Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More. Glossary



Similar documents
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Citrix XenDesktop, XenServer & XenApp

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

Transitioning to Leostream from HP SAM

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Administrator s Guide

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review

Connection Broker The Leader in Managing Hosted Desktop Infrastructures and Virtual Desktop Infrastructures (HDI and VDI) DNS Setup Guide

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Leostream Agent Administrator s Guide

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Screen Management for Multiple Displays

Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Installation Guide

ViPNet ThinClient 3.3. Quick Start

VMware Virtual Desktop Manager User Authentication Guide

Leostream Corporation leostream.com Share this Whitepaper!

Choosing and Using Display Protocols with the Leostream Connection Broker

Acronis Backup & Recovery 11 Virtual Edition

Oracle Virtual Desktop Infrastructure. Administrator's Guide for Release 3.5

Windows Server ,500-user pooled VDI deployment guide

RES ONE Automation 2015 Task Overview

Quick Start Guide for Parallels Virtuozzo

vsphere Upgrade vsphere 6.0 EN

How A Connection Broker Simplifies Hosted Desktop Environments

PCoIP Management Console User Manual. TER Issue 5

Getting Started with ESXi Embedded

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Quick Start Guide for VMware and Windows 7

Networking Best Practices Guide. Version 6.5

Thinspace deskcloud. Quick Start Guide

Veeam Backup & Replication. Version 7.0

PCoIP Zero Client and Host Administrator Guide. TER Issue 1

Managing Multi-Hypervisor Environments with vcenter Server

PARALLELS SERVER BARE METAL 5.0 README

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January

Hyper-V Server 2008 Setup and Configuration Tool Guide

Basic System Administration ESX Server and Virtual Center 2.0.1

VMware vsphere 5 Quick Start Guide

Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2

App Orchestration Setup Checklist

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Choosing and Using Display Protocols

Virtual Web Appliance Setup Guide

XenApp 7.7 Deployment ISO. 5 th January 2016

Basic System Administration ESX Server 3.0 and VirtualCenter 2.0

CA ARCserve Replication and High Availability

User Guide for VMware Adapter for SAP LVM VERSION 1.2

Goliath Performance Monitor Prerequisites v11.6

Oracle Virtual Desktop Infrastructure. Administrator's Guide for Release 3.4

vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN

Installing and Configuring vcenter Support Assistant

Parallels Cloud Server 6.0 Readme

Citrix XenDesktop Administrator s Guide. Citrix XenDesktop 3.0 Citrix XenDesktop

Hyper-V Installation Guide. Version 8.0.0

XenClient Enterprise Synchronizer Installation Guide

Virtual Managment Appliance Setup Guide

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

Parallels Cloud Server 6.0

Getting Started with PRTG Network Monitor 2012 Paessler AG

LEOSTREAM. Case Study Remote Access to High-Performance Applications

ViPNet ThinClient 3.3. Deployment Guide

Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Acronis Backup & Recovery 11.5 Quick Start Guide

Veeam Backup & Replication. Version 8.0

LTM Management Console. Administration Guide

Deploying Microsoft RemoteFX for Personal Virtual Desktops Step-by-Step Guide

User Guide. CTERA Agent. August 2011 Version 3.0

Acronis Backup & Recovery 11.5

PARALLELS SERVER 4 BARE METAL README

XenDesktop Implementation Guide

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Cloud Attached Storage 5.0

PCoIP Infrastructure Deployment Guide. TER Issue 1

How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.

Revit products will use multiple cores for many tasks, using up to 16 cores for nearphotorealistic

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Training module 2 Installing VMware View

Dell SonicWALL SRA 7.5 Citrix Access

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

Windows XP Deployment Guide

ACP ThinManager Tech Notes What's New, or Why Upgrade ThinManager?

PHD Virtual Backup for Hyper-V

CTERA Agent for Windows

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Getting Started with Endurance FTvirtual Server

Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.

Interact Intranet Version 7. Technical Requirements. August Interact

Connection Broker OpenStack VDI Reference Architecture with Leostream

Red Hat enterprise virtualization 3.0 feature comparison

Atlantis ILIO Persistent VDI for Flash Arrays Administration Guide Atlantis Computing Inc. Atlantis ILIO 4.1. Document Version 1.0

Polycom CMA System Upgrade Guide

Cloud Attached Storage

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Symantec Backup Exec 2014 Icon List

- 1 - SmartStor Cloud Web Admin Manual

How To Install Acronis Backup & Recovery 11.5 On A Linux Computer

Autodesk Revit 2016 Product Line System Requirements and Recommendations

Transcription:

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Glossary Versions 8.1 January 14, 2016

Contacting Leostream Leostream Corporation 465 Waverley Oaks Rd. Suite 200 Waltham, MA 02452 USA http://www.leostream.com Telephone: +1 781 890 2019 Fax: +1 781 688 9338 To submit an enhancement request, email features@leostream.com. To request product information or inquire about our future direction, email sales@leostream.com. Copyright Copyright 2002-2016 by Leostream Corporation This software program and documentation are copyrighted by Leostream. The software described in this document is provided under a license agreement and may be used or copied only under the terms of this agreement. No part of this manual may be copied or reproduced in any form without prior written consent from Leostream. Trademarks The following are trademarks of Leostream Corporation. Leostream The Leostream graphical logo The absence of a product name or logo from this list does not constitute a waiver of the trademark or other intellectual property rights concerning that product, name, or logo by Leostream. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. OpenLDAP is a trademark of The OpenLDAP Foundation. Microsoft, Active Directory, SQL Server, Excel, ActiveX, Hyper-V, Windows, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other brand and product names are trademarks or registered trademarks of their respective holders. Leostream claims no right to use of these marks. Patents Leostream software is protected by U.S. Patent 8,417,796. 2

1E WakeUp: A software package, developed by 1E that allows you to power up physical machines using Wake-On-LAN. Active Directory : Microsoft directory server that can be used in the Connection Broker to authenticate users, or a version of an LDAP authentication server. Application: A Citrix XenApp (Presentation Server ) application available for allocation in the Connection Broker Assigned: Status of a desktop that is currently in use by an end user. Available: Status of a desktop that can be assigned to a particular user. See also Unavailable. Backup Pool: A group of desktops that the Connection Broker should access if the original desktop selected from the primary pool fails the checks specified in the policy. Center: A group of desktops or applications registered with the Connection Broker from a particular external system, for example: VMware vcenter Server, Citrix XenServer or XenApp, Active Directory, or Microsoft Terminal Services Server. Child: An Active Directory domain term for an Active Directory server that is one domain below another in a domain tree. The child inherits the domain name of its parent in a DNS hierarchical naming convention. For example: child.parent.root.com Client: An application or system used to access a remote desktop. The Connection Broker supports Linux and Microsoft Windows fat clients and a variety of thin clients, as well as Web Browsers. Client Binding: The process of associating two PCoIP clients in a master/slave configuration to support quad-monitor layouts. Cluster: A group of Connection Brokers sharing the same external data base. Collaboration: When two users are logged into the same remote session. Currently, collaboration is supported for NoMachine NX sessions, only. Connection Broker: The central Leostream software, enabling organizations to manage user access to computing resources such as virtual machines, physical machines, and Microsoft Terminal Services Servers. Desktop: A virtual machine, physical machine, blade, or Terminal Services session available for allocation in the Connection Broker. Display Plan: Defines the number of monitors attached to a group of clients. Domain tree: A hierarchical group of one or more domains within one root domain. 3

Duplicate: A desktop that is listed more than once in the > Resources > Desktops page. Duplicate desktops appear when a desktop is registered from multiple Connection Broker centers. Exceed ondemamd: High-fidelity display protocol developed by OpenText that provides pixel perfect screen and color rendering for professionals in design and manufacturing industries, allowing organizations to deliver complex 2-D and 3-D applications to a global work force with LAN-like performance. Failed: Status of a desktop that has failed for various reasons. Select the HD Status action for that desktop to determine the cause of failure. Failover Plan: Failover plans allow you to warn users when their primary desktop has failed and they are being offered a backup desktop. Follow-me mode: Also called user mode, an assignment mode where the user is assigned the same desktop irrespective of the client they log in from. Forest root domain: The first domain created in a forest. Guest: A virtual machine running on a host. Health Attribute: A metric used to determine the load and availability of the Connection Broker virtual appliance. Host: The physical server that runs the virtualization software. Hosted Desktop: A virtual machine, physical machine, or Terminal Service available for allocation in the Connection Broker. Image: The files associated with a virtual machine. In general, an image refers to a non-running virtual machine. Kiosk mode: Also called user and client mode, an assignment mode where the user is assigned a different desktop whenever they log in from different clients. Using this mode, one user account, for example student, can simultaneously log in from several different clients. Leostream Agent: Provides the Connection Broker with insight into the connection status of remote users. It is an essential part of the Connection Broker product and should be installed on each desktop. Leostream Connect: The Leostream client, which provides tight integration with the Connection Broker so that current Windows users can access their remote desktops from their fat desktop. Users enter their Active Directory credentials into Leostream Connect and a list of authorized desktops appears for them to choose from. Leostream Credential Provider: When installed with the Leostream Agent on desktops running Windows 7, enables single sign-on from clients equipped with Teradici PC-over-IP technology. When installed with Leostream Connect, enables client-side single sign-on, allowing Leostream Connect to automatically use the credentials provided for the Windows log on. 4

Local User: A user that was created in the > Users > Users page. Local users are authenticated directly by the Connection Broker, instead of through an authentication server. Location: A group of clients defined by client attributes such as manufacturer, device type, OS version, or IP address. Log: A record of all the events that have occurred since the log was last cleared. Metric: Information on disk space, load average, etc., for the Connection Broker virtual appliance. Nested pools: A configuration of desktop pools where one pool is a subset of another pool. Parent: One domain above another in a domain tree. Pausing/Paused Status of a desktop that is halted and the image held in memory. PCoIP or PC-over-IP: Shorthand for the Teradici PC-over-IP technology. Plan: Defines a standard set of protocol, power control, or release operations, which can be applied to any number of policies. Also defines a set of printers to assign to clients, based on the client s location Policy: Determines which desktops and applications users have access to, as well as sets the display protocol configuration, USB device management permissions, and power control and release plans for desktop. Pool: A collection of desktops or applications. Power Control Plan: Defines power control actions (start, stop, suspend, reboot, revert to snapshot) to exercise either when the user disconnects from their desktop, when they log out of their desktop, or when the desktop is released. You assign power control plans to desktop pools in one or more policies. Printers: The list of printers registered with the Connection Broker, and available for assignment to clients. Printer Plan: Defines a set of printer, and the default printer. Printer plans are assigned to remote desktops based on the location of the user s client device. Protocol Plan: Defines the protocols that the Connection Broker should try to use when connecting to a desktop from a particular pool in the user s policy. A protocol plan defines the order to try the protocols and any command line parameters and configuration files to use when establishing the connection. Provisioning Template: A template, created in VMware vcenter Server that can be used to provision new virtual machines. Rebooting: Status of a desktop that is stopping and then restarting. Release Plan: Defines if and when to release a desktop back to its pool, after initial assignment to a user. You assign release plans to desktop pools in one or more policies. 5

Resources: Desktops, applications, and printers available for assignment to a user. Resuming: Status of a desktop that is restarting after being suspended. Registry Plan: Defines registry keys to create or modify on the remote desktop based on the location of the user s client device. Reverting: Status of a desktop that is returning to a pre-snapshot state. Rogue User: A user that has logged into a desktop without going through the Connection Broker. An existing Connection Broker user can become rogue if they logged into a desktop via the Connection Broker, and that desktop is then released to the pool prior to the user logging out. Roles: Determine how much of the Connection Broker functionality a user can see and use. All Connection Broker Users are assigned a role. Routing: Network configuration where the user s computer is on one subnet, for example 192.168.2.151, and the corporate network is on another subnet, for example 172.29.229.xxx, with a server at 172.29.229.151. Running: Status of a desktop that is powered on and has a running operating system. Session Permissions: Define the actions that a user is allowed to take on their resources when they are logged into the Connection Broker, such as restarting or releasing their desktops. Single sign-on: Require the user to enter their credentials only once when logging into the Connection Broker. Without single sign-on, users are asked for their credentials when logging into the Connection Broker, and again when logging into their desktop. Smart card: A pocket-sized card with embedded integrated circuits used to authenticate a user for logging into a desktop. Starting: Status of a desktop that is powered on and the operating system, if present, is booting. Stop: To shut down a desktop. Stopping/Stopped: The virtualization software has been sent a command to shutdown a running virtual machine. The virtualization software, in turn, first tries to send the running OS a shutdown command. Then, when the OS is shut down, the virtualization software turns off the virtual machine itself. If this fails, it does a hard shut down and simply turns off the virtual machine. During this sequence, the Connection Broker shows the status as stopping. The status changes to Stopped when the virtual machine is turned off. Suspending/Suspended: To place a virtual machine in a standby state. A virtual machine that has been suspended has all its memory content written to disk, so that it can be stored and moved as a series of disk images. A virtual machine can be revived by writing the memory contents back to memory and restarting the process where it left off. 6

Tag: Administrator defined identifiers that can be assigned to a particular desktop in order to make it a member of a particular pool. Up to four tags are allowed per desktop. Tags are arranged into groups. Multiple tags from the same group can be assigned to a single desktop. Third-Party Content: Any files loaded into the Connection Broker via the > System > Maintenance page. Third-party content may include images, display protocols, etc. Tree root: The first domain created in a tree. Unavailable: As a desktop state, indicates that the desktop is unavailable for assignment to a user, for example, because it is already assigned to another user. As a power status, indicates that the Connection Broker was not able to accurately determine the desktops power state. Uncategorized Desktops: Desktops that are running a Leostream Windows Agent but have not been manually associated with another Center. Also, desktops that are manually imported into the Connection Broker using their IP address. Unreachable: A Leostream Agent state, indicating that the Connection Broker cannot establish communication with the Leostream Agent. Unresponsive: A Leostream Agent state, indicating that the Connection Broker can communicate with the Leostream Agent, but that the agent is not able to initiate calls to the Connection Broker. Virtual Machine: A self contained virtual computer running with the help of virtualization software. Wake-On-LAN: Allows a physical computer to be turned on or woken up by a special packed (called a magic packet) sent from another computer on the network. The Connection Broker can directly send Wake-On- LAN packets, or can communicate with 1E WakeUp, which then sends the packets. Web Client: The Leostream client that allows end users to access their resources via Web browser. The Web client and the Connection Broker Administrator Web interface share the same login page. WebHook: Any HTTP POST that the Connection Broker can call to perform custom actions Windows machine name: A human readable identifier for each Windows machine within a system. If the name is not unique, there will be warning messages generated on the duplicated servers and they will not be able to participate with other Windows servers in that Windows Domain. 7