Skip to main content

Desktop Edge Deployment Guide

Caution

Table of Contents

  1. Server Installation and Server Configuration
  2. XMPP Installation and Configuration
  3. Admin Page Settings
  4. Appendix

1. Server Installation and Server Configuration

Open firewall information

  • The firewall distinguishes between information that is opened internally within the server and information that needs to be opened for external access.

  • Firewall Open Ports (Internal)

    • 9090: Port for accessing the Openfire web console
    • 5222: XMPP chat port (connection between server and work PC)
    • 6222: SSH port (Work PC -> Server reverse connection)
    • 8080 (80/443): Desktop Service Web server access port
    • 9080: Desktop Service configuration page access port
  • Open Firewall Ports (External)

    • 8080 (80/443): Desktop Service Web server access port
    • 5222(Optional): open is required when using the public desktop, connection between the public desktop located externally and the server.
  • Check open firewall

    $ sudo firewall-cmd --list-all

Check server installation package

1) Copy (move) the shieldathome.tar.gz file to the /opt folder and extract it.

  • Decompression command

    $ sudo tar -xvf shieldathome.tar.gz

2) Move to the extracted shieldathome folder

  • Check package installation statusunpackImg

Changing the SSH port

  • default 22the SSH port of the port6222Change to port

1) Install policycoreUtils

  • *CentOs family

    $ sudo yum install -y policycoreUtils-python

  • *Ubuntu family

    $ sudo apt-get install -y policycoreutils-python-utils

  • *Closed network environment
    • Use the install file included in the package.

    $ /opt/shieldathome/policycoreutils_centos.sh

2) Change sshd configuration

  1. vi /etc/ssh/sshd_config
  2. #Port 22 > Port 6222 (port change history reflected)
  3. semanage port –a –t ssh_port_t –p tcp 6222 (Execute command to change to port 6222)
  4. service sshd restartsshd

Run the server installation script

  • Move to the server package location and execute the installation script.

    $ /opt/shieldathome/install.sh

  • *After script execution

    1. OS Selection
    2. Database Language Selection
    3. Database Password Setting (Must be noted)

    installSelect

guacamole log rotate configuration

  1. Add logrotate configuration

$ vi /etc/logrotate.d/guacd

  • Add the following content.
/var/log/guacd.log
{
        daily
        rotate 30
        compress
        missingok
        dateext
        notifempty
        dateyesterday
}
  1. Create a folder for the script and move files.

$ sudo mkdir /usr/logrotate $ sudo mv /etc/cron.daily/logrotate /usr/logrotate $ ls /usr/logrotate

  • Check to see if it is displayed as shown in the image below.installSelect
  1. Add crontab configuration

$ crontab -e

  • Add the following content.

0 0 * * * /usr/logrotate/logrotate

Replace SHIELDGate Desktop Agent files (if necessary)

  1. Move to the original file location

$ cd /opt/app/tomcat9/webapps/workathome/resources/new/

  1. Rename existing file (backup)

$ sudo mv SHIELDGateSetup.exe SHIELDGateSetup.exe_backup

  1. Move (copy) the new file to the existing file location after uploading.
  2. Change the name of the new file.

$ sudo mv 업로드파일명 SHIELDGateSetup.exe

Change server configuration file

  1. Change API service settings

$ sudo vi /opt/app/tomcat9/webapps/workathome/WEB-INF/classes/properties/server.properties

  • jdbc.password
    • Check if it has been entered correctly with the set password.
  • internal.ipaddr=xxx.xxx.xxx.xxx
    • Enter the internal IP of the server.
  • SHIELDGate.OAuth.clientId
  • SHIELDGate.OAuth.secretKey
  • SHIELDGate.OAuth.masterExtra
    • Entering information for the SHIELDGate app of the master tenant created in IdGP.
  • SHIELDGate.OAuth.apiUrl
    • Enter the IdGP server address.
  • SHIELDGate.OAuth.extra
    • Enter the company id of the registered company.
  • SHIELDGate.OAuth.appClientId
    • Enter the SHIELDGate app ID within the company.
  • SHIELDGate.Oauth.logUrl
    • Enter the integrated log server address.
  • root.SHIELDGateUrl
    • Enter the SHIELDGate server address.
  • *Additional Settings
  • Screen logger usage setting (use true, do not use false)
    • dxl=false
    • The upload path of *SHIELDGateSetup.exe is/home/dxl/download/changed to
  • root.useSrt
    • Use of SRT
    • Use - 1, Not in use (RDP) - 0
  1. Change Web Service Settings

$ vi /opt/app/tomcat9/webapps/workathome/resources/static/config.js

  • VUE_APP_SHIELDGATE_URL
    • Enter the SHIELDGate server address.
  1. Server Restart

$ sudo systemctl restart tomcat

Server Normal Operation Check & Configuration

{서버주소}:8080(Web service port) connection > Check if the page is displayed correctly

afterInstall

{서버주소}:9080Access the (Settings Page) > Click the "Login" button

  • 데이터베이스Tab selection
    • 접속테스트Click the button to verify normal database connection.
  • 웹서버Tab selection
    • Select whether to use SSL
      • Upload the certificate file and enter the password when using.
      • .keystoreUsing the format file
    • Select whether to use port forwarding
      • Forwarding port when in use443Input
    • 적용하기Button Click
  • 로그아웃Tab selection