oracle secure global desktop chapter 2 using the oracle secure global desktop gateway the sgd...

24
Oracle® Secure Global Desktop Deployment Guide for Release 5.4 March 2018 E88365-01

Upload: vothien

Post on 06-Jun-2019

277 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Oracle® Secure Global Desktop

Deployment Guide for Release 5.4

March 2018E88365-01

Page 2: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Oracle Legal Notices

Copyright © 2018, Oracle and/or its affiliates. All rights reserved.

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protectedby intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce,translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverseengineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report themto us in writing.

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, thenthe following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware,and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal AcquisitionRegulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs,including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to licenseterms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended foruse in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardwarein dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure itssafe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerousapplications.

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and aretrademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks orregistered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

This software or hardware and documentation may provide access to or information about content, products, and services from third parties.Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content,products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will notbe responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as setforth in an applicable agreement between you and Oracle.

Page 3: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

iii

Table of ContentsPreface .............................................................................................................................................. v1 Overview of Oracle Secure Global Desktop ...................................................................................... 1

1.1 Components of SGD ............................................................................................................ 11.2 SGD Network Architecture .................................................................................................... 11.3 Connections Used by SGD ................................................................................................... 3

2 Using the Oracle Secure Global Desktop Gateway ........................................................................... 52.1 Basic Gateway Deployment .................................................................................................. 5

2.1.1 Configuring a Basic Gateway Deployment .................................................................. 62.2 Single Host Gateway Deployment ......................................................................................... 8

2.2.1 Configuring a Single Host Gateway Deployment .......................................................... 92.3 Load-Balanced Gateway Deployment .................................................................................. 10

2.3.1 Configuring a Load-Balanced Gateway Deployment ................................................... 122.4 Cloud Access and Enhanced Security With an SGD Gateway Deployment ............................ 13

2.4.1 Configuring a Secure Gateway Deployment .............................................................. 152.4.2 The User Experience With a Secure Gateway Deployment ........................................ 16

A Installing SGD Components ........................................................................................................... 17A.1 Installing the SGD Server ................................................................................................... 17A.2 Installing the SGD Gateway ................................................................................................ 17A.3 Installing the SGD Enhancement Module ............................................................................ 18

Page 4: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

iv

Page 5: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

v

PrefaceThis manual gives an overview of Oracle Secure Global Desktop (SGD) and provides details of how toconfigure some typical SGD deployments.

Audience

This document is intended for SGD Administrators. It is assumed that readers are familiar with Webtechnologies and have a general understanding of Windows and UNIX platforms.

Related Documents

The documentation for this product is available at:

http://www.oracle.com/technetwork/documentation/sgd-193668.html

Conventions

The following text conventions are used in this document:

Convention Meaning

boldface Boldface type indicates graphical user interface elements associated withan action, or terms defined in text or the glossary.

italic Italic type indicates book titles, emphasis, or placeholder variables forwhich you supply particular values.

monospace Monospace type indicates commands within a paragraph, URLs, code inexamples, text that appears on the screen, or text that you enter.

Documentation Accessibility

For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program websiteathttp://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.

Access to Oracle Support

Oracle customers that have purchased support have access to electronic support through My OracleSupport. For information, visithttp://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Document Revision

Document generated on: 2018-03-23 (revision: 5783)

Page 6: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

vi

Page 7: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

1

Chapter 1 Overview of Oracle Secure Global Desktop

This chapter presents an overview of Oracle Secure Global Desktop (SGD). Software components and thenetwork architecture model of SGD are described.

1.1 Components of SGD

SGD contains several installable software components:

• SGD server. The main SGD component, which installed on hosts. The SGD server provides the mainfunctionality of SGD.

• SGD Enhancement Module. An optional component installed on application servers. The EnhancementModule provides additional functionality for SGD, for example to enable users to access the drives ontheir client device.

• SGD Client. An optional component that can be installed on client devices, to enable users to connect toan SGD server.

As an alternative to installing the SGD Client, users can log in to SGD through an HTML5 web page. InSGD, this is known as using the HTML5 Client.

• SGD Gateway. An optional component that is installed on hosts. The Gateway provides proxy serverand load balancing functionality for an array of SGD servers.

1.2 SGD Network Architecture

SGD is built around a three-tier network architecture model, consisting of the following tiers:

• Client devices

• SGD servers and Gateways

• Application servers

Different tiers can reside on the same host. For example, a single Linux platform host can act as both anSGD server and an application server.

Figure 1.1, “SGD Network Architecture” shows the three-tier network architecture model used by SGD.

Page 8: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Client Devices

2

Figure 1.1 SGD Network Architecture

Client Devices

The first tier contains client devices. A client device is a computer or tablet that can communicate with SGDusing a browser.

The browser on the client device connects to an SGD server on the second tier and displays the SGDworkspace to users.

Page 9: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

SGD Servers

3

The client device communicates with SGD servers on the second tier and displays the applications thatusers are running.

If the SGD Client is installed on the client device, the Adaptive Internet Protocol (AIP) ensures optimalnetwork usage between the first and second tiers.

SGD Servers

The second tier contains SGD servers, which act as a link between the first and third tiers.

The SGD Servers tier may contain a single SGD server, or several SGD servers configured to form anarray.

For enhanced security, one or more SGD Gateways may be deployed in front of an SGD array in ademilitarized zone (DMZ).

An SGD server does the following:

• Authenticates users when they log in to SGD

• Negotiates with application servers to authenticate users when they run applications

• Communicates with the client device, to display applications

• Keeps track of running applications even after users have logged out, so that they can resume them later

Application Servers

The third tier contains application servers that run the applications and desktop sessions for an SGD user.

When a user clicks a link on their workspace, SGD starts the application on an appropriate applicationserver. Output from the application is redirected by the SGD server from the application server to the clientdevice.

The Application Servers tier can contain conventional UNIX or Linux platform application servers andWindows application servers.

Also supported in this tier are virtual machine hypervisor hosts such as Oracle VM and Oracle VMVirtualBox, and cloud services such as Oracle Cloud Infrastructure Compute Classic.

1.3 Connections Used by SGD

An SGD installation is secure by default. Client devices connect to SGD using HTTPS, AIP, andWebsocket data connections that are secured using Transport Layer Security (TLS).

Figure 1.2, “SGD Connections and Ports” shows some of the connections and ports used by SGD.

This figure shows how an SGD Client connection uses an AIP data connection and an HTML5 Clientconnection uses a Websocket data connection.

Page 10: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Connections Used by SGD

4

Figure 1.2 SGD Connections and Ports

Note

See Firewalls in the Oracle Secure Global Desktop Administration Guide for moredetailed information on the ports used in an SGD deployment.

Page 11: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

5

Chapter 2 Using the Oracle Secure Global Desktop Gateway

The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gatewayprovides single port access to the SGD array, supports IPv6 connections, and manages load balancing ofconnections for the SGD servers in the array.

The Gateway can also provide enhanced security when deployed in front of an SGD array in ademilitarized zone (DMZ). This enables the SGD array to be located on the internal network of anorganization.

This chapter describes some typical SGD deployments that use the SGD Gateway. The followingdeployment examples are described:

• Basic Gateway deployment. Uses a single SGD Gateway to provide secure access to an SGD array.

• Single-host Gateway deployment. A single SGD Gateway and a single SGD server are installed onthe same host. This is sometimes called colocation.

• Load-balanced Gateway deployment. Uses multiple SGD Gateways and a load balancer to provideredundancy and scalability.

• Secure access to a cloud service. Uses the enhanced security features of an SGD Gatewaydeployment to integrate with a cloud service, such as Oracle Cloud Infrastructure.

Note

For more information on installing and configuring the SGD Gateway, see theOracle Secure Global Desktop Gateway Administration Guide.

2.1 Basic Gateway Deployment

The basic Gateway deployment uses a single SGD Gateway with an SGD array consisting of one or moreSGD servers. See Figure 2.1, “Network Diagram for a Basic Gateway Deployment”.

Page 12: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Configuring a Basic Gateway Deployment

6

Figure 2.1 Network Diagram for a Basic Gateway Deployment

The advantages of a basic Gateway deployment are as follows:

• Secure single port access. Access is by a single port, TCP port 443. You only need to open this port inyour firewall.

• IPv6 support. IPv6 support is available by default for this deployment.

• Load balancing. The Gateway manages load balancing of HTTP connections for the SGD servers inthe array.

• Enhanced security. The Gateway is deployed in front of an SGD array in a demilitarized zone (DMZ).

• Scalability. You can add extra SGD servers or Gateways to the deployment.

2.1.1 Configuring a Basic Gateway Deployment

Note

The connections between an SGD Gateway and the SGD servers in the array usesecurity certificates for mutual authorization. Configuring these connections involvesinstallation of certificates on Gateway and SGD server hosts.

Use the following steps to configure a basic Gateway deployment.

Page 13: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Configuring a Basic Gateway Deployment

7

1. Install the SGD software on the hosts.

a. Install the main SGD component on SGD server hosts. See Section A.1, “Installing the SGDServer”.

b. Install the SGD Gateway software on Gateway hosts. See Section A.2, “Installing the SGDGateway”.

2. Install security certificates for the SGD servers on the SGD Gateway.

Repeat the following steps for each SGD server in the array.

a. Copy the following security certificates from the SGD server to the SGD Gateway.

• CA certificate. This certificate is at /opt/tarantella/var/info/certs/PeerCAcert.pemon the SGD host.

• SSL certificate. This certificate is at /opt/tarantella/var/tsp/cert.pem on the SGDhost.

b. Use the gateway server add command to import the certificates into the SGD Gatewaykeystore. For example:

# /opt/SUNWsgdg/bin/gateway server add --server sgd-server1 \--certfile /opt/SUNWsgdg/proxy/etc/PeerCAcert.pem --url https://sgd1.example.com \--ssl-certfile /opt/SUNWsgdg/proxy/etc/cert.pem

See gateway server add in the Oracle Secure Global Desktop Gateway Administration Guide.

c. Restart the SGD Gateway.

# /opt/SUNWsgdg/bin/gateway restart

3. Install the SGD Gateway certificate on the SGD array.

a. Export the SGD Gateway certificate from the SGD Gateway keystore. For example:

# /opt/SUNWsgdg/bin/gateway cert export --certfile gateway1.pem

b. Copy the SGD Gateway certificate to the /opt/tarantella/var/tsp directory on the primarySGD server in the array.

After copying, change the file permissions and ownership for the certificate. For example:

# chmod 600 /opt/tarantella/var/tsp/gateway1.pem# chown ttasys:ttaserv /opt/tarantella/var/tsp/gateway1.pem

c. Register the SGD Gateway with the SGD array.

On the primary SGD server, use the tarantella gateway add command to import the SGDGateway certificate. For example:

# tarantella gateway add --name sgd-gateway1 \--certfile /opt/tarantella/var/tsp/gateway1.pem

See tarantella gateway add in the Oracle Secure Global Desktop Gateway Administration Guide.

4. Configure which SGD Client connections can use the SGD Gateway.

On the primary SGD server, set the --security-gateway global attribute.

Page 14: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Single Host Gateway Deployment

8

For example, to specify that all SGD Client connections are routed through TCP port 443 of a singleSGD Gateway gateway1.example.com:

$ tarantella config edit --security-gateway "*:sgdg:gateway1.example.com:443"

5. Log in to SGD.

a. Using a browser, go to the URL for the Gateway. For example, https://gateway1.example.com.

The SGD login page is displayed.

b. Log in using the default SGD Administrator credentials.

Enter Administrator for the Username and the superuser (root) password for the Password.

Your SGD workspace is displayed.

6. Log out of SGD.

Click the Logout button on your workspace and click OK when prompted for confirmation.

2.2 Single Host Gateway Deployment

For a single host Gateway deployment, the SGD Gateway and a single SGD server are installed on thesame host. See Figure 2.2, “Network Diagram for a Single Host Gateway Deployment”.

Figure 2.2 Network Diagram for a Single Host Gateway Deployment

The advantages of a single host Gateway deployment are as follows:

• Easy Configuration. You only need to configure a single host.

• Secure single port access. Access is by a single port, TCP port 443. You only need to open this port inyour firewall.

• IPv6 support. IPv6 support is available by default for this deployment.

• Gateway discovery. For this deployment, you can use the discovery feature of SGD to automaticallydiscover and configure the Gateway.

Page 15: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Configuring a Single Host Gateway Deployment

9

Note

In a single host Gateway deployment you cannot use an array with more than oneSGD server, or add other Gateways.

2.2.1 Configuring a Single Host Gateway Deployment

Use the following steps to configure a single host Gateway deployment.

Note

Before you begin, ensure that TCP port 443 is open on the host.

1. Install the SGD software on the host.

a. Install the main SGD component.

Follow the steps in Section A.1, “Installing the SGD Server”.

Ensure that you run the tarantella start command, as instructed by the SGD installationprogram.

b. Install the SGD Gateway software.

Follow the steps in Section A.2, “Installing the SGD Gateway”.

Ensure that you run the gateway setup command, as instructed by the Gateway installationprogram.

2. Stop all running SGD components.

a. Stop the SGD server.

# /opt/tarantella/bin/tarantella stop

b. Stop the SGD Gateway.

# /opt/SUNWsgdg/bin/gateway stop

3. Discover and configure the SGD Gateway.

You use the tarantella discover gateway command to discover and configure an SGDGateway that is installed on the same host as an SGD server.

Run the following command:

# /opt/tarantella/bin/tarantella discover gateway --local

4. Start all SGD components.

a. Start the SGD server.

# /opt/tarantella/bin/tarantella start

b. Start the SGD Gateway.

# /opt/SUNWsgdg/bin/gateway start

5. Log in to SGD.

Page 16: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Load-Balanced Gateway Deployment

10

a. Using a browser, go to the URL for the Gateway. For example, https://gateway1.example.com.

The SGD login page is displayed.

b. Log in using the default SGD Administrator credentials.

Enter Administrator for the Username and the superuser (root) password for the Password.

Your SGD workspace is displayed.

6. Log out of SGD.

Click the Logout button on your workspace and click OK when prompted for confirmation.

2.3 Load-Balanced Gateway Deployment

The load-balanced Gateway deployment uses multiple SGD Gateways and a load balancer as the networkentry point. See Figure 2.3, “Network Diagram for a Load-Balanced Gateway Deployment”.

Page 17: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Load-Balanced Gateway Deployment

11

Figure 2.3 Network Diagram for a Load-Balanced Gateway Deployment

The advantages of a load-balanced Gateway deployment are as follows:

• Secure single port access. Access is by a single port, TCP port 443. You only need to open this port inyour firewall.

• IPv6 support. IPv6 support is available by default for this deployment.

• Load balancing. Connections to the Gateways are handled by a dedicated load balancer device.

• Redundancy. Unavailability of a Gateway or SGD server is handled automatically.

• Scalability. You can add extra SGD servers or Gateways to the deployment.

• Enhanced security. The Gateway is deployed in front of an SGD array in a demilitarized zone (DMZ).

Page 18: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Configuring a Load-Balanced Gateway Deployment

12

2.3.1 Configuring a Load-Balanced Gateway Deployment

Note

The connections between an SGD Gateway and the SGD servers in the array usesecurity certificates for mutual authorization. Configuring these connections involvesinstallation of certificates on Gateway and SGD server hosts.

Use the following steps to configure a load-balanced Gateway deployment.

1. Install the SGD software on the hosts.

a. Install the main SGD component on SGD server hosts. Follow the steps in Section A.1, “Installingthe SGD Server”.

b. Install the SGD Gateway software on Gateway hosts. Follow the steps in Section A.2, “Installing theSGD Gateway”.

2. Configure your load balancer to forward connections to the SGD Gateways.

See your load balancer documentation for details of how to do this.

3. Install security certificates for the SGD servers on each SGD Gateway.

For each Gateway, repeat Step 2 of Section 2.1.1, “Configuring a Basic Gateway Deployment”.

4. Install the SGD Gateway certificates on the SGD array.

For each Gateway, repeat Step 3 of Section 2.1.1, “Configuring a Basic Gateway Deployment”.

5. Configure which SGD Client connections can use the SGD Gateway.

On the primary SGD server, set the --security-gateway global attribute.

For example, to specify that all SGD Client connections are routed through TCP port 443 of an externalload balancer lb.example.com:

$ tarantella config edit --security-gateway "*:sgdg:lb.example.com:443/sgd"

6. Log in to SGD.

a. Using a browser, go to the URL for the load balamcer. For example, https://lb.example.com.

The SGD login page is displayed.

b. Log in using the default SGD Administrator credentials.

Enter Administrator for the Username and the superuser (root) password for the Password.

Your SGD workspace is displayed.

7. Log out of SGD.

Click the Logout button on your workspace and click OK when prompted for confirmation.

Page 19: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Cloud Access and Enhanced Security With an SGD Gateway Deployment

13

2.4 Cloud Access and Enhanced Security With an SGD GatewayDeployment

SGD supports the following features, which enable you to enhance the security of an SGD Gatewaydeployment and integrate with cloud services, such as Oracle Cloud Infrastructure.

• Client certificate authentication. Users authenticate to SGD with a security certificate installed on abrowser or smart card on the client device.

With client certificate authentication, users do not need to enter a username or password when they login to SGD.

See Using Client Certificates With the SGD Gateway in the Oracle Secure Global Desktop GatewayAdministration Guide.

• Application authentication using SSH keys. Users authenticate to an application server or cloudservice with an SSH key installed on their client device.

With SSH keys, users do not need to enter a username and password when starting an application ontheir workspace.

See Using SSH Keys for Application Authentication in the Oracle Secure Global Desktop AdministrationGuide.

Figure 2.4, “Secure Gateway Deployment, Showing Locations of Client Certificates and SSH Keys” showsa secure Gateway deployment connecting to a cloud service.

Page 20: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Cloud Access and Enhanced Security With an SGD Gateway Deployment

14

Figure 2.4 Secure Gateway Deployment, Showing Locations of Client Certificates and SSH Keys

Page 21: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Configuring a Secure Gateway Deployment

15

2.4.1 Configuring a Secure Gateway Deployment

1. Configure a basic Gateway deployment, as described in Section 2.1, “Basic Gateway Deployment”.

2. Configure client certificate authentication.

a. Generate a client certificate on the client device.

• Install the client certificate on the browser or smart card on the client device.

• (Optional) Import the client certificate into the SGD Gateway client keystore.

You do not need to do this step if the client certificate is signed by a trusted Certificate Authority(CA).

Use the gateway clientcert command to import the certificate. For example:

# /opt/SUNWsgdg/bin/gateway clientcert import --certfile mycert.pem --alias mycert

b. Configure the SGD Gateway to use client certificate authentication.

# /opt/SUNWsgdg/bin/gateway config edit --services-clientcerts required

Restart the SGD Gateway.

# /opt/SUNWsgdg/bin/gateway restart

c. Enable third-party authentication for the SGD array. For example:

# tarantella config edit --login-thirdparty 1

3. Configure SSH keys for application authentication.

a. Generate an SSH key pair on the client device.

b. Install the SSH keys.

• Add the public key of the SSH key pair to the cloud service.

You can attach the public key to an instance when you create the instance.

• The private key of the SSH key pair remains on the client device.

Note

Private keys never leave the client device and are not sent to the SGDserver or cloud service.

4. Configure SGD to enable the cloud administrator to run an application or desktop on a cloud instance.

a. Create a user profile object for the cloud administrator.

b. Create an application object to represent the application that you want to run on the cloud service.

To display a desktop session, you can modify the My Desktop application.

c. Assign the application to the user profile object for the cloud administrator.

d. Create an application server object to represent the cloud instance.

Page 22: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

The User Experience With a Secure Gateway Deployment

16

• For Oracle VM and Oracle VM VirtualBox services, use a hypervisor host object.

• For other cloud services, use a dynamic application server object, such as a User-defined SGDbroker. This broker lists the cloud instances that are assigned to an application object, and alsoenables users to specify the name of a cloud instance.

e. Assign the application server to the application object.

2.4.2 The User Experience With a Secure Gateway Deployment

The user experience is quicker and more secure, compared to an SGD deployment where usernames andpasswords must be entered.

1. Logging in to SGD.

The user goes to the URL for the SGD server. For example, https://sgd.example.com/sgd,where sgd.example.com is the name of the SGD server.

• The client certificate in the user's browser is used to authenticate to SGD.

• The trusted certificate authorities (CAs) in the Gateway's client keystore are used to validate theconnection.

• The user does not have to enter their SGD username and password.

• The SGD login dialog box is not displayed.

2. Starting an application.

The user clicks an application link on the workspace.

• The private key on the client device and the public key on the cloud service are used for applicationauthentication.

• The user does not have to enter a username and password to start the application.

• At the first start of the application, the user is prompted for the location of the private key on the clientdevice.

• User prompts for the private key location are not shown for subsequent instances of the application.

If the private key is passphrase-protected, a prompt to enter the passphrase is displayed whenstarting the application.

Page 23: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

17

Appendix A Installing SGD ComponentsThis appendix includes instructions on installing the following SGD components:

• SGD server

• SGD Gateway

• SGD Enhancement Module

A.1 Installing the SGD ServerThe SGD server is installed when you install the main SGD software component.

The following procedure describes how to install the SGD software on an Oracle Linux host.

For more detailed instructions, see the Oracle Secure Global Desktop Installation Guide.

Note

Before you begin, check the following:

• (Optional) You have access to your SSL certificate and the private key and CAcertificate, if needed. The certificates must be in PEM format.

• You know the DNS name for the SGD host. In a network containing a firewall,use the DNS name that the host is known as inside the firewall.

1. Obtain the SGD software.

Download the software from the Oracle Software Delivery Cloud and save the software package file toa temporary directory on the host.

2. Log in as superuser (root) on the host.

3. Install SGD.

# yum install --nogpgcheck tta-version.x86_64.rpm

SGD is installed in the /opt/tarantella directory on the host.

4. Start the SGD server.

# /opt/tarantella/bin/tarantella start

The first time you start the SGD server, a list of recommended configuration settings that you canaccept or change is shown. For example, details of the SSL certificate used to secure connections tothe SGD server and the DNS name of the SGD server.

Accept or change the recommended configuration settings. The default settings should be acceptable,in most cases.

The software is installed and configured using the specified settings.

A.2 Installing the SGD GatewayThe following procedure describes how to install the SGD Gateway software on an Oracle Linux host.

Page 24: Oracle Secure Global Desktop Chapter 2 Using the Oracle Secure Global Desktop Gateway The SGD Gateway is a proxy server designed to be deployed in front of an SGD array. The Gateway

Installing the SGD Enhancement Module

18

For more detailed instructions, see the Oracle Secure Global Desktop Gateway Administration Guide.

1. Save the SGD Gateway package to a temporary directory on the host.

You can download the package from an SGD web server at https://server.example.com, whereserver.example.com is the name of the SGD server. When the SGD web server Welcome page isdisplayed, click Install the Oracle Secure Global Desktop Gateway.

The package file for Linux platforms is SUNWsgdg-version.x86_64.rpm, where version is theSGD Gateway version number.

2. Log in as superuser (root) on the host.

3. Install the SGD Gateway.

# yum install --nogpgcheck SUNWsgdg-version.x86_64.rpm

The SGD Gateway is installed in the /opt/SUNWsgdg directory.

4. Run the SGD Gateway setup program.

# /opt/SUNWsgdg/bin/gateway setup

The SGD Gateway setup program presents the following settings that you can accept or change:

• SGD Gateway port settings. The interface and port used by the SGD Gateway for incomingconnections. By default, the SGD Gateway listens on port 443 on all interfaces.

• Network entry point. The DNS name and the port that client devices use to connect to the SGDGateway.

This is not always the same as the address of the SGD Gateway. Depending on the configuration ofyour network, this can be the address of a load balancer or other external device.

A.3 Installing the SGD Enhancement Module

The SGD Enhancement Module is an optional software component that can be installed on applicationservers.

Instructions for installing the SGD Enhancement Module are in the Oracle Secure Global DesktopEnhancement Module Administration Guide.