Administrator Guide
Table Of Contents
- Dell Wyse ThinOS Version 8.6 Administrator’s Guide
- Contents
- Introduction
- About this guide
- What is new in ThinOS 8.6_807
- What is new in ThinOS 8.6_710
- What is new in ThinOS 8.6_606
- What is new in ThinOS 8.6_511
- What is new in ThinOS 8.6_412
- What is new in ThinOS 8.6_303
- What is new in ThinOS 8.6_206
- What is new in ThinOS 8.6_027
- What is new in ThinOS 8.6_024
- What is new in ThinOS 8.6_019
- Before working on ThinOS
- Getting started
- End User License Agreement
- Configuring ThinOS using the First Boot Wizard
- Connecting to a remote server
- Using your desktop
- Configuring thin client settings and connection settings
- Connecting to a printer
- Connecting to a monitor
- Locking the thin client
- Signing off and shutting down
- Battery information
- Sleep mode
- Additional getting started details
- Classic desktop features
- Login dialog box features
- Word wrap feature
- Accessing system information
- ENERGY STAR compliance
- IPv6 certification
- Global Connection settings
- Configuring connectivity
- Configuring the network settings
- Configuring the remote connections
- Configuring the central configurations
- Configuring the VPN Manager
- Configuring the connection brokers
- Configuring Citrix
- Configuring the Citrix broker connection
- Citrix Receiver feature matrix
- Citrix HDX RealTime Multimedia Engine or RealTime Optimization Pack
- Cisco Jabber Softphone for VDI
- Using Citrix ADC
- Citrix Cloud services
- Citrix icon refresh
- Using multiple audio in Citrix session
- Configuring ICA connections
- Support for multi-monitors in Citrix session
- ICA Self Service Password Reset
- QUMU or ICA Multimedia URL Redirection
- HTML5 Video Redirection
- ICA SuperCodec
- Anonymous logon
- Configuring the Citrix UPD printer
- Configuring VMware
- Configuring the VMware broker connection
- VMware Horizon Client feature matrix
- Using VMware Horizon View broker and desktop
- Enable username hint for smart card login
- Supporting VMware Real Time Audio-Video
- VMware Blast
- VMware Horizon Virtualization Pack for Skype for Business
- Using multi-monitors in PCoIP session
- Using Multi-monitors in VMware Blast session
- Blast Virtual Printing
- Enable hardware cursor in Blast session
- Enable relative mouse feature
- USB device splitting in Blast session
- Supporting Teradici SDK
- Configuring PCoIP connections using Teradici Remote Workstation card
- Customize PCoIP login window and icons
- Configuring Microsoft Remote Desktop
- Configuring Dell vWorkspace
- Configuring Amazon Web Services or WorkSpaces
- Configuring Teradici Cloud Access
- Configuring Citrix
- Configuring local settings
- Local Settings Menu
- Configuring the system preferences
- Configuring the display settings
- Configuring the peripherals settings
- Configuring the keyboard settings
- Configuring the mouse settings
- Configuring the audio settings
- Configuring the serial settings
- Configuring the camera settings
- Configuring the touch screen settings
- Configure the touch screen settings for VDI sessions
- Configuring the Bluetooth settings
- USB support
- Support for USB Type-C
- Configuring the printer settings
- Reset features
- Local Settings Menu
- TCX Suite
- Trusted Platform Module version 2.0
- Performing diagnostics
- BIOS management on ThinOS
- Security
- Troubleshooting
- Examples of common printing configurations
- Important notes
- Frequently asked questions
Trusted Platform Module version 2.0
Wyse 5070 thin client supports disk encryption and decryption through Trusted Platform Module (TPM) version 2.0.
● Measured boot—SHA1 (Secure Hash Algorithm 1) is used to produce a hash value for ThinOS image, and extend the
integrity measurement into Platform Configuration Registers (PCR) inside TPM—TPM_PCR16. This is used to generate
disk encryption or decryption key.
● Disk encryption/decryption key
○ Disk C with user data and Disk B with system libraries are encrypted.
○ Prestored KeyStub and TPM_PCR16 are used to generate disk encryption and decryption keys through TPM. The
actual implementation is based on TPM-unseal operation.
○ If the key is modified, the key fails to verify the specific disk partition. The disk partition is formatted to make the
partition valid. The following screenshot displays the event log:
Figure 37. Event log tab
Figure 38. Event log tab
○ After the disk partition is formatted, some user configurations, such as display settings, user certificates, wireless
settings—except the first SSID, as it is saved in NVRAM—cookie, and mirror file server data, are lost.
9
188 Trusted Platform Module version 2.0