Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Wyse Management Suite Version 1.3 Administrator’s Guide

Discovering Teradici devices

Prerequisites
  • Install the latest version of Wyse Management Suite on Microsoft Windows 2012 Server or later versions. Threadx 5.x and 6.x devices works with the latest version of the operating system.
  • Install and enable the EMSDK component.
  • The FQDN of the Wyse Management Suite server must be available for DHCP or DNS configurations.
  • Cert.pem must be placed in the default path C:\Program Files\Dell\WMS\Teradici\EMSDK. It is used to discover Threadx devices.

Security Level

Depending on an endpoint's configured security level, you may also need to provision endpoints with an EBM/EM certificate.

Endpoints configured for medium or high security must have a trusted certificate in their certificate store before they can connect to an EBM or EM. For some endpoints, certificates may be pre-loaded by the vendor as a factory default. Otherwise, you can manually upload certificates using an endpoint's AWI.

Endpoints that are configured for low security do not need an MC certificate in their trusted certificate stores if either of the following is true:
  • They are using DHCP discovery or DNS discovery and the DHCP or DNS server has provisioned them with the EBM certificate's fingerprint.
  • They are discovered using the manual discovery method.
Table 1. Certificate Requirements for EndpointsCertificate Requirements for Endpoints
Discovery Method Low SecurityMedium SecurityHigh Security
DHCP/DNS discovery without EBM fingerprint provisioned Certificate required Certificate requiredNot applicable
DHCP/DNS discovery with EBM fingerprint provisioned Certificate not required Certificate requiredNot applicable
Discovery initiated by an endpoint configured for a high security environment Not applicableNot applicableCertificate required
Manual discovery initiated by the MC Certificate not required Not applicableNot applicable

Manual discovery from the client

  1. Go to, https://<clientIP>.

  2. Accept the certificate warning message.

  3. Enter the administrator password (default password is Administrator) and login.

  4. Go to, upload > certificate. Select the Cert.pemfile from the default path and click Upload.
  5. Go to Configuration > Management. Click the clear management state button to register the device to the new Management Server.

  6. Set the manager discovery mode to manual

  7. Enter the Endpoint Bootstrap Manager URL in the following format wss://<IP Address of the WMS server>

    NOTE: If EMSDK is installed with custom port then provide Endpoint Bootstrap Manager URL in the following format wss://<IP Address:Custom port.
  8. Click Apply, and then click Continue.

  9. The management status is displayed as Connected to the Endpoint server.

Adding the PCoIP endpoint vendor class to DHCP server

  1. Log in to your DHCP server.
  2. Right-click the DHCP server in the SERVERS pane, and select DHCP Manager.

  3. Right-click the IPv4 option, and then select Define Vendor Classes.

  4. Click Add to add a new DHCP vendor class.

  5. Enter the PCoIP Endpoint in the Display name field.

  6. Enter the PCoIP Endpoint in the ASCII column as the Vendor ID.

  7. Click OK to save the settings.

Configuring DHCP options

  1. Right-click the IPv4 option, and the select Set Predefined Options.

  2. Select PCoIP Endpoint as the Option class, and then click Add.

  3. In the Option Type dialog box, enter the name as EBM URI, data type as String, code as 10, and description as Endpoint Bootstrap Manager URI, and then click OK.

  4. Click OK to save the settings.

  5. Expand the DHCP scope to which you want to apply the options.

  6. Right-click the Scope Options, and then select Configure Options.

  7. Click the Advanced tab, and then select the PCoIP Endpoint vendor class.

  8. Select the 010 EBM URI check box, and then enter a valid Management Console URI in the String field. Click Apply. This URl requires a secured WebSocket prefix, for example,  wss://<MC IP address>:[port number]. 5172 is the MC's listening port . Entering this port number is an optional step.

  9. Click OK to save the settings.

  10. Select PCoIP Endpoint as the Option class, and then click Add.

  11. In the Option Type dialog, enter the name as EBM X.509 SHA-256 fingerprint, data type as String, code as 11, and the description as EBM X.509 SHA-256 fingerprint, and then click OK.

  12. Expand the DHCP scope to which you want to apply the options.

  13. Right-click the Scope Options, and then select Configure Options.

  14. Click the Advanced tab, and then select the PCoIP Endpoint vendor class.

  15. Select the 011 EBM X.509 SHA-256 fingerprint check box, and paste the SHA-256 fingerprint.

  16. Click OK to save the settings.

  17. Go to the client web browser.

  18. Go to Configuration > Management, and set the manager discovery mode to Automatic

  19. The client is connected to the server which is mentioned in the DHCP server.

  1. Log in to the DNS server.

  2. Right-click the DNS server in the SERVERS pane, and the select DNS Manager from the context menu.

  3. In Forward Lookup Zones, right-click the domain, and then select Other New Records from the context menu.

  4. In the Resource Record Type dialog box, select Service Location (SRV) from the list, and click Create Record.

  5. Set Service to _pcoip-bootstrap, protocol to _tcp, and Port number to 5172, which is MC's default listening port. For Host offering this service, enter the MC's FQDN.

    NOTE: The MC's FQDN must be entered because the DNS specification does not allow an IP address in the SRV records.
  6. Click OK.

Adding a DNS TXT record

  1. In Forward Lookup Zones, right-click the domain, and then select Other New Records from the context menu.

  2. In the Resource Record Type dialog box, select the Text (TXT) from the list, and then click Create Record.

  3. Enter the following details:

    1. In the Record name field, enter the host name of the Wyse Management Suite server offering the service. The FQDN field is populated automatically. This should match the FQDN of the Wyse Management Suite server.

    2. In the Text field, enter pcoip-bootstrap-cert= and then paste the Wyse Management Suite server certificate SHA-256 fingerprint.

  4. Click OK.

  5. Go to the client web browser.

  6. The client is connected to the Wyse Management Suite server which is mentioned in the DNS server.

Creating SHA-256 fingerprint

  1. Start the Mozilla Firefox.

  2. Navigate to Options Advanced Tab

  3. Click Certificates to view the certificates.

  4. Under Certificate Manager , click Authorities, and the click Import.

  5. Browse the certificate, and the click View.

  6. Copy the SHA-256 fingerprint.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\