A page in your DokuWiki was added or changed. Here are the details:

Date        : 2017/01/02 12:25
Browser     : Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 
Firefox/45.0
IP-Address  : 78.43.90.159
Hostname    : HSI-KBW-078-043-090-159.hsi4.kabel-badenwuerttemberg.de
Old Revision: http://wiki.x2go.org/doku.php/doc:howto:tce?rev=1483359802
New Revision: http://wiki.x2go.org/doku.php/doc:howto:tce
Edit Summary: User : stefanbaur

@@ -182,9 +182,9 @@
 <code> cd $(mktemp -d)
 wget -Y off http://your-http-server-ip-here/
 wget -Y off 
http://your-http-server-ip-here/x2go-tce/x2go-tce-filesystem.squashfs
 </code>
- In case of an FTP URL, replace http with ftp in the example above. Same goes 
for https when trying to get that to work with iPXE.
+ In case of an FTP URL, replace http with ftp in the example above. Same goes 
for https when trying to get that to work.
**Note that you MUST use an IP address. X2Go-TCE WILL NOT WORK with a DNS name, even though this
test here will accept IPs and DNS names alike. The only exception is when a 
template actually spells out that you should input a DNS name.**
 </note>
@@ -226,9 +226,9 @@ === What options are available under FURTHER-OPTIONS-GO-HERE? === These two are mutually exclusive, i.e. never put both of them in the same config:
-   * 
''sessionsurl=http://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.sessions''
 - use this to specify a sessions file. You need this unless you are using a 
session broker. See below for how to add this file to your HTTP, HTTPS, or FTP 
server.  Note that whoever manages to spoof the server name can inject rogue 
session config files into your ThinClients.  To mitigate this risk, use HTTPS, 
where the attacker would have to spoof both server name and matching 
certificate.
+   * 
''sessionsurl=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.sessions''
 - use this to specify a sessions file. You need this unless you are using a 
session
broker. See below for how to add this file to your HTTP, HTTPS, or FTP server.  
Note that whoever manages to spoof the server name can inject rogue session 
config files into your ThinClients.  To mitigate this risk, use HTTPS, where 
the attacker would have to spoof both server name and matching certificate.
   * ''broker-url=ssh:<nowiki>//</nowiki>your-broker-address-here'' - this 
allows you to specify an X2Go Session Broker instead of a sessions file (not limited to an 
ssh-based broker, works with an http-based broker as well)
These are entirely optional:
   * ''xorg-resolution=HRESxVRES'' - will force the horizontal resolution to 
HRES and the vertical resolution to VRES, e.g. ''xorg-resolution=1280x1024'', 
useful if autodetection for the correct screen size fails, but you do get as 
far as seeing the X2Go GUI


--
This mail was generated by DokuWiki at
http://wiki.x2go.org/

_______________________________________________
x2go-commits mailing list
[email protected]
http://lists.x2go.org/listinfo/x2go-commits

Reply via email to