Adjoin sh download
Shadow sessions. Browser content redirection. Monitor Linux sessions in Citrix Director. Monitor service daemon. Secure user sessions using TLS. Secure user sessions using DTLS. Text-based session watermark. Support for smart cards. Double-hop single sign-on authentication. Configure unauthenticated sessions. Create a Python3 virtual environment. Configure Xauthority.
Configure Federated Authentication Service. Document History. Aviso legal. For fresh installations, we recommend you use easy install for a quick installation. Easy install saves time and labor and is less error-prone than the manual installation detailed in this article. Ensure that the network is connected and configured correctly. If you are using a Ubuntu Remove any other references to hostname-fqdn or hostname from other entries in the file.
Therefore, the host name must not exceed 15 characters. Use a—z, A—Z, 0—9, and hyphen - characters only. Do not start a host name with a number and do not end with a hyphen. This rule also applies to Delivery Controller host names. If you cannot resolve the FQDN or ping either of these machines, review the steps before proceeding.
Maintaining accurate clock synchronization between the VDAs, Delivery Controllers and domain controllers is crucial. Hosting the Linux VDA as a virtual machine can cause clock skew problems. For this reason, synchronizing time with a remote time service is preferred.
In a typical deployment, synchronize time from the local domain controllers and not directly from public NTP pool servers. Add a server entry for each Active Directory domain controller in the domain. Some changes are required when running the Linux VDA as a virtual machine on a supported hypervisor.
Make the following changes according to the hypervisor platform in use. No changes are required if you are running the Linux machine on bare metal hardware. To avoid the clock becoming out of sync with other servers, ensure that the system clock within each Linux guest is synchronized with the NTP.
This case requires disabling host time synchronization. No changes are required in HVM mode. To ensure that the system clock remains accurate, enable this feature alongside NTP services. Hyper-V time synchronization can coexist and supplement NTP time synchronization. When the VMware Time Synchronization feature is enabled, within each paravirtualized Linux VM you experience issues with the NTP and the hypervisor, both of which try to synchronize the system clock.
Session launches might fail when the same user name is used for the local account in the Linux VDA and the account in AD. Configure Kerberos based on your AD infrastructure.
The following settings are meant for the single-domain, single-forest model. The domain-dns-name parameter in this context is the DNS domain name, such as example.
Your domain controller must be reachable and you must have an Active Directory user account with permissions to add computers to the domain:. Where REALM is the Kerberos realm name in uppercase, and user is a domain user with permissions to add computers to the domain. The winbind daemon stays running only if the machine is joined to a domain. Run the net ads command of Samba to verify that the machine is joined to a domain:. To verify that Kerberos is configured correctly for use with the Linux VDA, verify that the system keytab file has been created and contains valid keys:.
This command displays the list of keys available for the various combinations of principal names and cipher suites. Run the Kerberos kinit command to authenticate the machine with the domain controller using these keys:. The machine and realm names must be specified in uppercase. In some environments, the DNS domain name is different from the Kerberos realm name. Ensure that the realm name is used. If this command is successful, no output is displayed. Use the wbinfo tool to verify that domain users can authenticate with the domain:.
The domain specified here is the AD domain name, not the Kerberos realm name. This command returns a message indicating success or failure. Verify that a corresponding Kerberos credential cache file was created for the uid returned by the id -u command:. A similar test can be performed by logging on to the Gnome or KDE console directly.
If you succeed in user authentication but cannot show your desktop when logging on with a domain account, restart the machine and then try again. Assume that you have installed and configured the Quest software on the Active Directory domain controllers, and have been granted administrative privileges to create computer objects in Active Directory.
These instructions are equivalent for setting up domain users for logon using the console, RDP, SSH, or any other remoting protocol. This enforcement interferes with the Unix domain socket IPC mechanisms used by Quest, and prevents domain users from logging on.
Could not load tags. Latest commit. Git stats 36 commits. Failed to load latest commit information. View code. It automates the following steps: Auto-detect Active Directory domain controller. Creates a machine account a. Git stats 12 commits. Failed to load latest commit information. View code.
The following platforms are supported: Red Hat Enterprise Linux 7. You need to make sure that the AD user has following two permissions at least: Delegate Join a computer to the domain in Active Directory Users and Computers. Delegate 'Join comupters to the zone' in Centrify Access Manager. Specifies as a comma separated list. Centrify Infrastructure Services agent parameters The following parameters are for joining to Active Directory using the Centrify Infrastructure Services agent. Be sure to save the login.
View license. Releases No releases published. Packages 0 No packages published. Contributors 4. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Features to enable for the agent.
0コメント