Tuesday Oct 27, 2015

OOW15: Tues, Oct 27-What's Coming Up Today?

Happy Tuesday to all Oracle OpenWorld attendees and those watching online.

Today is full of important Keynotes and General sessions by Oracle Linux and Virtualization team. Keynotes are at Moscone North, Hall D.,  first one 8:30 10:15 a.m. "Oracle Software Innovations", Thomas Kurian, the second one - not to be missed- "The Secure Cloud", by Larry Ellison, 1:30 p.m.–3:15 p.m. These keynotes will be streamed live from Oracle OpenWorldwebsite.

For Linux and Virtualization audiences the key event is the general sessions. Oracle's Wim Coekaerts, Sr.VP of Linux and Virtualization Engineering will present the General sessions highlighted in red below, mark them in your schedule and don't miss:

  • General Session: Oracle Linux—the State of the Penguin [GEN9479]Tuesday, Oct 27, 11:00 a.m. | Park Central—Metropolitan II
  • Secure Your Data Center with Oracle Linux [CON9483] Tuesday, Oct 27, 12:15 p.m. | Park Central—Metropolitan II
  • General Session: How Oracle Linux and Virtualization Power the Cloud [GEN9486] Tuesday, Oct 27, 4:00 p.m. | Park Central—Metropolitan II
  • Oracle VM: Complete and Integrated Virtualization Solution in a Data Center [CON6120] Tuesday, Oct 27, 5:15 p.m. | Park Central—Metropolitan II

If you missed the Oracle Linux, Oracle VM and OpenStack Showcase, Moscone South, Booth #121 yesterday,  today is the day to visit. We will have the Oracle product managers and engineers to answer your questions. 

Today's theatre sessions in the showcase area will be: 

We all look forward to talking to you.

Zeynep Koch 

Sunday Oct 25, 2015

Oracle Open World 2015 - Oracle Secure Global Desktop

Hello all, 

We are happy to welcome you all to our Oracle Linux, Oracle VM and OpenStack Showcase this year.  We are showcasing Oracle Secure Global Desktop product in the showcase area and also number of exciting sessions describing Oracle Secure Global Desktop and Oracle technology integration.

Monday, Oct 26th

  • Conference Session:
    Private Cloud Appliance Roadmap and Insights from Engineering [CON8762]
    Mon Oct 26th, 12:15pm | Intercontinental - Intercontinental C (5th Floor)
  • Theatre Session:
    Secure Access to cloud-hosted Enterprise Applications and Desktops [THT11480]
    Mon Oct 26th, 04:30pm | Oracle Linux, Oracle VM, and OpenStack Showcase Theatre, Moscone South
  • Conference Session:
    Next-Generation Cloud Application Development with Oracle Linux, Docker, and Virtualization [CON9485]
    Mon Oct 26th, 05:15pm | Park Central - Metropolitan II

Tuesday, Oct 27th

  • General Session:
    How Oracle Linux and Virtualization Power the Cloud [GEN9486]
    Tue Oct 27, 4:00 p.m. | Park Central—Metropolitan II

    Wednesday, Oct 28th

    • Conference Session:
      Building a Large-scale Cloud Infrastructure with Oracle VM and Oracle Linux [CON9487]
      Wed Oct 28th, 11:00am | Park Central - Metropolitan II

    We look forward to seeing you at OOW15.

    Friday Oct 23, 2015

    FRIDAY SPOTLIGHT: OOW15 Showcase, Demos and Theatre Sessions for Oracle Linux,Virtualization and OpenStack

    Yesterday, we published all our Sessions and Hands-on-Labs at Oracle OpenWorld. Today's Friday Spotlight is dedicated to our Oracle Linux, Oracle VM and OpenStack Showcase at Moscone South, Booth 121 where we will have Oracle demo kiosks, partners and theatre sessions. We have 8 Partners showcasing their solution and 8 Oracle product demos presented by Oracle Linux, Oracle VM, Oracle VM for VirtualBox, SGD, Oracle OpenStack for Oracle Linux teams. Makes sure to stop by and have a conversation.

    Here's the showcase layout:

    As you see from the layout, we also have a theatre in the showcase. The schedule for our theatre session is as follows, mark the times to hear some exciting, interesting topics from our Partners and Oracle team:

    If you are still not so sure, here are more reason to come by. We are giving away some amazing gifts and you can enter in a raffle to win an Intel NUC or a Penguin. Get your passport which we will distribute at the booth 121 and the Oracle Linux and Virtualization sessions, have it stamped by Partners, then stop by our showcase theatre at 3pm that day for the drawing.

    We hope to see you at Oracle Linux, Oracle VM and OpenStack Showcase

    Thursday Oct 22, 2015

    OOW15: All Oracle Linux, Oracle Virtualization Sessions and HOLs

    Hello everyone, what a busy month for us! 

    First, the October edition of the Oracle Linux Newsletter is now available! Featuring stories about the new OpenStack for Oracle Linux Release 2, what’s happening at next week’s Oracle OpenWorld, an economic value analysis of Oracle Linux, and much more. Read the latest edition online right now, or subscribe to get future editions delivered straight to your inbox.

    We have only 3 days to Oracle OpenWorld and we are excited to present you with an amazing range of sessions and Hands on Labs for Oracle Linux, Oracle VM, VirtualBox, Secure Global Desktop and OpenStack for Oracle Linux.  First of all, we wanted to remind you all the locations. Please allow sufficient time to travel:

    • All Oracle Linux, Oracle VM, and Oracle OpenStack for Oracle Linux sessions are at the Park Central Hotel
    • All of our Hands on Labs are at the Hotel Nikko
    • Demos are in Moscone South
    • Keynotes are in Moscone North

    Monday, Oct. 26:

    • Deploy Oracle Real Application Clusters in Minutes Using Oracle VM Templates [HOL10471] Monday, Oct 26, 11:00 a.m. | Hotel Nikko—Nikko Ballroom II (3rd Floor)
    • Performance Optimizations for Cloud Infrastructure as a Service [CON9577] Monday, Oct 26, 12:15 p.m. | Park Central—Metropolitan II
    • Getting Started with Oracle OpenStack for Oracle Linux [HOL10473] Monday, Oct 26, 12:30 p.m. | Hotel Nikko—Nikko Ballroom II (3rd Floor)
    • Deploy an Oracle E-Business Suite System in Minutes Using Oracle VM Templates [HOL10472] Monday, Oct 26, 2:00 p.m. | Hotel Nikko—Nikko Ballroom II (3rd Floor)
    • Maximize Oracle Linux Performance on Servers and in the Cloud [CON9481] Monday, Oct 26, 2:45 p.m. | Park Central—Metropolitan II
    • Oracle Linux: Build, Test, and Deploy—Tools for the Modern Developer [CON9484] Monday, Oct 26, 4:00 p.m. | Park Central—Metropolitan II
    • Next-Generation Cloud Application Development with Oracle Linux, Docker, and Virtualization [CON9485] Monday, Oct 26, 5:15 p.m. | Park Central—Metropolitan II
    Tuesday, Oct. 27 - Don't miss the General sessions highlighted in red below:
    • General Session: Oracle Linux—the State of the Penguin [GEN9479] Tuesday, Oct 27, 11:00 a.m. | Park Central—Metropolitan II
    • Secure Your Data Center with Oracle Linux [CON9483] Tuesday, Oct 27, 12:15 p.m. | Park Central—Metropolitan II
    • General Session: How Oracle Linux and Virtualization Power the Cloud [GEN9486] Tuesday, Oct 27, 4:00 p.m. | Park Central—Metropolitan II
    • Oracle VM: Complete and Integrated Virtualization Solution in a Data Center [CON6120] Tuesday, Oct 27, 5:15 p.m. | Park Central—Metropolitan II

    Wednesday, Oct 28:

    • Build and Deploy Portable Applications Using Docker and Oracle Linux [HOL10328] Wednesday, Oct 28, 8:45 a.m. | Hotel Nikko—Nikko Ballroom I (3rd Floor)
    • How to Manage Your Oracle Linux Environment with Spacewalk [HOL10326] Wednesday, Oct 28, 10:15 a.m. | Hotel Nikko—Monterey (3rd Floor)
    • Building a Large-Scale Cloud Infrastructure with Oracle VM and Oracle Linux [CON9487] Wednesday, Oct 28, 11:00 a.m. | Park Central—Metropolitan II
    • Business Continuity for Virtualization and Cloud Infrastructure [CON9575] Wednesday, Oct 28, 12:15 p.m. | Park Central—Metropolitan II
    • Rapid Private Cloud with Oracle VM and Oracle OpenStack for Oracle Linux [CON9576] Wednesday, Oct 28, 1:45 p.m. | Park Central—Metropolitan II
    • The Enterprise Cloud Simplified with Oracle VM [CON9488] Wednesday, Oct 28, 3:00 p.m. | Park Central—Metropolitan II
    • Maximize Your Private Cloud Investment with Oracle OpenStack for Oracle Linux [CON9574] Wednesday, Oct 28, 4:15 p.m. | Park Central—Metropolitan II
    • Deploying and Managing a Private Cloud [HOL10469] Wednesday, Oct 28, 4:15 p.m. | Hotel Nikko—Nikko Ballroom II (3rd Floor)

    We wanted to list all the sessions and HOLs by day so you don't miss them but in case you prefer to bookmark the Focus On Documents, here are the links for those which gives you the summary of all the activities for Oracle Linux and Virtualization:

    Focus On Document - Oracle Linux

    Focus On Document - Oracle Virtualization

    We look forward to seeing you in our Sessions and Hands on Labs at OOW15.

    Thursday Oct 15, 2015

    OOW15: amitego AG Demonstrates VISULOX at Oracle Linux, Oracle VM and OpenStack Showcase

    We are happy to welcome amitego AG to our Oracle Linux, Oracle VM and OpenStack Showcase this year. They will be showcasing their product VISULOX in the showcase area but also provide insight into the product during theatre session listed below at Oracle OpenWorld on Oct 26-28.

    amitego AG
    is not new to Oracle Infrastructure products, nor to Oracle OpenWorld. Its mission is to make IT a safer place, by addressing secure access by privileged users, and this through its Remote Access Control and Management Solution Suite, VISULOX.

    VISULOX is based on the Oracle Secure Global Desktop Software, offering customers a flexible and powerful way to control and document all activities of the privileged users in the IT environment.  If you want to know more about the VISULOX and amitego, come to their theatre session:

    Title: VISULOX—Controlled Privileged Access to Cloud Services [THT11226]

    Speaker: Tillmann A. Basien, CEO, amitego Engineering GmbH

    • Monday, Oct 26, 1:30 p.m. | Oracle Linux, Oracle VM, and OpenStack Showcase Theater, Moscone South
    • Tuesday, Oct 27, 1:00 p.m. | Oracle Linux, Oracle VM, and OpenStack Showcase Theater, Moscone South

    amitego AG will also demonstrate their VISULOX product and show how easy it is to integrate without any modification to server or client, delivering a complete audit trail about who did what and when in the system. Including demos showing the user activities. Visit amitego AG at Oracle Linux, Oracle VM and OpenStack ShowcaseBooth 121, SLMoscone South, Kiosk: SLX-006.

    Friday Oct 02, 2015

    Friday Spotlight: Oracle Linux, Virtualization, and OpenStack Showcase at OOW15

    Happy Friday everyone!

    Today's topic will be about our amazing showcase at Oracle OpenWorld, Oct 25-29. The Oracle Linux, Oracle VM and OpenStack showcase is located in Moscone South, booth #121, featuring Oracle product demos and Partners.  In past years, our showcase had been a great location to see demos of Oracle Linux and Oracle VM as well as solutions from our Partners. This year, it is expanded with Oracle OpenStack product demos and a theatre. Here's a list of the Oracle and Partner kiosks, don't forget to visit and talk to one of the experts that can help you out with your questions:

    • SLX-007 - Access Applications Securely with Oracle Secure Global Desktop
    • SLX-008 - Oracle VM VirtualBox
    • SLX-009 - Enhance Security and Reduce Costs Using Zero-Downtime Updates with Oracle Linux and Ksplice
    • SLX-010 - Oracle OpenStack for Oracle Linux  -Enterprise Ready
    • SLX-011 - Oracle Linux for the Cloud-Enabled Data Center
    • SLX-012  - Develop and Distribute Containerized Applications with Oracle Linux
    • SLX-013 - Oracle VM Server for x86
    • SLX-014 - Oracle VM Server for SPARC  

    The table below lists the featured Partners and their solutions:

    The Oracle Linux, Oracle VM, and OpenStack Showcase will also include an in-booth theatre for Partners and Oracle experts to share their solutions to customers and partners, alike. For the latest listing of theatre sessions currently confirmed please refer to the Schedule Builder

    Don't forget to visit us at Moscone South #121, we will giveaway some great software (keeping it as a surprise- you need to come and see) and be in the drawing for our famous penguins and and Intel Mini PC - NUC appliance where you can use it for set top boxes to video surveillance, and home entertainment systems to digital signage, it is one appliance that can do it all.

    Register today.

    Tuesday May 26, 2015

    May 2015 Oracle Virtualization Newsletter

    We're pleased to announce that the May edition of the Oracle Virtualization Newsletter is now available!

    This issue includes information on:

    You can read the online edition right now, or if you'd like to have the newsletter delivered directly to your inbox, you can sign up here

    Thursday Apr 30, 2015

    ANNOUNCEMENT: Oracle Secure Global Desktop 5.2 now available!

    We are pleased to announce general availability of Oracle Secure Global Desktop 5.2.

    Oracle Secure Global Desktop (SGD) is a secure remote access solution for any cloud-hosted enterprise applications and desktops running on Microsoft Windows, Linux, Solaris and mainframe servers, from a wide range of popular client devices, including Windows PCs, Macs, Linux PCs, and tablets such as the Apple iPad and Android-based devices.  Oracle Secure Global Desktop gives users the ability to work securely from any device and anywhere, while providing administrators the tools they need to control access to applications and desktop environments resident in the data center.

    What's New in SGD Release 5.2

    • Monitoring with Oracle Enterprise Manager Cloud Control - This release delivers plug-ins to enable centralized monitoring of multi-server SGD deployment in Oracle Enterprise Manager.  These plug-ins monitor and analyze the health and performance of SGD servers and gateway servers.  For SGD servers, the plug-in captures various performance and configuration metrics such as array status, users and applications, data store objects, SGD system process, versions and patches.  For gateway servers, various performance and configuration metrics are captured, including connections being serviced, registered SGD servers, versions and patches.  Plug-in metrics data can be processed by reporting tools such as Oracle Business Intelligence Publisher.

    The image shows a sample SGD array monitoring page (click to view larger image)

    • Single Sign-On (SSO) integration with Oracle Access Manager - Enables instant access to applications, with a user entering credentials only once.  This release integrates Oracle Secure Global Desktop with Oracle Access Manager, enabling the Single Sign-On (SSO) feature of Oracle Access Manager to authenticate users to an SGD server and to remote applications started from the SGD workspace.  Single Sign-On enables SGD users to access multiple applications with a single login and greatly simplifies password management.

    • Role-based administration and enhancements - Provide flexible control over administration.  New roles for SGD administrators have been introduced that add different levels of administration privileges and access control to the SGD Administration Console.  New commands introduced in this release simplify the process of installing software updates (patches) for an SGD deployment.  The Administration Console can now be used, in addition to the command line, to join an SGD server to an array that uses secure intra-array communication.

    • PulseAudio integration - Prior to this release, the Unix audio solution worked with applications that used OSS on Linux or SADA on Solaris.  This release allows audio redirection from applications that use PulseAudio, increasing the range of audio applications supported by SGD.  Also, added support for audio input functionality on Unix brings the Unix audio feature set in line with that on Windows and allows applications compatible with OSS, SADA or PulseAudio to use audio input.

    • Enhanced security and performance/emulations improvements - In addition to new features and expanded server, client and browser support, this release also delivers enhance security and performance, and provide a richer user experience over a range of network conditions.
      • A Password Manager has been introduced to allow users control over caching of credentials, up to the level permitted by the administrator.
      • Greater control of autocomplete behavior is available in SGD web applications.  'Sensitive fields' always have autocomplete disabled and autocomplete can be disabled for non-sensitive fields on a per-application basis.
      • Improved security with HTTP proxies.  Proxy server support has been extended to negotiate, digest, and NTLM authentication when connecting to SGD through HTTP proxy servers.  This means that clients configured for Integrated Windows Authentication (IWA) can now be used.
      • Optimizations improve scrolling and responsiveness in X applications, benefiting high latency environments.
      • Improvements in the handling of RDP have reduced both CPU and bandwidth requirements for transferring data and have improved the user experience by increasing responsiveness and reducing tiling and tearing artefacts.

    Oracle Secure Global Desktop 5.2 maintains its 'slot-in' simplicity while integrating more closely with Oracle products, technologies and solutions such as Oracle Managed Cloud Services, Oracle Enterprise Manager Cloud Control, and, Oracle Access Manager.

    For more details refer to Oracle Secure Global Desktop release 5.2 documentation.

    Download and try it out to see how Oracle Secure Global Desktop helps solve your organization's cloud applications and desktops needs.

    Friday Aug 22, 2014

    Friday Spotlight: Oracle Secure Global Desktop and amitego VISULOX

    Happy Friday!

    Our spotlight this week is a screencast about a fantastic solution that takes the security model of Oracle Secure Global Desktop and adds even more features.

    If you work in environments where you need to have a video record of users' interactions with applications, or need to ensure that two users can remotely work on the same session (a worker entering data in a form from one workstation and a manager typing an authorization code from another, for example), amitego VISULOX can do this and a lot more. It's built on top of Oracle Secure Global Desktop, so you get all of the great features there, plus additional unique security related features provided by VISULOX.

    Click the thumbnail below to watch the screencast.

    We'll see you next week!


    Thursday Aug 21, 2014

    The August '14 Oracle Virtualization Newsletter is Now Available

    The August 2014 edition of the Oracle Virtualization Newsletter is now available! You can catch up on what's been going on with Oracle VM, Oracle Secure Global Desktop, and Oracle VM VirtualBox by reading the latest issue. Here are some highlights:

    • Oracle Announces Oracle VM 3.3 Release
    • Technology Preview of OpenStack Icehouse with Oracle Linux and Oracle VM Now Available
    • Getting Started with Oracle VM, Oracle Linux, and OpenStack
    • Oracle VM Test Drive Workshop on Cisco UCS
    • Updated Oracle VM Storage Connect Plug-in for Oracle ZFS Storage Appliance Now Available
    • Controlled Remote Access with Oracle Secure Global Desktop and amitego VISULOX
    • And much more!
    You can read the latest edition online right now or sign up to get it automatically delivered to your inbox.

    Friday Aug 15, 2014

    FRIDAY SPOTLIGHT: Oracle Linux and Virtualization Showcase @ Oracle OpenWorld

    Oracle Linux and Virtualization Showcase “aka.Pavilion" at Oracle Openworld will be amazing this year. You can find us in a spacious area in Moscone South (Booth #611), featuring many of our key partners. New this year in the Showcase, you will also find Oracle demopods showcasing Oracle Linux and Oracle Virtualization. In addition, we are also featuring OpenStack. A lot of exciting technologies and solutions in one stop! Oracle Linux and Virtualization partners will be on the floor with their latest integrations and solutions to help you better accelerate your infrastructure investments. Come by the Showcase to network, win some prizes and walk away with:
    • Insights and real world implementation examples from participating ISV, IHV and SI partners
    • Deeper knowledge on the latest developments of Oracle Linux and Oracle Virtualization and the Oracle OpenStack integrations
    • Broader view of how Oracle and Partners are implementing OpenStack

    Whether you are modernizing your IT or planning an OpenStack deployment, join us in the Oracle Linux and Virtualization Showcase and our experts will help you visualize your future, simplify your IT life and realize further profitability for your business.

    Starting next week here on the Linux and Virtualization blogs, we’ll go into detail about the partners that you can visit in the Oracle Linux and Virtualization Showcase. In the meantime, don't forget to mark Moscone South, Booth: 611 as a place to visit this year.

    Hope to see you in our Oracle Linux and Virtualization Showcase!

    Monday Apr 28, 2014

    Announcement: Patch Set Updates (PSUs) for Oracle Secure Global Desktop releases

    Oracle has released some important Patch Set Updates (PSUs) for Oracle Secure Global Desktop.  Oracle Secure Global Desktop team releases regular updates to make the overall user experience smoother and up-to-date.  Patch Set Updates (PSUs) are clusters of recommended stability, security, and/or performance patches that have been certified for an existing maintenance releases.

    Following links points to these PSUs for Oracle Secure Global Desktop releases, PSUs are available for download on My Oracle Support (MOS)

    Friday Apr 11, 2014

    Friday Spotlight: Writing a Broker for Oracle Secure Global Desktop

    We talked about the dynamic launch feature in Oracle Secure Global Desktop earlier and pointed out that the code providing the functionality is implemented in a broker.  Here, we'll look at the fundamentals of writing a broker before working through a scenario where a bespoke broker would simplify operations.

    Broker Basics

    The interfaces and classes you need to write a broker are in the com.tarantella.tta.webservices.vsbim package in the sgd-webservices.jar archive. 

    IVirtualServerBroker is the key interface and all Secure Global Desktop brokers must implement it.  These are the methods where a broker writer would typically add logic.

    void initialise(Map initParams) This method is called once when the broker is loaded by the Secure Global Desktop workspace.  It gives the broker a map of the key/value pairs configured on the dynamic application server object using the broker.  Typical parameters would be the name and port of a source of real or virtual application servers.
    Map getCandidateServers(Map params) Secure Global Desktop calls this method to obtain a list of servers available to a particular user.  The broker receives a map of parameters, including the identity of the user, and the broker returns a list of candidate servers.  The broker writer is free to decide how to populate that list and whether to return one candidate or several.  For example, the broker could contact a database to reserve a single server.  Alternatively, it could use APIs or web services to contact a VM provider and get a list of available virtual machines.
    ICandidateServer prepareCandidate(String type, ICandidateServer candidate) This method is called after getCandidateServers returns a single option or the user has selected one from several.  This is the place for any code needed to set-up the chosen server or virtual machine.
    void destroy() This is where the broker would tidy-up, freeing any resources it had used, like sessions and connections.

    A Sample Broker

    Let's look at a scenario where writing a broker could simplify operations.  You are an administrator of a Secure Global Desktop deployment where users periodically need to access a key application.  Only a single instance of the application can run on any one server and you have a limited number of licenses.  When a user requires access to the application, they submit a service request to reserve one.  The traditional, broker-less approach in Secure Global Desktop would be to create an application object, configure it to run on the reserved application server and then assign it to the user who reserved it.  Time-consuming if you have to do this repeatedly and on a regular basis.

    However, if we can access the reservation database, we can do it dynamically in a broker.  The operation now becomes:

    • Once only, the administrator assigns the application a dynamic application server configured with a custom broker


    • User submits a service request and reserves a server
    • User logs into Secure Global Desktop and clicks the link to launch the application
    • The broker queries the database, gets the server that the user has reserved and launches the application on it

    For the administrator, there is no need to create, modify or destroy objects in the Secure Global Desktop datastore every time a user submits a service request.

    Skipping many details, defensive coding and exception handling, the broker code would look something like this:

    package com.mycompany.mypackage;

    import com.tarantella.tta.webservices.vsbim.*;
    import java.sql.*;
    import java.util.*;

    public class DbBroker implements IVirtualServerBroker {

        static private final String TYPE = "A Description";
        private Connection dbConn;

        public void initialise(Map<String, String> parameters)
                throws VirtualServerBrokerException {
            // Connect to reservation database.  End-point and credentials are
            // supplied in the parameters from the dynamic application server
            dbConn = DriverManager.getConnection(params.get("URL"), params.get("USER", params.get("PASS"));

        public Map<String, List<ICandidateServer>> getCandidateServers(
                Map<String, String> parameters)
                throws VirtualServerBrokerAuthException,
                       VirtualServerBrokerException {
            Map<String, List<ICandidateServer>> launchCandidates =
                    new HashMap<String, List<ICandidateServer>>();

            // Get the user identity
            String identity = parameters.get(SGD_IDENTITY);

            // Lookup the application server for that user from the database
            Statement statement = dbConn.createStatement();
            String query = createQuery(identity);
            ResultSet results = statement.executeQuery(query);
            // Parse results;
            String appServerName = parseResults(results);

            if (appServerName != null) {
                // Create the assigned server.
                CandidateServer lc = new CandidateServer(appServerName);

                List<ICandidateServer> lcList = new ArrayList<ICandidateServer>();
                launchCandidates.put(TYPE, lcList);

            return launchCandidates;

        public ICandidateServer prepareCandidate(String type,
                ICandidateServer candidate)
                throws VirtualServerBrokerException {
            // Nothing to do
            return candidate;

        public void destroy() {
            // Close the connection to the database

        // And the other methods
        public boolean isAuthenticationRequired() {
            // No user authentication needed
            return false;

        public Scope getScope() {
            // Scope at the application level for all users.
            return Scope.APPLICATION;

    In summary, dynamic launch and custom brokers can simplify an administrator's life when operating in a dynamic environment.  The broker can get its data from any source with a suitable interface: a database, a web server or VM providers with open APIs.  Next time, we'll illustrate that with a broker connecting to Virtual Box.

    Friday Apr 04, 2014

    Dynamic Launch in Oracle Secure Global Desktop

    In an earlier entry, Oracle Secure Global Desktop and Oracle VDI, we mentioned the dynamic launch feature in Secure Global Desktop and described how we used that feature to connect the two products.  Here's a summary of that integration:

    SGD and VDI

    Now is a good time to dig a bit deeper into dynamic launch.

    Dynamic Launch

    There are three parts to it:

    • Dynamic Applications
    • Dynamic Application Servers
    • Brokers

    Dynamic Applications

    A dynamic application is a type of object in Secure Global Desktop that maps to one or more other applications and offers a user a choice between those applications.  Normally, you would map related applications, like a workflow, or alternatives, where you would expect a user to run only one of the applications at any one time.  'My Desktop' is an example of the latter: it is a dynamic application that maps to a Unix desktop and a Windows desktop, the thinking being that most users would run one or the other, but not both simultaneously.

    Dynamic Application Servers

    A dynamic application server is an object that tells Secure Global Desktop to execute some code to determine where an application should run.  It can be assigned to an application object just like other application servers and the code is executed when the application is launched.  The code is delivered as a broker.


    A broker is a Java class that implements a simple interface and is a property of a dynamic application server.  Currently, Secure Global Desktop ships with three brokers:

    • SGD Broker: when this is assigned to an application object, it grabs all the other (real) application servers assigned to the application and presents the user with a choice
    • User-defined SGD Broker: an extension of the SGD Broker that adds the option for a user to enter a host name
    • VDI Broker: this is used to provision hosts through VDI

    Together, they provide a structured, flexible and extensible system: a single dynamic application in a user's workspace can open up a wealth of choices.  Let's consider a scenario where a user needs to run a range of web applications that require different browser types and versions.  One solution in Secure Global Desktop would be to create separate items for each type of browser and publish them to the workspace.  Alternatively, you could create a dynamic application that maps to the different types of browser and logically group them together.  And this can be taken a step further: by assigning a dynamic application server to an application, that browser could be run on a server dynamically provisioned through VDI or whatever hypervisor the broker has been written to handle.

    Dynamic Launch

    So, three key components make up dynamic launch.  Two of them, dynamic applications and dynamic application servers, are part of the Secure Global Desktop infrastructure and plumb the feature into the datastore, workspace and launch process.  They belong in the administrator's realm.  The third component, the broker, provides extensibility.  Secure Global Desktop ships with a broker to deliver VMs provisioned through Oracle VDI, but the open interfaces mean it does not have to stop there. To go further, we must enter the developer's world and write a little code.  Next time...

    Friday Mar 28, 2014

    Oracle Secure Global Desktop and Oracle VDI

    What is the relationship between these two products?  One view is that Secure Global Desktop (despite its name!) provides access to remote applications and VDI does the same for remote, virtual desktops (VMs).  A clean distinction, but slightly artificial: to Secure Global Desktop, a remote desktop, virtual or not, is really just a remote application.  There is little to differentiate the products when it comes to connectivity to remote desktops -  Secure Global Desktop has its native and HTML 5 clients, VDI has Sun Ray and OVDC, but both products connect to remote servers in the same way, typically using RDP.

    Where the products differ is in their scope.  Oracle VDI is a comprehensive solution that enables an administrator to create, store, manage and destroy VMs, as well as allowing users to connect to them.  Secure Global Desktop is simpler and restricts itself to connectivity to the VMs.

    So, do the products work together?  A most definite 'yes': use Secure Global Desktop for user connectivity and VDI for management of VMs.  In fact, Secure Global Desktop ships with a component specifically for communicating with VDI.  You can find full details at http://docs.oracle.com/cd/E41492_01/E41495/html/dynamic-launch.html#broker-vdi-3-3 but we can do a short overview here.

    Firstly, a slight digression.  There are two main entry points to Secure Global Desktop.  The common approach is for users to log in through their browser and go to their Workspace (formerly known as their 'Webtop').  The Workspace presents all the applications that an administrator has published to the user as links and an application can be launched by clicking its link.  The second entry point is 'My Desktop'.  Here, a user logs in through the browser but, rather than going to the Workspace, a desktop is launched automatically.  Quite a good fit for delivering virtual desktops and the approach we will use in our example.

    Let us assume it is a clean installation of Secure Global Desktop.  The first task is for the Secure Global Desktop administrator to configure 'My Desktop' to talk to VDI.  The steps are:

    1. 'My Desktop' is a dynamic application object, meaning that it can map to one or more real application objects.  Since all the VM providers accessed through VDI emit RDP, we are interested in 'Windows Desktop' and not 'Unix Desktop'.  We delete the mapping to 'Unix Desktop', leaving a single mapping to 'Windows Desktop'.

    Next, we configure the 'Windows Desktop' application.  Traditionally, this would be done by assigning it an application server object that points to a real Windows server.  Here, we are going to use a dynamic application server.  It is 'dynamic' because it uses code (in this case, the VDI Broker) to define the server or servers, rather than a static setting for DNS name or IP-address.  So, next:

    2. We create the dynamic application server, set its 'Broker Class' to 'VDI Broker' and configure it with the particulars of our installation.  Configuration involves providing the URL for the VDI web services and, if they are secured with a certificate from an untrusted certificate authority, installing the certificate (or chain) into Secure Global Desktop.
    3. We assign this dynamic application server to 'Windows Desktop'

    That is the administrator's job done.  The user scenario is:

    - User clicks the 'My Desktop' link in the browser and authenticates.
    - The VDI broker code runs and gets a list of VMs available to the user.  If there is only one candidate VM, Secure Global Desktop connects the user directly to the virtual desktop.  If there are several, the user is given the option to select one before a connection is made.

    By using the VDI broker included in Secure Global Desktop, you can deliver virtual desktops to users through Secure Global Desktop and manage the desktops with VDI.  For users familiar with Secure Global Desktop, the desktop is just another application and they face no learning curve.  And administrators can continue to manage desktops through VDI, or even add desktops from other providers without changing the user experience.

    There are references to 'dynamic application server objects' and 'dynamic application objects' in this discussion.  These types of objects, along with some open interfaces, form the 'dynamic launch' feature in Secure Global Desktop. This feature is used to extend the product and the VDI Broker is an example of this extensibility - by simply implementing a public interface (see http://docs.oracle.com/cd/E41492_01/E41499/html/com/tarantella/tta/webservices/vsbim/IVirtualServerBroker.html), the VDI Broker plugs into the Secure Global Desktop infrastructure and provides additional functionality. 

    Dynamic launch will be the topic of a later entry.


    Get the latest scoop on products, strategy, events, news, and more, from Oracle's virtualization experts




    « November 2015