3. Publishing Applications to Users
7. SGD Servers, Arrays, and Load Balancing
Secure Global Desktop Authentication Tab
Use Default Third-Party Identity
Use Closest Matching LDAP Profile
Search Unix User ID in Local Repository
Search Unix Group ID in Local Repository
The Service Objects List Table
Active Directory Default Domain
Application Authentication Tab
Timeout for User Session Resumability
Timeout for General Resumability
Application Session Load Balancing
Client's Clipboard Security Level
Make Universal PDF Printer the Default
Make Universal PDF Viewer the Default
Timeout for Print Name Mapping
B. Secure Global Desktop Server Settings
Settings on the Communication tab control connections between the client device, the SGD server, and application servers. They also control the resumability behavior for application sessions.
From the command line, use the tarantella config list command to list these settings, and
the
tarantella config edit command to edit these settings.
This tab contains the following sections:
Ports
This section contains the following attributes:
Application Sessions
This section contains the following attributes:
Synchronization
This section contains the Resource Synchronization Service attribute.
User Sessions
This section contains the User Session Idle Timeout attribute.
Usage: Type a port number in the field.
The TCP port number used for unencrypted connections between client devices and SGD servers.
Open this port in your firewall to enable connections from users who have standard connections. Standard connections are connections that do not use SSL.
You must restart every SGD server in the array for changes to this attribute to take effect.
The default is TCP port 3144.
Command option: --array-port-unencrypted tcp-port
Usage: Replace tcp-port with the port number to use for unencrypted connections.
In the following example, TCP port 3144 is used for unencrypted connections.
--array-port-unencrypted 3144
Usage: Type a port number in the field.
The TCP port number used for encrypted connections between client devices and SGD servers.
Open this port in your firewall to enable connections from users who have secure (SSL-based) connections to SGD.
You must restart every SGD server in the array for changes to this attribute to take effect.
The default is TCP port 5307.
Command option: --array-port-encrypted tcp-port
Usage: Replace tcp-port with the port number to use for encrypted connections.
In the following example, TCP port 5307 is used for encrypted connections.
--array-port-encrypted 5307
Usage: Type a time period, measured in seconds, in the field.
Determines how often a keepalive message is sent to client devices during application sessions. The default value is 100 seconds.
Some Hypertext Transfer Protocol (HTTP) proxy servers close a connection if there is no activity on it. Using a keepalive ensures that a connection stays open.
Set this to 0 to disable keepalive messages.
This attribute is also used keep open connections between the SGD Client and the SGD server for client drive mapping.
You must restart every SGD server in the array for changes to this attribute to take effect.
Command option: --sessions-aipkeepalive secs
Usage: Replace secs with the keepalive time period, measured in seconds.
In the following example, a keepalive message is sent to the client device every 100 seconds.
--sessions-aipkeepalive 100
Usage: Type a timeout value, measured in minutes, in the field.
For applications configured to be resumable during the user session, the length of
time in minutes that a suspended application session is guaranteed to be resumable
for if the connection to SGD is lost. Note that if the user
logs out, the application sessions end. See the Application Resumability attribute.
After this period, the SGD server ends the session.
You can override this setting using the Application Resumability: Timeout attribute of an application.
Note - If an application is terminated because the SGD Client exits unexpectedly, the timeout is the timeout plus 20 minutes.
Changes to this attribute take effect immediately.
Command option: --sessions-timeout-session mins
Usage: Replace mins with the timeout value, measured in minutes.
In the following example, the application session is resumable for 1440 minutes (24 hours).
--sessions-timeout-session 1440
Usage: Type a timeout value, measured in minutes, in the field.
For applications configured to be generally resumable, the length of time in minutes
that a suspended application session is guaranteed to be resumable for after the
user logs out or the connection to SGD is lost. See the Application Resumability
attribute.
After this period the SGD server ends the session.
You can override this setting using the Application Resumability: Timeout attribute of an application.
Note - If an application is terminated because the SGD Client exits unexpectedly, the timeout is the timeout plus 20 minutes.
Changes to this attribute take effect immediately.
Command option: --sessions-timeout-always mins
Usage: Replace mins with the timeout value, measured in minutes.
In the following example, the application session is resumable for 11500 minutes.
--sessions-timeout-always 11500
Usage: Select or deselect the check box.
Whether to enable replication of resources for the array.
If enabled, synchronization starts at a time determined by the Daily Resource Synchronization Time for each
SGD server in the array.
Resource synchronization is enabled by default.
Changes to this attribute take effect immediately.
Command option: --array-resourcesync 1 | 0
Usage: Specify 1 (true) or 0 (false).
The following example disables resource synchronization for the array.
--array-resourcesync 0
Usage: Type a timeout value, measured in seconds, in the field.
User sessions are ended automatically if there has been no application session or webtop activity for the specified time period. The timeout applies to all SGD servers in the array.
The user session idle timeout is disabled by default. A setting of 0 turns off the feature.
![]() | Caution - Do not configure an idle timeout that is less than 300 seconds (five minutes). |
Activity on the following devices has no effect on the idle timeout period:
Serial ports
Smart cards
Audio
You must restart every SGD server in the array for changes to this attribute to take effect.
Command option: --webtop-session-idle-timeout secs
Usage: Replace secs with the timeout value, measured in seconds.
In the following example, user sessions are ended automatically after being inactive for 1800 seconds, or 30 minutes.
--webtop-session-idle-timeout 1800