3. Publishing Applications to Users
7. SGD Servers, Arrays, and Load Balancing
B. Secure Global Desktop Server Settings
Secure Global Desktop Servers Tab
The Secure Global Desktop Server List Table
Maximum Simultaneous User Sessions
Daily Resource Synchronization Time
The Application Session List Table
Attributes on the General tab are general attributes for a particular SGD server.
From the command line, use the tarantella config list command to list these settings, and
the
tarantella config edit command to edit these settings.
Changes to these attributes take effect immediately.
Usage: Type the external DNS names of this server in the field. Press the Return key after each name definition.
The external DNS names of this server.
This attribute enables you to use different names, depending on the Internet Protocol (IP) address of the client.
Only change this setting if this server is known by different names on the network, for example, inside and outside a firewall.
Each name has the following format:
IP-pattern:DNS name
IP-pattern is a regular expression, or a subnet mask, matching a client IP address. For example, 192.168.10.*, or 192.168.10.0/24.
If this server only has one name, use one line matching all clients. For example, *:www.indigo-insurance.com.
The order of the names is important. The DNS name for the first matching IP pattern is used.
Note - You must restart the SGD server for a change to this setting to take effect.
Command option: --server-dns-external IP-pattern:dns-name
Usage: Replace IP-pattern with a regular expression for the client IP addresses. Replace dns-name with the external DNS name of the server. Use a comma to separate multiple DNS names.
In the following example, a DNS name of boston.indigo-insurance.com is used for clients with an IP address in the 192.168.10.* range. All other clients use a DNS name of www.indigo-insurance.com.
--server-dns-external "192.168.10.*:boston.indigo-insurance.com, \ *:www.indigo-insurance.com"
Usage: Select or deselect the check box.
Whether to allow users to log in to this SGD server.
To “decommission” an SGD server, deselect the check box. No users can log in and no new application sessions can start. Users currently logged in to this server, or with application sessions hosted on this server, are not affected. Users can log in to another SGD server in the array and resume application sessions hosted on this server.
Users are redirected to the web page defined by the Redirection URL attribute.
Typically, you set this to another SGD server in the array.
Command option: --server-login enabled | disabled
Usage: Specify enabled or disabled.
In the following example, user logins are disabled for the SGD host.
--server-login disabled
Usage: Type a redirection Uniform Resource Locator (URL) in the field.
If the SGD server does not allow users to log in, client devices are redirected to this URL.
If the attribute is not set, client devices are redirected to a page telling users that they cannot log in.
Command option: --server-redirectionurl url
Usage: Replace url with the address of a web page to redirect to.
The following example specifies a redirection URL of www.indigo-insurance.com.
--server-redirectionurl "www.indigo-insurance.com"