at søge og

Læs mere

DK - Quick Text Translation. HEYYER Net Promoter System Magento extension

DK - Quick Text Translation. HEYYER Net Promoter System Magento extension DK - Quick Text Translation HEYYER Net Promoter System Magento extension Version 1.0 15-11-2013 HEYYER / Email Templates Invitation Email Template Invitation Email English Dansk Title Invitation Email

Læs mere

DSB s egen rejse med ny DSB App. Rubathas Thirumathyam Principal Architect Mobile

DSB s egen rejse med ny DSB App. Rubathas Thirumathyam Principal Architect Mobile DSB s egen rejse med ny DSB App Rubathas Thirumathyam Principal Architect Mobile Marts 2018 AGENDA 1. Ny App? Ny Silo? 2. Kunden => Kunderne i centrum 1 Ny app? Ny silo? 3 Mødetitel Velkommen til Danske

Læs mere

IBM WebSphere Operational Decision Management

IBM WebSphere Operational Decision Management IBM WebSphere Operational Decision Management 8 0 29., WebSphere Operational Decision Management 8, 0, 0. Copyright IBM Corporation 2008, 2012. ........... 1 :......... 1 1: Decision Center....... 3 1

Læs mere

Microsoft Dynamics C5. version 2012 Service Pack 01 Hot fix Fix list - Payroll

Microsoft Dynamics C5. version 2012 Service Pack 01 Hot fix Fix list - Payroll Microsoft Dynamics C5 version 2012 Service Pack 01 Hot fix 001 4.4.01.001 Fix list - Payroll CONTENTS Introduction... 3 Payroll... 3 Corrected elements in version 4.4.01.001... 4 Microsoft Dynamics C5

Læs mere