Exit Print View

Oracle Secure Global Desktop Administration Guide for Version 4.6

Document Information

Preface

1.  Networking and Security

2.  User Authentication

3.  Publishing Applications to Users

4.  Configuring Applications

5.  Client Device Support

6.  SGD Client and Webtop

7.  SGD Servers, Arrays, and Load Balancing

A.  Global Settings and Caches

B.  Secure Global Desktop Server Settings

C.  User Profiles, Applications, and Application Servers

D.  Commands

The tarantella Command

Syntax

Description

Examples

The tarantella archive Command

Syntax

Description

Examples

The tarantella array Command

Syntax

Description

Examples

tarantella array add_backup_primary

tarantella array clean

tarantella array detach

tarantella array edit_backup_primary

tarantella array join

tarantella array list

tarantella array list_backup_primaries

tarantella array make_primary

tarantella array remove_backup_primary

The tarantella cache Command

Syntax

Description

Examples

The tarantella config Command

Syntax

Description

Examples

tarantella config edit

tarantella config list

The tarantella emulatorsession Command

Syntax

Description

Examples

tarantella emulatorsession list

tarantella emulatorsession info

tarantella emulatorsession shadow

tarantella emulatorsession suspend

tarantella emulatorsession end

The tarantella help Command

Syntax

Description

Examples

The tarantella object Command

Syntax

Description

Examples

tarantella object add_host

tarantella object add_link

tarantella object add_mapping

tarantella object add_member

tarantella object delete

tarantella object edit

tarantella object list_attributes

tarantella object list_contents

tarantella object new_3270app

tarantella object new_5250app

tarantella object new_charapp

tarantella object new_container

tarantella object new_dc

tarantella object new_doc

tarantella object new_dynamicapp

tarantella object new_group

tarantella object new_host

tarantella object new_org

tarantella object new_orgunit

tarantella object new_person

tarantella object new_windowsapp

tarantella object new_xapp

tarantella object remove_host

tarantella object remove_link

tarantella object remove_mapping

tarantella object remove_member

tarantella object rename

tarantella object script

The tarantella passcache Command

Syntax

Description

Examples

tarantella passcache delete

tarantella passcache edit

tarantella passcache list

tarantella passcache new

The tarantella print Command

Syntax

Description

Examples

tarantella print cancel

tarantella print list

tarantella print move

tarantella print pause

tarantella print resume

tarantella print start

tarantella print status

tarantella print stop

The tarantella query Command

Syntax

Description

Examples

tarantella query audit

tarantella query billing

tarantella query errlog

tarantella query uptime

The tarantella restart Command

Syntax

Description

Examples

tarantella restart sgd

tarantella restart webserver

The tarantella role Command

Syntax

Description

Examples

tarantella role add_link

tarantella role add_member

tarantella role list

tarantella role list_links

tarantella role list_members

tarantella role remove_link

tarantella role remove_member

The tarantella security Command

Syntax

Description

Examples

tarantella security certinfo

tarantella security certrequest

tarantella security certuse

tarantella security customca

tarantella security decryptkey

tarantella security disable

tarantella security enable

tarantella security fingerprint

tarantella security peerca

tarantella security selfsign

tarantella security start

tarantella security stop

The tarantella service Command

Syntax

Description

Examples

tarantella service delete

tarantella service edit

tarantella service list

tarantella service new

The tarantella setup Command

Syntax

Description

Examples

The tarantella start Command

Syntax

Description

Examples

tarantella start cdm

tarantella start sgd

tarantella start webserver

The tarantella status Command

Syntax

Description

Examples

The tarantella stop Command

Syntax

Description

Examples

tarantella stop cdm

tarantella stop sgd

tarantella stop webserver

The tarantella tokencache Command

Syntax

Description

Examples

tarantella tokencache delete

tarantella tokencache list

The tarantella tscal Command

Syntax

Description

Examples

tarantella tscal free

tarantella tscal list

tarantella tscal return

The tarantella uninstall Command

Syntax

Description

Examples

The tarantella version Command

Syntax

Description

Examples

The tarantella webserver Command

Syntax

Description

Examples

tarantella webserver add_trusted_user

tarantella webserver delete_trusted_user

tarantella webserver list_trusted_users

The tarantella webtopsession Command

Syntax

Description

Examples

tarantella webtopsession list

tarantella webtopsession logout

E.  Login Scripts

F.  Third-Party Legal Notices

Glossary

Index

The tarantella security Command

Controls SGD security services and manages server certificates.

Syntax

tarantella security certinfo | certrequest | certuse | customca |
decryptkey | disable | enable | fingerprint | peerca | selfsign |
start | stop

Description

The following table shows the available subcommands for this command.

Subcommand
Description
More Information
certinfo
Displays information about an SSL certificate or Certificate Signing Request (CSR), and optionally checks whether a specified private key matches the public key contained in a particular SSL certificate.
certrequest
Creates a CSR and a corresponding key pair, which you use to obtain an SSL certificate for use with SGD security services.
certuse
Installs an SSL certificate, or specifies the location of an installed certificate, for use with SGD security services.
customca
Installs a root certificate for a custom CA for use with SGD security services.
decryptkey
Decrypts an encrypted private key so that you can use it with SGD.
disable
If an SGD server has been secured using the tarantella security enable command, restores the security settings to their previous state.
enable
Makes an SGD server secure.
fingerprint
Displays the fingerprint of the CA certificate installed on the SGD server.
peerca
Shows, imports, or exports the primary server’s CA certificate used for secure intra-array communication.
selfsign
Generates and installs a self-signed server SSL certificate.
start
Enables secure (SSL) connections. Users who require secure connections are given them.
stop
Disables secure (SSL) connections. Users configured for secure connections are given standard connections instead.

Note - All commands include a --help option. You can use tarantella security subcommand --help to get help on a specific command.


Examples

The following example displays information about a CSR in /tmp/boston.csr.

# tarantella security certinfo --csrfile /tmp/boston.csr

The following example decrypts the key /opt/keys/key1, which is stored in Definite Encoding Rules (DER) format, placing the decrypted key in /opt/keys/key2.

# tarantella security decryptkey \
  --enckey /opt/keys/key1 \
  --deckey /opt/keys/key2 \
  --format DER

tarantella security certinfo

Displays information about an installed SSL certificate (--certfile) or a Certificate Signing Request (--csrfile).

Syntax
tarantella security certinfo
                           [ --certfile certfile [ --keyfile keyfile ] ]
                           [ --full ]
tarantella security certinfo --csrfile csrfile [ --full ]
Description

This command can also check whether a specified private key matches the public key in a particular SSL certificate. In other words, the public key can decrypt text encrypted with the private key.

Use the first form of this command without specifying a certfile and keyfile to check the key and SSL certificate installed using the tarantella security certuse command.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing a server SSL certificate. The command displays information about this certificate, including the following:
  • Information about the server and your organization.

  • Alternative DNS names for the server.

  • Credentials of the CA that validated the server SSL certificate.

  • Dates for which the SSL certificate is valid.

If you omit --certfile, the command displays information about the SSL certificate and key installed in the /opt/tarantella/var/tsp directory.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a private key. The command checks whether a private key matches the public key contained in the SSL certificate file.

You must specify the full path to the key file.

--csrfile
Specifies the location of a file containing a CSR. The command displays information about this CSR, including the following:
  • The DNS name, or chosen common name, of the server the CSR is for.

  • Alternative DNS names for the server.

  • Your organization’s name and location.

You must specify the full path to the CSR file.

--full
Displays more detailed information about the specified SSL certificate or CSR, for example, the contents of the public keys they contain.
Examples

The following example displays detailed information about the SSL certificate in the /opt/certs/newyork.cert file.

# tarantella security certinfo \
--certfile /opt/certs/newyork.cert \
--full

The following example displays information about the SSL certificate in /opt/certs/boston.cert, and checks that the private key /opt/keys/boston.key matches the public key contained in that SSL certificate.

# tarantella security certinfo \
--certfile /opt/certs/boston.cert \
--keyfile /opt/keys/boston.key

The following example displays information about the CSR in /tmp/boston.csr.

# tarantella security certinfo \
--csrfile /tmp/boston.csr

tarantella security certrequest

Generates a CSR, and a public and private key pair.

Syntax
tarantella security certrequest --country country
                                --state state
                                --orgname org
                              [ --ouname ou ] 
                              [ --email email ] 
                              [ --locality locality ] 
                              [ --keylength length ]
Description

You send the generated CSR to a supported CA to obtain an SSL certificate for use with SGD security services.

Note the following:

You can use the tarantella security certinfo command to display information about SSL certificates and CSRs.

If you do not specify --ouname, --email or --locality SGD omits that information from the CSR. There are no default values.

The options that can be used for this command are as follows.

Option
Description
--country
Specifies the country where your organization is located. Use ISO 3166 country codes. For example, use US for the United States or DE for Germany.
--state
Specifies the state or province where your organization is located. Do not use abbreviations here. For example, use Massachusetts rather than Mass. or MA.
--orgname
Specifies the official, legal name of your organization.
--ouname
Specifies the name of a organizational unit (OU) within your organization, if required.

If you do not need to specify an OU, you can use this setting to specify a less formal organization name.

--email
Specifies your business email address. This address is used for correspondence between you and the CA you send the CSR to.
--locality
Specifies the city or principality where your organization is located, if needed.
--keylength
Specifies the length of the key pair. The default is 1024.

Note - Make sure you quote any object names containing spaces, for example, "o=Indigo Insurance".


Examples

The following example generates a CSR for Indigo Insurance, located in Massachusetts, with contact Bill Orange.

# tarantella security certrequest \
--country US \
--state MA \
--orgname "Indigo Insurance" \
--email "orange@indigo-insurance.com"

tarantella security certuse

Installs a server SSL certificate, or specifies the location of a previously installed SSL certificate, to be used by SGD security services.

Syntax
tarantella security certuse
tarantella security certuse --certfile cfile [ --keyfile kfile ]
Description

SSL certificates must be Base 64-encoded Privacy Enhanced Mail (PEM) format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If no arguments are specified, this command reads the SSL certificate from standard input and installs it in /opt/tarantella/var/tsp.

After installing an SSL certificate, you must restart SGD using the tarantella restart command.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing the SSL certificate. If no --keyfile argument is specified, SGD assumes that the tarantella security certrequest command was used to generate the private key.

You can use this option as follows:

  • To tell SGD about an SSL certificate you have already installed for use with another product, such as a web server. In this case, SGD makes symbolic links to, not copies of, the SSL certificate file and key file, if specified.

  • To install an SSL certificate received from a CA after generating a CSR using tarantella security certrequest. In this case, SGD installs the SSL certificate in /opt/tarantella/var/tsp for use with SGD security services.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a file containing the private key for the SSL certificate specified by --certfile.

Use this option to tell SGD about a private key you have already. If you used the tarantella security certrequest command to generate a CSR and obtain an SSL certificate, you do not need to use this option.

You must specify the full path to the key file.

Examples

The following command installs an SSL certificate, which is saved in a temporary file /tmp/cert, and uses the private key generated when the tarantella security certrequest command was used to generate the CSR:

# tarantella security certuse < /tmp/cert

The following command installs an SSL certificate, which is stored in /opt/certs/cert, and a private key, which is stored in /opt/keys/key. The tarantella security certrequest command was not used to generate the CSR.

# tarantella security certuse \
--certfile /opt/certs/cert \
--keyfile /opt/keys/key

tarantella security customca

Installs or removes a root certificate for a custom CA for use with SGD security services.

Syntax
tarantella security customca
tarantella security customca --rootfile carootfile | --remove
Description

CA certificates must be Base 64-encoded PEM-format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If no arguments are specified, this command reads the root certificate from standard input.

The following table shows the available options for this command.

Option
Description
--rootfile
Specifies the location of a file containing the CA’s root certificate. Details are copied to /opt/tarantella/var/tsp for use by SGD security services.

You must specify the full path to the root certificate file.

--remove
Removes any custom CA’s root certificate currently installed for use with SGD security services.

This command also imports the CA certificate into the CA certificate truststore for the SGD server. This is the /opt/tarantella/bin/jre/lib/security/cacerts file.

Examples

The following example installs a CA’s root certificate from the file/tmp/rootcert, which you can then delete.

# tarantella security customca --rootfile /tmp/rootcert

tarantella security decryptkey

Decrypts an encrypted private key so that you can use it with SGD. This enables you to use an SSL certificate that you are already using with another product such as a web server, rather than obtaining a separate SSL certificate for use exclusively with SGD.

Syntax
tarantella security decryptkey --enckey enckeyfile
                               --deckey deckeyfile
                             [ --format PEM|DER ]
Description

The following table shows the available options for this command.

Option
Description
--enckey
Specifies the location of the encrypted private key that you want to decrypt. Only keys encrypted by a product that uses SSLeay or OpenSSL certificate libraries can be decrypted.

You must specify the full path to the encrypted private key file.

--deckey
Specifies a file where the decrypted key is stored.

Note - For security reasons, it is very important to restrict access to private keys, especially when stored in an unencrypted form. Access to private keys by unauthorized users can result in a serious security breach. Store private keys accordingly.


You must specify the full path to the decrypted key file.

--format
Specifies the format the encrypted key is stored in. Defaults to PEM.

Note - You can only decrypt private keys that were originally encrypted by a product that uses SSLeay or OpenSSL certificate libraries.


See the tarantella security certuse command for information about how to share server SSL certificates in this way.

Examples

The following example decrypts the key /opt/keys/key1, which is stored in DER format, placing the decrypted key in /opt/keys/key2.

# tarantella security decryptkey \
--enckey /opt/keys/key1 \
--deckey /opt/keys/key2 \
--format DER

tarantella security disable

If an SGD server has been secured using the tarantella security enable command, this command restores the security settings to their previous state.

Syntax
tarantella security disable
Description

Use this command to disable security services for an SGD server.

The following limitations apply for this command:

The command restores the security settings of an SGD server to their previous non-secure state. Any server SSL certificates or CA certificates are not removed.

Examples

The following example disables security services for an SGD server.

# tarantella security disable

tarantella security enable

Makes an SGD server secure.

Syntax
tarantella security enable
tarantella security enable --certfile cfile
                         [ --keyfile kfile ]
                         [ --rootfile carootfile ]
                         [ --firewalltraversal on|off ]
Description

Use this command to secure an SGD server.

The following limitations apply for this command:

Use the --certfile option to specify a server SSL certificate to install. Certificates must be Base 64-encoded PEM-format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If you omit the --certfile option, this command generates and installs a self-signed server SSL certificate. Only use self-signed server SSL certificates for test purposes.

If you use the --certfile option and the --keyfile option together, SGD creates symbolic links to the specified SSL certificate and key files.

Use the --rootfile option to install the CA certificate if the SSL certificate is signed by an unsupported CA. This option also imports the CA certificate into the CA certificate truststore for the SGD server. This is the /opt/tarantella/bin/jre/lib/security/cacerts file.

Use the --firewalltraversal option to enable or disable the SGD server for firewall traversal. SGD servers configured for firewall traversal cannot be used with the SGD Gateway.

If you have attempted to configure security previously, the tarantella security enable command has no effect. The command exits with an error message, indicating that security settings have been modified previously.

Ensure that the SGD server is running before you use this command. You can use the tarantella status command to show the current status of an SGD server.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing the SSL certificate.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a file containing the private key for the SSL certificate specified by --certfile.

Use this option to tell SGD about a private key you have already. If you used the tarantella security certrequest command to generate a CSR and obtain an SSL certificate, you do not need to use this option.

You must specify the full path to the key file.

--rootfile
Specifies the location of a file containing the CA’s root certificate. Details are copied to /opt/tarantella/var/tsp for use by SGD security services.

You must specify the full path to the CA root certificate file.

--firewalltraversal
Configures the SGD server for firewall traversal.

If you do not specify this option, firewall traversal is enabled by default.

If you use this command to secure an SGD server, the tarantella security disable command can be used to restore the security settings to their previous state.

Examples

The following example secures the SGD server, installs the specified SSL certificate, and uses the private key generated when the tarantella security certrequest command was used to generate a CSR:

# tarantella security enable \
--certfile /opt/certs/cert

The following example secures the SGD server, and installs the specified SSL certificate and private key. A CA root certificate is also installed. The tarantella security certrequest command was not used to generate a CSR.

# tarantella security enable \
--certfile /opt/certs/cert \
--keyfile /opt/keys/key \
--rootfile /tmp/rootcert

The following example secures the SGD server and installs a self-signed SSL certificate. Firewall traversal is not enabled for the SGD server.

# tarantella security enable \
--firewalltraversal off

tarantella security fingerprint

Displays the fingerprint of the CA certificate installed on the SGD server.

Syntax
tarantella security fingerprint
Description

This command displays the fingerprint of the CA certificate installed using the tarantella security customca command.

If the SSL certificate for an SGD server is signed by a supported CA, you do not need to install a CA certificate.

If a server SSL certificate is not installed on the SGD server, this command shows the fingerprint of the built-in SGD CA certificate

Examples

The following example displays the fingerprint of the CA certificate installed on the SGD server.

# tarantella security fingerprint

tarantella security peerca

Shows, imports or exports the primary server’s CA certificate used for secure intra-array communication.

Syntax
tarantella security peerca [ --show | --import hostname | --export ]
Description

The following table shows the available options for this command.

Option
Description
--show
Displays the primary server’s CA certificate for the array.
--import
Import the CA certificate from the specified server.
--export
Export the CA certificate from this server.
Examples

The following example shows the primary server’s CA certificate for the array.

# tarantella security peerca --show

tarantella security selfsign

Generates and installs a self-signed server SSL certificate.

Syntax
tarantella security selfsign
Description

Generates and installs a self-signed server SSL certificate. You must run the tarantella security certrequest command before using this command.

Only use self-signed server SSL certificates in a test environment because self-signed SSL certificates are not truly secure. While a self-signed server SSL certificate can be used to give users secure connections, users have no guarantee that the server they are connecting to is genuine. Self-signed certificates are valid for 365 days.

Examples

The following example generates and installs a self-signed server SSL certificate.

# tarantella security selfsign

tarantella security start

Starts security services on the SGD server where the command is run. Secure (SSL-based) connections are given to those users configured to require them.

Syntax
tarantella security start
Description

To enable secure connections to a particular SGD server you must already have installed an SSL certificate for that server.

Secure connections are enabled for the SGD server where the command is run.

Ensure that the SGD server is running before you use this command. You can use the tarantella status command to show the current status of an SGD server.

Examples

The following example enables secure connections for the SGD server where the command is run.

# tarantella security start

tarantella security stop

Disables security services on the SGD server where the command is run. Users configured to require secure (SSL-based) connections are given standard connections instead, if available.

Syntax
tarantella security stop [ --keep ]
Description

The following table shows the available options for this command.

Option
Description
--keep
Specifies that any existing secure connections are preserved. If omitted, all secure connections are closed.

If you run the command without any options, secure connections are disabled for the SGD server where the command is run.

Examples

The following example disables security services for the SGD server where the command is run, but preserves any existing secure connections.

# tarantella security stop --keep