Sun Secure Global Desktop Software 4
Total Page:16
File Type:pdf, Size:1020Kb
Sun Secure Global Desktop Software 4.3 Release Notes These release notes contain important information about Sun Secure Global Desktop Software version 4.3, including system requirements, new features and enhancements, and known limitations and problems. Read this document before you install and use this release. Part Number: 819-6253 Revision History Version Description January Microsoft Windows Vista is now supported as a client platform. Additional known 2007 issues. December Additional known issue with SecurID authentication. 2006 November Added details of smart card support, additional known bugs and corrections to the 2006 documentation. November Additional known bugs and list of bug fixes. 2006 October Additional known bugs and updated support for Certificate Authorities. 2006 September First released version of release notes. 2006 June 2006 Beta release. Contents System Requirements New Features in This Release Changes in This Release Fixes in This Release End-Of-Support Statements Known Bugs and Issues Documentation Issues System Requirements This section describes the system requirements for Sun Secure Global Desktop Software 4.3. It has the following sections: Hardware Requirements Installation Platforms Operating System Modifications Web Server Requirements Network Requirements Supported Protocols Security Support Proxy Server Support Supported Authentication Mechanisms Supported Applications Requirements for the Sun Secure Global Desktop Enhancement Module Printing Support Smart Card Support Platform Support for the Secure Global Desktop Client Platform Support for the Classic Webtop Hardware Requirements Use the following hardware requirements as a guide and not as an exact sizing tool. For detailed help with hardware requirements, contact a Sun Secure Global Desktop Software sales office. The requirements for a server hosting Secure Global Desktop can be calculated based on the total of the following: What is needed to install and run Secure Global Desktop. What is needed for each user who logs in to Secure Global Desktop on the server and runs applications. The following are the requirements for installing and running Secure Global Desktop: 256MB free disk space, plus another 300MB at install time 256MB RAM 1GHz processor Network Interface Card (NIC) Note This is in addition to what is required for the operating system itself and assumes the server will be used only for Secure Global Desktop. The following are the requirements to support users who log in to Secure Global Desktop and run applications. The actual CPU and memory requirements can vary significantly depending on the applications used: 20MB for each user. On SPARC® platforms, 15MHz for each user. On x86 platforms, 20MHz for each user. Installation Platforms The following are the supported installation platforms for Sun Secure Global Desktop Software 4.3: Operating System Supported Versions Solaris™ Operating System (Solaris OS) on SPARC platforms 8, 9, 10 Solaris OS on x86 platforms 10 Red Hat Enterprise Linux (Intel x86 32-bit) 3, 4 Fedora Linux (Intel x86 32-bit) Core 5 SUSE Linux Enterprise Server (Intel x86 32-bit) 9, 10 You may have to make some operating system modifications. Operating System Modifications You must make the following operating system modifications to the host before you install Secure Global Desktop. Without these modifications the software may not install properly or operate correctly. Linux Kernel 2.4+ (all distributions) Make sure you allocate swap that is at least twice the size of physical memory. So if you have 1GB RAM, increase your swap to 2GB. Fedora Core 5 Secure Global Desktop will not install if the libXp.so.6 library is not available on the host. This library was deprecated in Fedora Core 3. However the file is still available in the libXp package. The libXm.so.3 library is required to support 5250 and 3270 applications. The library is available in the OpenMotif 2.2 package. The absence of this file no longer causes the installation to fail. SUSE Linux Enterprise Server 9 with Service Pack 2 Secure Global Desktop will not install if the libgdbm.so.2 library is not available on the host. SUSE Linux Enterprise Server 9 with Service Pack 2 contains version 3 of the library by default. You must obtain and install version 2 of the library before installing Secure Global Desktop. SUSE Linux Enterprise Server 10 Secure Global Desktop will not install if the libgdbm.so.2 and libexpat.so.0 libraries are not available on the host. SUSE Linux Enterprise Server 10 contains version 3 and version 1 of these libraries by default. You must obtain and install the required version of these libraries before installing Secure Global Desktop. Solaris 8+ OS on SPARC Platforms Solaris OS comes in the following distributions: Core, End User, Development and Entire Distribution. You must install at least the End User distribution to get the necessary libraries required by Secure Global Desktop. If you do not, Secure Global Desktop will not install. You should install the appropriate patches for your Solaris OS version. These are available from the SunSolve Online. Note The patches recommended by Sun Microsystems for Solaris OS may not apply to Siemens Solaris-based systems. For information about which patches to install on these systems, refer to your Siemens contact or the Siemens web site. Secure Global Desktop requires the /usr/lib/libsendfile.so library. If this library is missing, Secure Global Desktop will not install. This library may be included with your SUNWcsl (Core Solaris Libraries) package or you may have to apply patch 111297-01 (available from the SunSolve Online) to get it. Solaris 8 OS /dev/random Pseudo Device You will not be able to log in to Secure Global Desktop on Solaris 8 OS platforms if the host does not have the /dev/random pseudo device. You must install patch 112438-03 to obtain this device. Using Solaris OS as an Application Server Each emulator session requires one pseudo-tty. For example, 50 users running 10 applications each on one application server requires 500 pseudo-ttys. To set the number of pseudo-ttys, first back up your /etc/system file. Then edit the file and add the following line: set pt_cnt=limit where limit is the number of pseudo-ttys you require. To create the new devices, reboot with the -r option. See SunSolve Online for advice on increasing pseudo-ttys. Web Server Requirements A web server is an essential part of a working Secure Global Desktop installation. Secure Global Desktop includes a web server, the Secure Global Desktop Web Server, that is pre-configured for use with Secure Global Desktop. The Secure Global Desktop Web Server consists of the following components: Component Version Apache HTTP Server 1.3.36 mod_ssl 2.8.27 OpenSSL 0.9.8d mod_jk 1.2.15 Apache Jakarta Tomcat 5.0.28 Apache Axis 1.2 The Secure Global Desktop Web Server is installed when you install Secure Global Desktop. However, you can use your own web server with Secure Global Desktop if you want. How you do this is described in the Secure Global Desktop Administration Guide. Network Requirements You must configure your network for use with Secure Global Desktop: Hosts must have DNS entries that can be resolved by all clients. DNS lookups and reverse lookups for a host must always succeed. All client devices must use DNS. Client devices must be able to make TCP/IP connections to Secure Global Desktop on the following ports: 80/tcp for HTTP connections between client devices and the Secure Global Desktop Web Server. The port number may vary depending on the port selected on installation. 443/tcp for accessing an HTTPS web server. 3144/tcp for standard (unencrypted) connections between client devices and Secure Global Desktop. 5307/tcp for SSL-based connections between client devices and Secure Global Desktop. To be able to run applications, Secure Global Desktop must be able to make TCP/IP connections to application servers. The ports you need to open depend on the types of application you are using, for example: 22/tcp for X and character applications using SSH. 23/tcp for Windows, X and character applications using telnet. 3389/tcp for Windows applications configured to use Windows Terminal Services. 6010/tcp and above for X applications The Secure Global Desktop Administration Guide has detailed information about the ports used by Secure Global Desktop and how to use Secure Global Desktop with firewalls. Supported Protocols Secure Global Desktop supports the following protocols: Microsoft Remote Desktop Protocol (RDP) version 5.2 Hypertext Transfer Protocol (HTTP) HTTP over Secure Sockets Layer (HTTPS) Secure Shell (SSH) version 2 or later Citrix Independent Computing Architecture (ICA) Telnet VT, American National Standards Institute (ANSI) TN3270E TN5250 Security Support Secure Global Desktop supports secure connections from clients using the following protocols: Secure Socket Layer (SSL) version 3.0 Transport Layer Security (TLS) version 1.0 The following encryption cipher suites are supported: RSA_WITH_AES_256_CBC_SHA RSA_WITH_AES_128_CBC_SHA RSA_WITH_3DES_EDE_CBC_SHA RSA_WITH_RC4_128_SHA RSA_WITH_RC4_128_MD5 RSA_WITH_DES_CBC_SHA Note the Java technology client does not support any AES cipher suites. Secure Global Desktop supports Base 64-encoded PEM-format X.509 certificates that have been signed with any of the following Certificate Authority (CA) certificates (root certificates): Baltimore CyberTrust Code Signing Root Baltimore CyberTrust Root Entrust.net CA Entrust.net Client CA 1 Entrust.net Client