Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell ThinOS 2402 Administrator’s Guide

PDF

Select Group

The following are two common scenarios for you to implement Select Group:

Scenario 1

You can choose between different brokers that are based on the physical location you are at. For example, when there is an internal and an external Citrix or VMware connection point for your organization. With Select Group, you can select an internally hosted broker when you are in the office or an externally hosted broker when you are working from home. This can be complemented with normal username or password-based authentication for the internal environment and two-factor authentication for the external environment.

Scenario 2

In call centers, you have to connect to different customer environments based on the shift. Select Group helps you to quickly change the broker URL, domain name, and branding (desktop wallpaper) to make it visually clear to which environment you are connecting to.

When moving clients between groups or adding new clients to a group, the following behaviors are expected:
  • All ThinOS configuration policy settings and imported client files return to their default values except:
    • Network Settings—All wired and wireless network configurations including proxy and VPN settings are preserved.
    • Certificates—All client certificates associated to 802.1x network configuration are preserved.
    • Management—Wyse Management Suite configurations are preserved.
  • If the new group has enabled local override for the settings, all local override settings are preserved.
  • All imported files except for those associated with networking or management are deleted. Some examples of these files include Wallpaper, Logo, EULA, and Hosts. If 802.1x wired or wireless, proxy, or VPN connection certificates have been used, the certificate file is preserved.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\