Exit Print View

Oracle Secure Global Desktop Administration Guide for Version 4.6

Document Information

Preface

1.  Networking and Security

2.  User Authentication

3.  Publishing Applications to Users

4.  Configuring Applications

5.  Client Device Support

6.  SGD Client and Webtop

7.  SGD Servers, Arrays, and Load Balancing

A.  Global Settings and Caches

B.  Secure Global Desktop Server Settings

C.  User Profiles, Applications, and Application Servers

D.  Commands

The tarantella Command

Syntax

Description

Examples

The tarantella archive Command

Syntax

Description

Examples

The tarantella array Command

Syntax

Description

Examples

tarantella array add_backup_primary

Syntax

Description

Examples

tarantella array clean

Syntax

Description

Examples

tarantella array detach

Syntax

Description

Examples

tarantella array edit_backup_primary

Syntax

Description

Examples

tarantella array join

Syntax

Description

Examples

tarantella array list

Syntax

Examples

tarantella array list_backup_primaries

Syntax

Description

Examples

tarantella array make_primary

Syntax

Description

Examples

tarantella array remove_backup_primary

Syntax

Description

Examples

The tarantella cache Command

Syntax

Description

Examples

The tarantella config Command

Syntax

Description

Examples

tarantella config edit

Syntax

Description

Examples

tarantella config list

Syntax

Description

Examples

The tarantella emulatorsession Command

Syntax

Description

Examples

tarantella emulatorsession list

Syntax

Description

Examples

tarantella emulatorsession info

Syntax

Description

Examples

tarantella emulatorsession shadow

Syntax

Description

Examples

tarantella emulatorsession suspend

Syntax

Description

Examples

tarantella emulatorsession end

Syntax

Description

Examples

The tarantella help Command

Syntax

Description

Examples

The tarantella object Command

Syntax

Description

Examples

tarantella object add_host

Syntax

Description

Examples

tarantella object add_link

Syntax

Description

Examples

tarantella object add_mapping

Syntax

Description

Examples

tarantella object add_member

Syntax

Description

Examples

tarantella object delete

Syntax

Description

Examples

tarantella object edit

Syntax

Description

Examples

tarantella object list_attributes

Syntax

Description

Examples

tarantella object list_contents

Syntax

Description

Examples

tarantella object new_3270app

Syntax

Description

Examples

tarantella object new_5250app

Syntax

Description

Examples

tarantella object new_charapp

Syntax

Description

Examples

tarantella object new_container

Syntax

Description

Examples

tarantella object new_dc

Syntax

Description

Examples

tarantella object new_doc

Syntax

Description

Examples

tarantella object new_dynamicapp

Syntax

Description

Examples

tarantella object new_group

Syntax

Description

Examples

tarantella object new_host

Syntax

Description

Examples

tarantella object new_org

Syntax

Description

Examples

tarantella object new_orgunit

Syntax

Description

Examples

tarantella object new_person

Syntax

Description

Examples

tarantella object new_windowsapp

Syntax

Description

Examples

tarantella object new_xapp

Syntax

Description

Examples

tarantella object remove_host

Syntax

Description

Examples

tarantella object remove_link

Syntax

Description

Examples

tarantella object remove_mapping

Syntax

Description

Examples

tarantella object remove_member

Syntax

Description

Examples

tarantella object rename

Syntax

Description

Examples

tarantella object script

Syntax

Description

Examples

The tarantella passcache Command

Syntax

Description

Examples

tarantella passcache delete

Syntax

Description

Examples

tarantella passcache edit

Syntax

Description

Examples

tarantella passcache list

Syntax

Description

Examples

tarantella passcache new

Syntax

Description

Examples

The tarantella print Command

Syntax

Description

Examples

tarantella print cancel

Syntax

Description

Examples

tarantella print list

Syntax

Description

Examples

tarantella print move

Syntax

Description

Examples

tarantella print pause

Syntax

Description

Examples

tarantella print resume

Syntax

Description

Examples

tarantella print start

Syntax

Description

Examples

tarantella print status

Syntax

Description

Examples

tarantella print stop

Syntax

Description

Examples

The tarantella query Command

Syntax

Description

Examples

tarantella query audit

Syntax

Description

Using a Filter

Examples

tarantella query billing

Syntax

Description

Examples

tarantella query errlog

Syntax

Description

Examples

tarantella query uptime

Syntax

Description

Examples

The tarantella restart Command

Syntax

Description

Examples

tarantella restart sgd

Syntax

Description

Examples

tarantella restart webserver

Syntax

Description

Examples

The tarantella role Command

Syntax

Description

Examples

tarantella role add_link

Syntax

Description

Examples

tarantella role add_member

Syntax

Description

Examples

tarantella role list

Syntax

Description

Examples

tarantella role list_links

Syntax

Description

Examples

tarantella role list_members

Syntax

Description

Examples

tarantella role remove_link

Syntax

Description

Examples

tarantella role remove_member

Syntax

Description

Examples

The tarantella security Command

Syntax

Description

Examples

tarantella security certinfo

Syntax

Description

Examples

tarantella security certrequest

Syntax

Description

Examples

tarantella security certuse

Syntax

Description

Examples

tarantella security customca

Syntax

Description

Examples

tarantella security decryptkey

Syntax

Description

Examples

tarantella security disable

Syntax

Description

Examples

tarantella security enable

Syntax

Description

Examples

tarantella security fingerprint

Syntax

Description

Examples

tarantella security peerca

Syntax

Description

Examples

tarantella security selfsign

Syntax

Description

Examples

tarantella security start

Syntax

Description

Examples

tarantella security stop

Syntax

Description

Examples

The tarantella service Command

Syntax

Description

Examples

tarantella service delete

Syntax

Description

Examples

tarantella service edit

Syntax

Description

Examples

tarantella service list

Syntax

Description

Examples

tarantella service new

Syntax

Description

Examples

The tarantella setup Command

Syntax

Description

Examples

The tarantella start Command

Syntax

Description

Examples

tarantella start cdm

Syntax

Description

Examples

tarantella start sgd

Syntax

Description

Examples

tarantella start webserver

Syntax

Description

Examples

The tarantella status Command

Syntax

Description

Examples

The tarantella stop Command

Syntax

Description

Examples

tarantella stop cdm

Syntax

Description

Examples

tarantella stop sgd

Syntax

Description

Examples

tarantella stop webserver

Syntax

Description

Examples

The tarantella tokencache Command

Syntax

Description

Examples

tarantella tokencache delete

Syntax

Description

Examples

tarantella tokencache list

Syntax

Description

Examples

The tarantella tscal Command

Syntax

Description

Examples

tarantella tscal free

Syntax

Description

Examples

tarantella tscal list

Syntax

Description

Examples

tarantella tscal return

Syntax

Description

Examples

The tarantella uninstall Command

Syntax

Description

Examples

The tarantella version Command

Syntax

Description

Examples

The tarantella webserver Command

Syntax

Description

Examples

tarantella webserver add_trusted_user

Syntax

Description

Examples

tarantella webserver delete_trusted_user

Syntax

Description

Examples

tarantella webserver list_trusted_users

Syntax

Description

Examples

The tarantella webtopsession Command

Syntax

Description

Examples

tarantella webtopsession list

Syntax

Description

Examples

tarantella webtopsession logout

Syntax

Description

Examples

E.  Login Scripts

F.  Third-Party Legal Notices

Glossary

Index

The tarantella security Command

Controls SGD security services and manages server certificates.

Syntax

tarantella security certinfo | certrequest | certuse | customca |
decryptkey | disable | enable | fingerprint | peerca | selfsign |
start | stop

Description

The following table shows the available subcommands for this command.

Subcommand
Description
More Information
certinfo
Displays information about an SSL certificate or Certificate Signing Request (CSR), and optionally checks whether a specified private key matches the public key contained in a particular SSL certificate.
certrequest
Creates a CSR and a corresponding key pair, which you use to obtain an SSL certificate for use with SGD security services.
certuse
Installs an SSL certificate, or specifies the location of an installed certificate, for use with SGD security services.
customca
Installs a root certificate for a custom CA for use with SGD security services.
decryptkey
Decrypts an encrypted private key so that you can use it with SGD.
disable
If an SGD server has been secured using the tarantella security enable command, restores the security settings to their previous state.
enable
Makes an SGD server secure.
fingerprint
Displays the fingerprint of the CA certificate installed on the SGD server.
peerca
Shows, imports, or exports the primary server’s CA certificate used for secure intra-array communication.
selfsign
Generates and installs a self-signed server SSL certificate.
start
Enables secure (SSL) connections. Users who require secure connections are given them.
stop
Disables secure (SSL) connections. Users configured for secure connections are given standard connections instead.

Note - All commands include a --help option. You can use tarantella security subcommand --help to get help on a specific command.


Examples

The following example displays information about a CSR in /tmp/boston.csr.

# tarantella security certinfo --csrfile /tmp/boston.csr

The following example decrypts the key /opt/keys/key1, which is stored in Definite Encoding Rules (DER) format, placing the decrypted key in /opt/keys/key2.

# tarantella security decryptkey \
  --enckey /opt/keys/key1 \
  --deckey /opt/keys/key2 \
  --format DER

tarantella security certinfo

Displays information about an installed SSL certificate (--certfile) or a Certificate Signing Request (--csrfile).

Syntax
tarantella security certinfo
                           [ --certfile certfile [ --keyfile keyfile ] ]
                           [ --full ]
tarantella security certinfo --csrfile csrfile [ --full ]
Description

This command can also check whether a specified private key matches the public key in a particular SSL certificate. In other words, the public key can decrypt text encrypted with the private key.

Use the first form of this command without specifying a certfile and keyfile to check the key and SSL certificate installed using the tarantella security certuse command.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing a server SSL certificate. The command displays information about this certificate, including the following:
  • Information about the server and your organization.

  • Alternative DNS names for the server.

  • Credentials of the CA that validated the server SSL certificate.

  • Dates for which the SSL certificate is valid.

If you omit --certfile, the command displays information about the SSL certificate and key installed in the /opt/tarantella/var/tsp directory.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a private key. The command checks whether a private key matches the public key contained in the SSL certificate file.

You must specify the full path to the key file.

--csrfile
Specifies the location of a file containing a CSR. The command displays information about this CSR, including the following:
  • The DNS name, or chosen common name, of the server the CSR is for.

  • Alternative DNS names for the server.

  • Your organization’s name and location.

You must specify the full path to the CSR file.

--full
Displays more detailed information about the specified SSL certificate or CSR, for example, the contents of the public keys they contain.
Examples

The following example displays detailed information about the SSL certificate in the /opt/certs/newyork.cert file.

# tarantella security certinfo \
--certfile /opt/certs/newyork.cert \
--full

The following example displays information about the SSL certificate in /opt/certs/boston.cert, and checks that the private key /opt/keys/boston.key matches the public key contained in that SSL certificate.

# tarantella security certinfo \
--certfile /opt/certs/boston.cert \
--keyfile /opt/keys/boston.key

The following example displays information about the CSR in /tmp/boston.csr.

# tarantella security certinfo \
--csrfile /tmp/boston.csr

tarantella security certrequest

Generates a CSR, and a public and private key pair.

Syntax
tarantella security certrequest --country country
                                --state state
                                --orgname org
                              [ --ouname ou ] 
                              [ --email email ] 
                              [ --locality locality ] 
                              [ --keylength length ]
Description

You send the generated CSR to a supported CA to obtain an SSL certificate for use with SGD security services.

Note the following:

You can use the tarantella security certinfo command to display information about SSL certificates and CSRs.

If you do not specify --ouname, --email or --locality SGD omits that information from the CSR. There are no default values.

The options that can be used for this command are as follows.

Option
Description
--country
Specifies the country where your organization is located. Use ISO 3166 country codes. For example, use US for the United States or DE for Germany.
--state
Specifies the state or province where your organization is located. Do not use abbreviations here. For example, use Massachusetts rather than Mass. or MA.
--orgname
Specifies the official, legal name of your organization.
--ouname
Specifies the name of a organizational unit (OU) within your organization, if required.

If you do not need to specify an OU, you can use this setting to specify a less formal organization name.

--email
Specifies your business email address. This address is used for correspondence between you and the CA you send the CSR to.
--locality
Specifies the city or principality where your organization is located, if needed.
--keylength
Specifies the length of the key pair. The default is 1024.

Note - Make sure you quote any object names containing spaces, for example, "o=Indigo Insurance".


Examples

The following example generates a CSR for Indigo Insurance, located in Massachusetts, with contact Bill Orange.

# tarantella security certrequest \
--country US \
--state MA \
--orgname "Indigo Insurance" \
--email "orange@indigo-insurance.com"

tarantella security certuse

Installs a server SSL certificate, or specifies the location of a previously installed SSL certificate, to be used by SGD security services.

Syntax
tarantella security certuse
tarantella security certuse --certfile cfile [ --keyfile kfile ]
Description

SSL certificates must be Base 64-encoded Privacy Enhanced Mail (PEM) format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If no arguments are specified, this command reads the SSL certificate from standard input and installs it in /opt/tarantella/var/tsp.

After installing an SSL certificate, you must restart SGD using the tarantella restart command.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing the SSL certificate. If no --keyfile argument is specified, SGD assumes that the tarantella security certrequest command was used to generate the private key.

You can use this option as follows:

  • To tell SGD about an SSL certificate you have already installed for use with another product, such as a web server. In this case, SGD makes symbolic links to, not copies of, the SSL certificate file and key file, if specified.

  • To install an SSL certificate received from a CA after generating a CSR using tarantella security certrequest. In this case, SGD installs the SSL certificate in /opt/tarantella/var/tsp for use with SGD security services.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a file containing the private key for the SSL certificate specified by --certfile.

Use this option to tell SGD about a private key you have already. If you used the tarantella security certrequest command to generate a CSR and obtain an SSL certificate, you do not need to use this option.

You must specify the full path to the key file.

Examples

The following command installs an SSL certificate, which is saved in a temporary file /tmp/cert, and uses the private key generated when the tarantella security certrequest command was used to generate the CSR:

# tarantella security certuse < /tmp/cert

The following command installs an SSL certificate, which is stored in /opt/certs/cert, and a private key, which is stored in /opt/keys/key. The tarantella security certrequest command was not used to generate the CSR.

# tarantella security certuse \
--certfile /opt/certs/cert \
--keyfile /opt/keys/key

tarantella security customca

Installs or removes a root certificate for a custom CA for use with SGD security services.

Syntax
tarantella security customca
tarantella security customca --rootfile carootfile | --remove
Description

CA certificates must be Base 64-encoded PEM-format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If no arguments are specified, this command reads the root certificate from standard input.

The following table shows the available options for this command.

Option
Description
--rootfile
Specifies the location of a file containing the CA’s root certificate. Details are copied to /opt/tarantella/var/tsp for use by SGD security services.

You must specify the full path to the root certificate file.

--remove
Removes any custom CA’s root certificate currently installed for use with SGD security services.

This command also imports the CA certificate into the CA certificate truststore for the SGD server. This is the /opt/tarantella/bin/jre/lib/security/cacerts file.

Examples

The following example installs a CA’s root certificate from the file/tmp/rootcert, which you can then delete.

# tarantella security customca --rootfile /tmp/rootcert

tarantella security decryptkey

Decrypts an encrypted private key so that you can use it with SGD. This enables you to use an SSL certificate that you are already using with another product such as a web server, rather than obtaining a separate SSL certificate for use exclusively with SGD.

Syntax
tarantella security decryptkey --enckey enckeyfile
                               --deckey deckeyfile
                             [ --format PEM|DER ]
Description

The following table shows the available options for this command.

Option
Description
--enckey
Specifies the location of the encrypted private key that you want to decrypt. Only keys encrypted by a product that uses SSLeay or OpenSSL certificate libraries can be decrypted.

You must specify the full path to the encrypted private key file.

--deckey
Specifies a file where the decrypted key is stored.

Note - For security reasons, it is very important to restrict access to private keys, especially when stored in an unencrypted form. Access to private keys by unauthorized users can result in a serious security breach. Store private keys accordingly.


You must specify the full path to the decrypted key file.

--format
Specifies the format the encrypted key is stored in. Defaults to PEM.

Note - You can only decrypt private keys that were originally encrypted by a product that uses SSLeay or OpenSSL certificate libraries.


See the tarantella security certuse command for information about how to share server SSL certificates in this way.

Examples

The following example decrypts the key /opt/keys/key1, which is stored in DER format, placing the decrypted key in /opt/keys/key2.

# tarantella security decryptkey \
--enckey /opt/keys/key1 \
--deckey /opt/keys/key2 \
--format DER

tarantella security disable

If an SGD server has been secured using the tarantella security enable command, this command restores the security settings to their previous state.

Syntax
tarantella security disable
Description

Use this command to disable security services for an SGD server.

The following limitations apply for this command:

The command restores the security settings of an SGD server to their previous non-secure state. Any server SSL certificates or CA certificates are not removed.

Examples

The following example disables security services for an SGD server.

# tarantella security disable

tarantella security enable

Makes an SGD server secure.

Syntax
tarantella security enable
tarantella security enable --certfile cfile
                         [ --keyfile kfile ]
                         [ --rootfile carootfile ]
                         [ --firewalltraversal on|off ]
Description

Use this command to secure an SGD server.

The following limitations apply for this command:

Use the --certfile option to specify a server SSL certificate to install. Certificates must be Base 64-encoded PEM-format, with a header line including "BEGIN CERTIFICATE", as used by OpenSSL.

If you omit the --certfile option, this command generates and installs a self-signed server SSL certificate. Only use self-signed server SSL certificates for test purposes.

If you use the --certfile option and the --keyfile option together, SGD creates symbolic links to the specified SSL certificate and key files.

Use the --rootfile option to install the CA certificate if the SSL certificate is signed by an unsupported CA. This option also imports the CA certificate into the CA certificate truststore for the SGD server. This is the /opt/tarantella/bin/jre/lib/security/cacerts file.

Use the --firewalltraversal option to enable or disable the SGD server for firewall traversal. SGD servers configured for firewall traversal cannot be used with the SGD Gateway.

If you have attempted to configure security previously, the tarantella security enable command has no effect. The command exits with an error message, indicating that security settings have been modified previously.

Ensure that the SGD server is running before you use this command. You can use the tarantella status command to show the current status of an SGD server.

The following table shows the available options for this command.

Option
Description
--certfile
Specifies the location of a file containing the SSL certificate.

You must specify the full path to the SSL certificate file.

--keyfile
Specifies the location of a file containing the private key for the SSL certificate specified by --certfile.

Use this option to tell SGD about a private key you have already. If you used the tarantella security certrequest command to generate a CSR and obtain an SSL certificate, you do not need to use this option.

You must specify the full path to the key file.

--rootfile
Specifies the location of a file containing the CA’s root certificate. Details are copied to /opt/tarantella/var/tsp for use by SGD security services.

You must specify the full path to the CA root certificate file.

--firewalltraversal
Configures the SGD server for firewall traversal.

If you do not specify this option, firewall traversal is enabled by default.

If you use this command to secure an SGD server, the tarantella security disable command can be used to restore the security settings to their previous state.

Examples

The following example secures the SGD server, installs the specified SSL certificate, and uses the private key generated when the tarantella security certrequest command was used to generate a CSR:

# tarantella security enable \
--certfile /opt/certs/cert

The following example secures the SGD server, and installs the specified SSL certificate and private key. A CA root certificate is also installed. The tarantella security certrequest command was not used to generate a CSR.

# tarantella security enable \
--certfile /opt/certs/cert \
--keyfile /opt/keys/key \
--rootfile /tmp/rootcert

The following example secures the SGD server and installs a self-signed SSL certificate. Firewall traversal is not enabled for the SGD server.

# tarantella security enable \
--firewalltraversal off

tarantella security fingerprint

Displays the fingerprint of the CA certificate installed on the SGD server.

Syntax
tarantella security fingerprint
Description

This command displays the fingerprint of the CA certificate installed using the tarantella security customca command.

If the SSL certificate for an SGD server is signed by a supported CA, you do not need to install a CA certificate.

If a server SSL certificate is not installed on the SGD server, this command shows the fingerprint of the built-in SGD CA certificate

Examples

The following example displays the fingerprint of the CA certificate installed on the SGD server.

# tarantella security fingerprint

tarantella security peerca

Shows, imports or exports the primary server’s CA certificate used for secure intra-array communication.

Syntax
tarantella security peerca [ --show | --import hostname | --export ]
Description

The following table shows the available options for this command.

Option
Description
--show
Displays the primary server’s CA certificate for the array.
--import
Import the CA certificate from the specified server.
--export
Export the CA certificate from this server.
Examples

The following example shows the primary server’s CA certificate for the array.

# tarantella security peerca --show

tarantella security selfsign

Generates and installs a self-signed server SSL certificate.

Syntax
tarantella security selfsign
Description

Generates and installs a self-signed server SSL certificate. You must run the tarantella security certrequest command before using this command.

Only use self-signed server SSL certificates in a test environment because self-signed SSL certificates are not truly secure. While a self-signed server SSL certificate can be used to give users secure connections, users have no guarantee that the server they are connecting to is genuine. Self-signed certificates are valid for 365 days.

Examples

The following example generates and installs a self-signed server SSL certificate.

# tarantella security selfsign

tarantella security start

Starts security services on the SGD server where the command is run. Secure (SSL-based) connections are given to those users configured to require them.

Syntax
tarantella security start
Description

To enable secure connections to a particular SGD server you must already have installed an SSL certificate for that server.

Secure connections are enabled for the SGD server where the command is run.

Ensure that the SGD server is running before you use this command. You can use the tarantella status command to show the current status of an SGD server.

Examples

The following example enables secure connections for the SGD server where the command is run.

# tarantella security start

tarantella security stop

Disables security services on the SGD server where the command is run. Users configured to require secure (SSL-based) connections are given standard connections instead, if available.

Syntax
tarantella security stop [ --keep ]
Description

The following table shows the available options for this command.

Option
Description
--keep
Specifies that any existing secure connections are preserved. If omitted, all secure connections are closed.

If you run the command without any options, secure connections are disabled for the SGD server where the command is run.

Examples

The following example disables security services for the SGD server where the command is run, but preserves any existing secure connections.

# tarantella security stop --keep