The Sun Secure Global Desktop 4.5 Administration Guide is a comprehensive guide to how to configure, administer, and troubleshoot problems with Sun Secure Global Desktop Software (SGD). This document is written for SGD Administrators.

How This Book Is Organized

Chapter 1 describes how to integrate SGD into your network infrastructure and secure the network connections used by SGD.

Chapter 2 describes how users authenticate to an SGD server to log in to SGD. This chapter also covers how users authenticate to an application server to run an application.

Chapter 3 describes how you use organizational hierarchies to manage SGD users and give them access to applications.

Chapter 4 contains advice on configuring applications that users can run through SGD, and how to diagnose and fix problems with applications.

Chapter 5 describes how to enable support for peripherals and other client device features from applications displayed in SGD.

Chapter 6 describes how to install, configure, and run the SGD Client. Webtop configuration is also covered.

Chapter 7 describes how to configure, license, and monitor SGD servers and arrays. Some system administration features of SGD, such as the Administration Console, log filters, and installation backups are also covered.

Appendix A describes global settings which apply to all SGD servers in the array, including the password cache and token cache.

Appendix B describes server settings which apply to the specified SGD server in the array.

Appendix C describes the supported object types in SGD and their attributes. Usage details for setting attributes using the Administration Console are included, along with the equivalent SGD command line.

Appendix D describes the available SGD commands. Examples are included for each command.

Appendix E contains reference information about the SGD login scripts. You can use this information to customize the standard SGD login scripts, or to develop your own login scripts.

Using UNIX Commands

This document might not contain information on basic UNIX® commands and procedures such as shutting down the system, booting the system, and configuring devices. Refer to your system documentation for this information. This document does, however, contain information about specific SGD commands.

Shell Prompts

Shell Prompt
C shell machine-name%
C shell superuser machine-name#
Bourne shell and Korn shell $
Bourne shell and Korn shell superuser #

Typographic Conventions

Typeface Meaning Examples
AaBbCc123 The names of commands, files, and directories; on‐screen computer output Edit your .login file.

Use ls -a to list all files.

% You have mail.

AaBbCc123 What you type, when contrasted with on-screen computer output % su


AaBbCc123 Book titles, new words or terms, words to be emphasized. Replace command-line variables with real names or values. Read Chapter 6 in the User’s Guide.

These are called class options.

To delete a file, type rm filename.

Note - Characters display differently depending on browser settings. If characters do not display correctly, change the character encoding in your browser to Unicode UTF-8.

Related Documentation

The following table lists the documentation for this product. The online documentation is available at:

Application Title Part Number Format Location
Release Notes Sun Secure Global Desktop 4.5 Release Notes 820‑6687‑10 HTML



Software CD and online

Installation Sun Secure Global Desktop 4.5 Installation Guide 820‑6688‑10 HTML



Software CD and online

Administration Sun Secure Global Desktop 4.5 Administration Guide 820‑6689‑10 HTML


User Sun Secure Global Desktop 4.5 User Guide 820‑6690‑10 HTML


Administration Sun Secure Global Desktop 4.5 Gateway Administration Guide 820-6691-10 HTML



Third-Party Web Sites

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection width the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.

Sun Welcomes Your Comments

Sun is interested in improving its documentation and welcomes your comments and suggestions. You can email your comments to Sun at:

Please include the following document title and part number in the subject line of your email:

Sun Secure Global Desktop 4.5 Administration Guide, part number 820-6689-10.