Administrator Guide
5 Click Add Firmware File.
The Add File dialog box is displayed.
6 Browse and select the downloaded rmware le. Enter an appropriate description.
7 Click Upload.
The ThinOS Lite rmware le is uploaded, and the rmware le is listed on the Apps & Data - ThinOS Lite OS Image Repository
page.
8 Select the check box that corresponds to your ThinOS Lite rmware le.
9 On the Groups & Congs page, select a custom group, and click Edit Policies > ThinOS.
The Select ThinOS Lite Conguration Mode screen is displayed.
10 Click Advanced Conguration.
11 In the Device Conguration pane, click Firmware Upgrade, and then click Congure this item.
12 From the Platform type drop-down list, select your thin client model.
13 From the Firmware to auto deploy drop-down list, select the rmware le that corresponds to your thin client model.
14 Click Save & Publish.
The thin client restarts, and the rmware version is upgraded.
System conguration and deployment
• ThinOS BIOS policy can be congured using Wyse Management Suite Console, Wyse Management Suite group INI, Wyse Management
Suite advanced settings and FTP INI. Dell recommends that you use any one of the methods to congure the BIOS policy. Setting the
BIOS policy simultaneously using dierent methods may cause a policy mismatch, and the device reboots repeatedly. This reboot loop
issue is observed when you select the reboot immediately option in the BIOS policy settings section on the Wyse Management Suite
console.
• All the installed packages are deleted when you update the ThinOS Lite version between major releases—2.5 to 2.6—using FTP, WDM,
or Wyse Management Suite.
Solution for updating rmware using FTP and WDM—Ensure that you have set the PKG install parameters in the WNOS.ini, and the
pkg les are uploaded in the directory. After the device reboot, the packages are re-installed automatically.
Solution for updating rmware using Wyse Management Suite—Wyse Management Suite App policy works only once after the policy is
created. The deleted package cannot be reinstalled using the same policy. Dell recommends that you create a new App policy to install
the package after the rmware update is complete.
• WDM vulnerability is xed in this release. You must congure either the DHCP or the DNS option/record of the WDM server ngerprint
to automatically fetch and validate the ngerprint before checking in to the WDM server. However, there is no impact to the ThinOS
Lite device functionality if you do not to congure the ngerprint validation environment. For more information about how to set up
ngerprint using WDM, see the Dell Wyse ThinOS Lite Version 2.6 Administrator's Guide at www.dell.com/support.
How to set up ngerprint using Wyse Device Manager
To set up your ngerprint using WDM, do the following:
1 Export the WDM server certicate from the WDM server that you want to access.
2 Extract the ngerprint value from the WDM certicate in the required format.
You must use a system with OpenSSL installed. OpenSSL can be used to extract the ngerprint in required format from the WDM
certicate itself.
The ngerprint is generated from the following command:
openssl x509 -in <your certificate name>.crt -pubkey -noout | openssl pkey -pubin -outform
der | openssl dgst -sha256 -binary | openssl enc -base64
NOTE
: If cert.crt is in DER format instead of the PEM format, you must add -inform to the rst command. The
certicate supports SHA256 in base64 encoded format.
3 Congure either the DHCP option or the DNS TXT record.
• If you want to use the DHCP option, congure the following option tags dened in the DHCP server:
Before working on ThinOS Lite
11