Exit Print View

Oracle Secure Global Desktop Administration Guide for Version 4.6

Document Information

Preface

1.  Networking and Security

2.  User Authentication

3.  Publishing Applications to Users

4.  Configuring Applications

5.  Client Device Support

6.  SGD Client and Webtop

7.  SGD Servers, Arrays, and Load Balancing

Arrays

The Structure of an Array

Replicating Data Across the Array

Communication Between Array Members

Secure Intra-Array Communication

Managing Arrays and SGD Servers

Array Resilience

Configuring Arrays

Configuring Array Resilience

Load Balancing

User Session Load Balancing

Application Session Load Balancing

Application Load Balancing

Load Balancing Groups

How Application Load Balancing Works

How Advanced Load Management Works

Tuning Application Load Balancing

Editing Application Load Balancing Properties

SGD Web Server and Administration Console

Introducing the SGD Web Server

Securing the SGD Web Server

Using the Administration Console

Administration Console Configuration Settings

Securing Access to the Administration Console

Monitoring and Logging

The SGD Datastore

User Sessions and Application Sessions

Using Log Filters to Troubleshoot Problems With an SGD Server

Using Log Filters for Auditing

Using Log Filters to Troubleshoot Problems With Protocol Engines

SGD Web Server Logging

SGD Client Logging

SGD Server Certificate Stores

The CA Certificate Truststore

The Client Certificate Store

SGD Installations

About Your SGD Installation

Backing Up and Restoring an SGD Installation

Troubleshooting Arrays and Load Balancing

Troubleshooting Array Resilience

Troubleshooting Clock Synchronization Issues

Troubleshooting Advanced Load Management

SGD Uses Too Much Network Bandwidth

Users Cannot Connect to an SGD Server When It Is In Firewall Traversal Mode

Users Cannot Relocate Their Sessions

A.  Global Settings and Caches

B.  Secure Global Desktop Server Settings

C.  User Profiles, Applications, and Application Servers

D.  Commands

E.  Login Scripts

F.  Third-Party Legal Notices

Glossary

Index

SGD Server Certificate Stores

Each SGD server has two certificate stores, a CA certificate truststore and a client certificate store.

The CA Certificate Truststore

Each SGD server has its own CA certificate truststore. This is the /opt/tarantella/bin/jre/lib/security/cacerts file.

The CA certificate truststore contains the CA certificates that the SGD server trusts.

The /opt/tarantella/etc/data/cacerts.txt file contains the X.500 Distinguished Names (DNs) and MD5 signatures of all the CA certificates that are in the CA certificates truststore when SGD is first installed. These are the CAs that SGD supports by default. To add support for additional CAs, you can import CA certificates to the truststore.

You might need to import CA certificates in the following circumstances:

The certificates that must be imported are as follows:

If the tarantella security customca command is used to install a CA certificate, or CA certificate chain, this command also imports the CA certificates into the CA certificate truststore. It only does this on the SGD server on which the command is run.

To manually import CA certificates, use the keytool application. See the JDK Tools and Utilities documentation for details on how to use the keytool application. The /opt/tarantella/var/tsp/ca.pem file on the SGD host contains the CA certificate or certificate chain.

If you need to import a CA certificate chain, import each certificate in the chain separately.

The password for the CA certificate truststore is changeit.

How to Import CA Certificates or Certificate Chains into the CA Certificate Truststore

Before You Begin

Ensure that no users are logged in to the SGD server and that there are no running application sessions, including suspended application sessions.

Repeat the following procedure on each SGD server in the array.

  1. Log in as superuser (root) on the SGD host.

  2. Import the CA certificate.

    To import a CA certificate chain, you must import each certificate in the chain separately.

    Use the following command:

    # /opt/tarantella/bin/jre/bin/keytool -importcert \
    -keystore /opt/tarantella/bin/jre/lib/security/cacerts \
    -storepass changeit -file CA-certificate-path \
    -alias alias

    Use the -alias option to uniquely identify the certificate.

  3. Restart the SGD server.

    You must restart the SGD server for the CA certificate to become effective.

The Client Certificate Store

Each SGD server has its own client certificate store. This is the /opt/tarantella/var/info/certs/sslkeystore file.

The client certificate store contains the client certificates that an SGD server uses to identify itself when connecting to another server.

You create and install server client certificates with the keytool application. See the JDK Tools and Utilities documentation for details on how to use the keytool application.

You must provide a password when adding or removing certificates from the client certificate store. The password for the client certificate store is unique to each SGD server and can be found in the /opt/tarantella/var/info/key file. Use this password for both the -storepass and -keypass options.

How to Create a Client Certificate CSR for an SGD Server

  1. Log in as superuser (root) on the SGD host.

  2. Generate the key pair for the client certificate.

    # /opt/tarantella/bin/jre/bin/keytool -genkeypair \
    -keyalg rsa \
    -keystore /opt/tarantella/var/info/certs/sslkeystore \
    -storepass "$(cat /opt/tarantella/var/info/key)" \
    -alias alias \
    -keypass "$(cat /opt/tarantella/var/info/key)"

    Use the -alias option to uniquely identify the key pair.

  3. Generate a Certificate Signing Request (CSR) for the client certificate.

    # /opt/tarantella/bin/jre/bin/keytool -certreq \
    -keystore /opt/tarantella/var/info/certs/sslkeystore \
    -storepass "$(cat /opt/tarantella/var/info/key)" \
    -alias alias \
    -keypass "$(cat /opt/tarantella/var/info/key)" \
    -file CSR-path

    The alias must be the same as the alias used when generating the key pair. Aliases are case-insensitive.

How to Install a Client Certificate for an SGD Server

Before You Begin

Ensure that no users are logged in to the SGD server and that there are no running application sessions, including suspended application sessions.

Repeat the following procedure on each SGD server in the array.

  1. Log in as superuser (root) on the SGD host.

  2. Install the client certificate.

    # /opt/tarantella/bin/jre/bin/keytool -importcert \
    -file certificate-path 
    -keystore /opt/tarantella/var/info/certs/sslkeystore \
    -storepass "$(cat /opt/tarantella/var/info/key)" \
    -alias alias \
    -keypass "$(cat /opt/tarantella/var/info/key)"

    The alias must be the same as the alias used when generating the CSR for the client certificate. Aliases are case-insensitive.

  3. Restart the SGD server.

    You must restart the SGD server for the client certificate to become effective.