Transform Any x86-64 PC and Laptop into a
Designed and optimized for:
Amazon WorkSpaces, Citrix, Microsoft (RDS, AVD, Windows 365), Omnissa Horizon, NComputing (vSpace Pro, VERDE VDI), Parallels RAS, UDS Enterprise, and Dizzion Frame.
NComputing LEAF OS is a next-generation software endpoint solution that transforms any x86-64 PC or laptop into a secure and centrally managed endpoint.
Designed and optimized for Amazon WorkSpaces, Citrix, Dizzion Frame, Microsoft (RDS, AVD, Windows 365), NComputing (vSpace Pro Enterprise, VERDE VDI and Remote Access), Omnissa Horizon, Parallels, and Virtual Cable UDS Enterprise, LEAF OS delivers a secure computing environment to access virtual desktops and virtual apps from any x86-64 system. It can be used as a self-contained operating system when booted from a USB drive. This methodology leaves the user's existing operating system, files, and hard drive untouched while providing an ideal environment for work-from-home use cases. When users finish their work, a simple reboot to their native OS restores their device to personal use.
Alternatively, LEAF OS can be used to repurpose PCs and laptops by converting any x86-64 hardware from a stand-alone computer to a dedicated thin client by installing directly onto an internal hard drive, removing the old system and files. This method extends the usefulness of aging computers using end-of-life operating systems like Windows 7 while giving users powerful up-to-date desktops.
LEAF OS also comes with integrated local Chromium browser support, providing additional flexibility such as web kiosk mode or productivity mode with direct access to web content and web apps without desktop virtualization. Other popular applications such as local Microsoft Teams PWA and Zoom are supported.
LEAF OS secure boot runs on x86-64 platforms, protecting the system against malicious code by ensuring only authenticated software runs on the device.
LEAF OS devices can be remotely managed by the IT admin via NComputing PMC Endpoint Manager. LEAF OS devices provide a simple-to-deploy, centrally managed, high-performance virtual desktop, perfect for use in SMB and SME organizations with Daas or VDI deployment.
Following desktop virtualization clients can be added to the list of LEAF OS applications and presented in LEAF OS Start Menu, App Launcher, or on LEAF OS desktop:
LEAF OS also comes with integrated local applications support for extended functionality without solely relying on the desktop virtualization environment. The built-in local applications are:
Other x86-64 Linux applications can be additionally deployed as custom or packaged LEAF OS applications. Click here to learn more.
Amazon WorkSpaces is a cloud-based desktop virtualization service built on AWS, providing both Windows and Linux desktops. With the integration of the Amazon WorkSpaces Client, organizations can seamlessly configure and run Amazon WorkSpaces sessions on LEAF OS.
Amazon Workspaces Client integrated in LEAF OS supports following features:
Please refer to the ‘LEAF OS Citrix Setup Guide’ for step-by-step procedures.
Enable BYOD with LEAF OS live boot from USB flash drive:
A bootable USB flash drive can be created containing LEAF OS. Any x86-64 hardware device can boot to LEAF OS and instantly become a locked-down NComputing thin client. LEAF OS does not replace the underlying operating system in this case. When users finish their work, simply reboot from the native OS providing an ideal work-from-home environment.
Revitalize aging PCs/Laptops by repurposing with LEAF OS:
LEAF OS can also be flashed directly to the internal hard drive, turning any x64 PC or laptop (with BIOS or UEFI motherboard firmware) into a permanently repurposed, high-performance thin client.
Supported internal storage type for PC/laptop/thin client repurposing:
Device configuration version used by this LEAF OS version
PMC Endpoint Management (version 4.1 and higher)
LEAF OS device license comes with a perpetual license to use PMC endpoint management. LEAF OS devices can be easily configured using PMC Endpoint management software. An admin can remotely manage LEAF OS devices over local and wide-area networks, including locations behind firewalls and NAT-routers through an easy-to-use, web-based user interface. PMC comes with automatic discovery, check-in and configuration provisioning of new devices making deployment easy. Administrators can setup device profiles complete with all settings and configurations, then push the profile to individual or grouped devices. Only a few clicks are needed to schedule device firmware updates, access the summary dashboard or view the detailed event logging. Users are always up-to-date with the latest technology.
To ensure smooth transition and uninterrupted management ability, NComputing suggests updating PMC to latest version before upgrading to the latest LEAF OS version. To be able to remotely manage LEAF OS devices, upload of a corresponding PMC configuration update file (PCU file) with the support for the latest LEAF OS configuration version will be necessary.
Please refer to PMC Release Notes for the information about PMC updating.
vSpace Console (only available in vSpace Pro Enterprise desktop virtualization)
Included in the vSpace Pro Enterprise Edition release (version 12.9.1 or higher), vSpace Console can manage a subset of LEAF OS device configurations for LEAF OS related to vSpace configuration parameters and provide integrated user session management of LEAF OS devices (e.g. Multi-View, remote view, take over, message, stop/pause).
LEAF OS device activation license
Each LEAF OS device (PC/laptop/thin client) requires its corresponding LEAF OS device activation license (perpetual). The LEAF OS device license also comes with complimentary 1st year device AMP coverage (i.e. software maintenance update), and complimentary perpetual use for PMC Endpoint Management software.
The following is the LEAF OS device activation license SKU:
After the first year, additional coverage of device AMP (software maintenance) will be required to receive firmware updates.
Device AMP (software maintenance) – (optional)
The following device AMP (software maintenance) renewal durations are available after the first year of coverage:
Connecting to vSpace Pro Enterprise servers (optional)
vSpace Client connections from LEAF OS are only supported on latest vSpace Pro Enterprise (12.9.1 or newer) servers. vSpace Pro LTS servers will not accept connections from LEAF OS devices.
Unlike the vSpace Clients contained in the NComputing RX300 thin client devices, the vSpace Clients from LEAF OS devices do not contain any embedded vSpace Client connection licenses. Appropriate vSpace Client connection licenses need to be purchased and added to the vSpace Pro Enterprise deployments to allow uninterrupted vSpace Client connections from LEAF OS devices. Without the necessary licenses, the vSpace sessions will run in trial mode and will be disconnected after 10 minutes.
vSpace Pro Client Connection License for LEAF OS ordering SKUs:
Connecting to VERDE VDI or VERDE Remote Access (optional)
Two license types are supported. Both are concurrent connection models:
This license type allows Remote Access connections to PCs through the VERDE Connection Broker and is the most affordable option.
This license type allows Remote Access connections to PCs through the VERDE Connection Broker and supports connections to VDI sessions hosted by VERDE Servers.
Skip this step if you are using NComputing EX500/EX500W thin client.
Download and prepare LEAF OS installation
Use case #1 – live boot LEAF OS using USB memory stick
By default, your device will always live boot LEAF OS from the connected USB flash drive. There will be no changes to the PC/laptop’s internal HDD.
Use case #2 – flash LEAF OS into HDD/SSD/eMMC/NVMe internal storage to boot from
Your device’s internal storage will be wiped and flashed with LEAF OS. When you boot the device, the LEAF OS will be directly booted from the internal HDD/SSD/eMMC/NVMe storage.
The installation process may take several minutes. Please wait until it is finished. Once the internal storage is flashed, you will be prompted to shut the PC/laptop down and reboot.
Skip this step if you are using NComputing EX500/EX500W thin client. EX500 thin client (SKU: 700-0038) and EX500W (SKU: 700-0048) come with an activated LEAF OS perpetual license.
If you already have a valid LEAF OS license key, enter it (one time action) and click on ‘Activate Now.
If you don’t have a LEAF OS license, click on [Try for Free] to start the free trial. The free trial duration is subject to change. At the time of this writing, LEAF OS free trial is 7 days on 3rd party hardware and 60 days on NComputing EX500 thin client (part# 700-0037).
Having trouble booting LEAF OS USB memory drive? Please refer to the ‘Quick Install Guide: LEAF OS USB live boot’ on how to perform live boot from connected USB memory stick on different PC/laptop models.
HDD/SSD is visible, but not USB
If the HDD/SSD option is visible at Boot Menu, but not the USB drive, follow these tips and reboot your computer to try again:
USB not booting
User interface with workspace concept:
Devices running LEAF OS, EX500W, RX540 and RX580 devices adopt LEAF OS workspace user interface. The desktop icons allow easier access to local applications and to resources published in DaaS and VDI environments, simplify the multi-tasking, and improve the overall user productivity.
The applications and published resources can be accessed through the icons presented on the Desktop, in Start Menu, or in the App Launcher:
Newly created applications will, by default, be shown on the Desktop and Start Menu. Customers preferring to configure the devices as a locked-down kiosks (without any icon to be shown on the Desktop, Start Menu, or App Launcher, and with Auto-Launch) should deselect the Show on App Launcher, Show on Start Menu, and Show Desktop icon options, select Auto-launch, and choose Restart as Action on exit. This can be done by editing the application under Settings > Applications. Please refer to this KB article on how to setup locked-down kiosk mode in LEAF OS.
When using high-resolution displays, especially 4K, it may be beneficial to upscale the LEAF OS GUI components, to make them appear bigger and thus become better readable. Scaling factors from 100% (which is the default, meaning no scaling) to 200% are selectable under Display settings. The RX540/RX580 components which will respect the scaling selection are:
Note: The scaling ratio of some LEAF OS applications might be silently adjusted to a value accepted by the application or kept set to 100%, if the application does not support scaling.
AVD, Windows 365 and RDP clients related:
The LEAF OS firmware supports connections to Microsoft Azure Virtual Desktop deployment hosted in Microsoft Azure cloud. Supported AVD releases include:
After logging into the AVD account, user will be presented with a list of AVD published resources. The resource listing can be expanded or collapsed by clicking at the top-level category. Double-clicking on any RemoteApp or desktop icon allows launching the resource. The taskbar at the bottom of the screen can be used to manage multiple opened applications.
The Kiosk Mode settings allow the user to automatically login to his/her AVD account and, if required, automatically launch a particular Windows application or desktop. Please note that multifactor authentication (MFA) is not supported when User auto-logon is enabled in AVD Client mode.
LEAF OS allows pre-population of AVD user names, so the users can only enter the password (or proceed with multi-factor authentication) to authenticate. The AVD user name will be composed as Username@Domain, where the Username and Domain are the values taken from the corresponding fields of Kiosk Mode settings. The User auto-logon option should not be selected to only pre-populate the AVD user name (but not trigger the authentication process).
In the AVD Client application, under Application Settings, the AVD (ARM-based) or Windows 365 release needs to be selected to be able to connect to Microsoft Windows 365 Cloud PC.
In optimized Microsoft Teams application, audio and video streams are offloaded from the virtual desktop or remote desktop session and processed locally on the client device. This helps reduce network bandwidth usage and improves overall user experience by minimizing latency and providing smoother video conferencing.
To enable Teams AV optimization, both server-side and client-side needs to be configured.
Server-side configuration:
Client-side configuration:
To enable the AAC audio codec:
To enable RDP Shortpath, both server-side and client-side needs to be configured.
Server-side configuration:
Client-side configuration:
Up to LEAF OS 4.11.2, the AVD Client was always using its own embedded web browser engine to render the Azure logon page and to perform the AVD user authentication. The 5.5.8 version and higher added to the AVD Client an option to use an external browser engine (Chromium) to perform the user authentication. This provides better support for 3rd party multi-factor authentication methods, such as Cisco DUO MFA. This option can be enabled by selecting the Use external browser for authentication checkbox available under Settings > Applications > AVD Client > Application Settings.
Note: When the Use an external browser for authentication will be selected for any AVD release or when the Windows 365 Frontline release will be selected, the NComputing AVD Client application will use the Azure Application Identifier (ID) of NComputing AVD Client instead of the identifier of Microsoft 1st party Azure Virtual Desktop Client application. You will need to grant consent for the usage of the NComputing AVD Client within your organization. This can be easily accomplished by an Azure Active Directory admin user with the authority to approve consent requests for the organization. If the application has not yet been consented in your Azure tenant, users will be unable to utilize the NComputing AVD Client application to connect to your AVD or Windows 365 resources.
Starting with LEAF OS version 5.12.4, seamless authentication to AVD is supported using Microsoft Entra SSO. This enhancement simplifies Azure login and enables streamlined access to AVD resources. The default AVD configuration already supports Entra SSO authentication for accessing AVD sessions. Here are relevant default parameters in AVD Client > Application Settings:
Starting with LEAF OS version 5.12.4, support for smart card authentication with Microsoft Entra SSO is supported.
Setup introductions:
Ensure that Microsoft Entra SSO is configured and enabled in your Azure environment.
Authentication workflow:
The repeated authentication step is due to a current limitation with the Microsoft AVD software development kit.
The LEAF OS firmware supports RemoteApp and Desktop Connections. The parameters necessary for the RDP Client connection are different depending on the RemoteApp support being enabled or not.
The AVD client can be used for on-prem RDP connections. Users can benefit from the features which are available in the AVD client (which is based on official Microsoft Linux client SDK), but absent in the standard RDP client, especially from Microsoft Teams Optimization.
The LEAF OS firmware allows specifying custom parameters for RDP connections. If multiple custom parameters must be specified, then they should be separated by the “;” (semicolon) character.
Note: Custom parameters can be specified separately for the RDP and AVD client type selections. The syntax of the custom parameters for both client types is different. Please refer to FreeRDP documentation for the information about supported parameters for the RDP client type selection: https://github.com/FreeRDP/FreeRDP/wiki/CommandLineInterface
Following custom parameters allow using the AVD client as the RDP client for connections which need to travers an RD Gateway:
gatewayhostname=s:<hostname>
gatewayusage=i:<gateway_usage_method>
As all other customer parameters, multiple parameters can be specified in the input field, separated with semicolons, e.g.:
gatewayhostname=s:rdgw.company.com;gatewayusage=i:2
Descriptions of possible <gateway_usage_method> values:
The RDP and AVD clients integrated in LEAF OS devices support the use of H.264/AVC encoding (Advanced Video Codec) in RDP and AVD sessions. Using AVC ensures the best AVD user experience. To take advantage of this H.264/AVC graphics mode, following Group Policy setting must be enabled:
Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Remote Session Environment: ‘Prioritize H.264/AVC 444 graphics mode for Remote Desktop Connections’.
This Group Policy setting can be deployed through Active Directory Group Policy Objects or, in simplest case, it can be configured on the local machine with Local Group Policy Editor (gpedit.msc).
The RDP and AVD clients integrated in LEAF OS support the native (functional) redirection of USB webcams. This redirection is only supported in RDP, AVD and Windows 365 sessions if the Remote Desktop Session Host is a Windows Server 2019 or a Windows 10 machine. To ensure proper webcam redirection, please make sure that the following Group Policy setting is not enabled:
Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection: Do not allow video capture redirection
This Group Policy setting can be deployed through Active Directory Group Policy Objects or, in simplest case, it can be configured on the local machine with Local Group Policy Editor (gpedit.msc).
Additionally, each user under Settings > Privacy > Camera, needs to allow the applications to access the camera.
Note: Webcams described as driverless Windows webcams (webcam not requiring any special vendor drivers to work on Windows) or Video for Linux version 2 compliant webcams should work.
The RDP and AVD clients integrated in LEAF OS devices support the native (functional) redirection of local printers. USB and network printers are supported. To ensure proper printers redirection, please make sure that the following Group Policy setting is not enabled:
Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Printer Redirection: Do not allow client printer redirection
Printer drivers appropriate for the redirected printers must be installed on the RD Session Host or AVD VM for successful printers redirection. ‘x64, Type 3 – User Mode’ printer drivers need to be installed. The ‘Remote Desktop Easy Print’ driver cannot be used with printers redirected from LEAF OS devices. To prevent the attempts to use this unsupported driver, the following Group Policy setting can be disabled in Computer Configuration or User Configuration:
Computer/User Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Printer Redirection: Use Remote Desktop Easy Print printer driver first
The above mentioned Group Policy settings can be deployed through Active Directory Group Policy Objects or, in simplest case, they can be configured on the local machine with Local Group Policy Editor (gpedit.msc).
Following are the topics to consider when planning to use the native/functional redirection of printers in RDP sessions:
wmic /NameSpace:\\Root\CIMV2 path Win32_PrinterDriver GET Name
The RDP and AVD clients integrated in LEAF OS devices support the native (functional) redirection of smart cards (smart card readers). CCID-compliant, ReinerSCT and ACS smart card readers are supported. To ensure proper smart cards redirection, please make sure that the following Group Policy setting is not enabled:
Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection: Do not allow smart card device redirection
This Group Policy setting can be deployed through Active Directory Group Policy Objects or, in simplest case, it can be configured on the local machine with Local Group Policy Editor (gpedit.msc).
The RDP and AVD clients integrated in LEAF OS devices support the Generic USB redirection of peripheral devices. In Windows Server 2016/2019 and Windows 10 the ‘Do not allow supported Plug and Play device redirection’ Group Policy setting is enabled by default (when not configured), which prevents the Generic USB redirection of the peripheral devices to those operating systems. This Group Policy setting can be found under ‘Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection’. To be able to use the Generic USB redirection of RX420(RDP) and RX-RDP+ peripheral devices, this policy must be explicitly disabled. This Group Policy setting can be deployed through Active Directory Group Policy Objects or, in simplest case, it can be configured on the local machine with Local Group Policy Editor (gpedit.msc).
In Windows Server 2012 R2, Windows 8.1 and older Windows server and desktop operating systems the Remote Desktop Services by default allows the redirection of supported plug and play devices, thus the ‘Do not allow supported Plug and Play device redirection’ Group Policy setting does not need to be altered.
Enabling the RemoteFX feature for Remote Desktop connections greatly improves user experience in legacy Windows OS versions by providing very good GUI performance. This is thanks to optimized algorithms used to encode the areas of the session screen which contain dynamically changing contents (like videos or animations). Ideally the screen encoding on the server side should be accelerated by supported graphics cards. Leveraging server CPUs for RemoteFX screen encoding can cause high load and effectively limit the per-server user density.
Latest versions of Windows operating systems favor RemoteApp publishing and do not allow launching applications with executable program paths specified on the client side. This functionality can be re-enabled by modifying the Windows registry:
Registry key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\TSAppAllowList
Registry value: REG_DWORD fDisabledAllowList
Registry value data: 1
Registry key: HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
Registry value: REG_DWORD HonorLegacySettings
Registry value data: 1
Published RemoteApp program or desktop will be automatically started when program or desktop name will be specified as Application in RDP Client application’s Kiosk Mode settings.
Support for vCAST Web Streaming and vCAST VLC Media Streaming in RDP sessions started from LEAF OS devices requires installation of the NComputing SuperRDP Server Pack software on the Remote Desktop machine. The NComputing SuperRDP server pack is available through your reseller (SKU: SuperRDP-PREM-VC-P).
The vCAST Web Streaming and vCAST Media Streaming technologies require the client device to use optimized display drawing to work properly. Such optimized drawing methods are only available when the terminal session runs in full-screen desktop mode. For that reason, vCAST is not supported in published RemoteApp programs. RemoteApp desktop sessions run in full-screen mode and support vCAST.
Note: For vCAST support in RDP sessions, the SuperRDP software must be installed on the remote machine.
The vCAST Media Streaming technology can only offload to the client device H.264-encoded media contents. For other formats, the VLC player needs to have the ‘Windows GDI’ video output selected under Video output settings.
Citrix Workspace App related:
At the time of this KB article, LEAF OS (x86-64) version 6.7.2 contains two selectable Citrix Workspace app for Linux versions: 2411 and 2303. In this LEAF OS version, the Latest version selects Citrix Workspace app 2411.
Following Citrix Workspace app settings can be configured:
Configuring custom parameters for Citrix Workspace app
LEAF OS firmware allows injecting new or modifying existing parameters in given sections of the following Citrix Workspace app configuration files:
Please refer to the ‘Citrix Workspace app for Linux OEM Reference Guide’ (https://developer-docs.citrix.com/projects/workspace-app-for-linux-oem-guide/en/latest/reference-information/#configuration-files) for the information about the Citrix Workspace app configuration files, their entries, and values.
The syntax of the custom parameters is:
<filename.ini>:[<section>]<key>=<value>;<filename.ini>:[<section>]<key>=<value>;…
Multiple custom parameters can be specified in one custom parameters line. In such case, the parameters need to be separated with semicolons (without preceding or following whitespaces).
Example:
wfclient.ini:[WFClient]HDXWebCamWidth=1280;wfclient.ini:[WFClient]HDXWebCamHeight=720
The above line defines two custom parameters for the wfclient.ini file and adds the following entries to the [WFClient] section of that file:
HDXWebCamWidth=1280
HDXWebCamHeight=720
The above will set the picture resolution of 1280x720 for the Citrix HDX Webcam redirected with the Citrix HDX RealTime Video Compression feature.
Time zone mapping
Citrix Workspace app integrated in LEAF OS devices supports mapping of the client’s time zone. Time zone can be selected under Date and Time settings.
On the Citrix Virtual Desktop Agent side, the Use local time of client Citrix Policy setting can be used for controlling this feature. To enable the mapping of client’s time zone, this policy setting must be set to Use client time zone. By default (when not configured), this Citrix Policy setting is set to Use server time zone.
Keyboard layout mapping
Citrix Workspace app sends to the Virtual Desktop Agent machine the information about the keyboard layout configured locally on the client device. The selected keyboard layout will be used in the Citrix sessions connected from the device. There is no Citrix Policy setting for controlling the keyboard layout mapping feature. This feature is enabled by default.
Deploying Certification Authority certificates
Citrix Workspace app needs to trust the issuer of the SSL server certificate presented by the web server hosting the Citrix Store. If necessary (e.g., when using organization’s own Certification Authority), to establish this necessary trust relationship, the certificates of Root and Intermediate Certification Authorities (X.509 certificates) can be added to LEAF OS devices. This can be done in Security settings. LEAF OS devices accept Base64-encoded Certification Authority certificates. The Base64-encoded X.509 certificate format is commonly known as PEM format. Please refer to the ‘Security Settings’ section of ‘LEAF OS and RX-series User and Configuration Guide’ for more information. Download link can be found in the ‘Additional Resources’ section below.
Server-side control over native/functional redirection of peripheral devices
The Peripherals settings of RX540 and RX580 devices allow selecting the redirection type for different peripheral device classes. However, these client-side settings cannot overwrite the settings, which are configured on the server side. The redirections will only work when the server will not prevent them. The following paragraphs describe the Citrix Policy settings, which can be used for controlling the native/functional redirection of peripherals on the Virtual Desktop Agent side.
Mass storage
On the Citrix Virtual Desktop Agent side, the Client drive redirection Citrix Policy setting can be used for controlling this feature. To allow the native redirection of mass storage devices, this policy setting should not be set to Prohibited. By default (when not configured), this Citrix Policy setting is set to Allowed.
Audio
On the Citrix Virtual Desktop Agent side, the Client audio redirection and Client microphone redirection Citrix Policy settings can be used for controlling this feature. To allow audio output (speakers) redirection, the Client audio redirection policy setting should not be set to Prohibited. To allow audio input (microphone) redirection, both the Client audio redirection and the Client microphone redirection policy settings should not be set to Prohibited. By default (when not configured), these Citrix Policy settings are set to Allowed.
Printers
Citrix Workspace app integrated in LEAF OS devices supports the native (functional) redirection of USB and network (JetDirect) printers. On the Citrix Virtual Desktop Agent side, the Client printer redirection Citrix Policy setting can be used for controlling this feature. To allow the native redirection of printers, the Client printer redirection policy setting should not be set to Prohibited. By default (when not configured), this Citrix Policy setting is set to Allowed.
The native redirection of printers requires the printers to be defined locally on the LEAF OS device. When adding USB printers, a USB printer identification string needs to be specified. It can be also pulled from the USB printer, if it is connected. This serves the purpose of identifying the different USB printers, when multiple USB printer will be connected. In case of single USB printer, this field can be left empty. For each configured printer, the exact name of corresponding Windows printer driver must be specified. This driver must be installed on the Citrix VDA machine for successful printer redirection.
The first printer from the list will be configured as the default printer and will also become the default printer in the Citrix session.
Printer drivers appropriate for the redirected printers must be installed on the Citrix VDA machines for successful printers redirection. ‘x64, Type 3 – User Mode’ printer drivers need to be installed. The Citrix universal print driver cannot be used with printers redirected from LEAF OS devices. To prevent attempts to use this unsupported driver, the Universal print driver usage Citrix Policy setting can be set to Use only printer model specific drivers.
Webcams (video devices)
There is no Citrix Policy setting for controlling the webcam redirection (actually known as HDX RealTime Video Compression) feature on the Virtual Desktop Agent side. This feature is enabled by default.
Smart cards readers
Citrix Workspace app integrated in LEAF OS supports the native (functional) redirection of smart cards (smart card readers). CCID-compliant, ReinerSCT, and ACS smart card readers are supported.
There is no Citrix Policy setting for controlling the smart cards redirection feature on the Virtual Desktop Agent side. This feature is enabled by default.
Serial ports
The /dev/ttyUSB0, /dev/ttyUSB1, /dev/ttyACM0 and /dev/ttyACM1 serial devices will be redirected as client’s COM1, COM2, COM3 and COM4 ports, accordingly.
On the Citrix Virtual Desktop Agent side, the Client COM port redirection Citrix Policy setting can be used for controlling this feature. To allow the native redirection of serial ports, this policy setting must be set to Enabled. By default (when not configured), this Citrix Policy settings is set to Disabled.
Generic USB redirection of peripheral devices
Citrix Workspace app integrated in LEAF OS devices supports the Generic USB redirection of most peripheral device classes (excluding the smart card readers). However, wherever possible the native redirection should be used, as in the majority of cases it is the most reliable and best optimized redirection method. The Generic USB redirection should generally be used only as the last resort method for device classes (like HID devices), for which no native redirection method exists. LEAF OS firmware tries determining the USB classes of connected USB devices and only attempts to use the Generic USB redirection for that device, where the Generic method has been really selected. USB devices which in their USB descriptors contain the Vendor Specific Class (0xFF) cannot be automatically categorized by the device firmware and must be added to the Custom VID:PID list to be redirected in the Generic way.
This can be configured under Peripherals > Custom Devices, when the General redirection policy is set to Custom.
On the Citrix Virtual Desktop Agent side, the Client USB device redirection Citrix Policy setting can be used for controlling this feature. To enable the generic redirection of USB devices, this policy setting must be set to Allowed. By default (when not configured), this Citrix Policy setting is set to Prohibited.
Other considerations regarding Citrix Workspace app
LEAF OS devices allow launching Citrix sessions from the Chromium browser. All applicable Citrix Workspace app settings and Peripherals settings will be respected when launching Citrix sessions from the Chromium browser.
Citrix Workspace app included in LEAF OS devices contains all the components necessary to redirect the FIDO2 security keys, but the feature itself is disabled by default. To enable the redirection of FIDO2 security keys, the following custom parameter needs to be added under Citrix connection settings:
module.ini:[ICA 3.0]FIDO2=On
Note: On the Citrix server, the VDA version 2209 or newer is required to use this feature.
Philips Speech optimization is supported in both Citrix Workspace app versions contained in LEAF OS (x86-64). This feature is disabled by default. The following Philips Speech optimization channels can be separately enabled under Peripherals > Other Devices:
Omnissa Horizon Client related:
Broker address – the address of Omnissa Horizon server which will authenticate the users and provide list of available virtual desktops.
Protocol – the selection of the display protocol to be used for connections to virtual desktop machines. Blast and RDP protocol selections are possible. Further protocol-specific settings are available on dedicated tabs of the Omnissa Horizon Client application settings dialog. The PCoIP protocol is not available in the Omnissa Horizon Client integrated in LEAF OS.
Desktop size – screen configuration of the virtual desktop. The session can be started in full-screen mode on all connected monitors, in full-screen mode on a single monitor only, in big window, or in a small window.
Guest mode – when not enabled (which is the default), LEAF OS will preserve the configuration changes the user makes through the original Omnissa Horizon Client UI. When enabled, all the user-made configuration changes will be wiped out on LEAF OS reboot.
Show drop down menu bar – this setting controls the appearance of Omnissa Client’s menu bar and connection bar.
SSL verification policy – selection of the checks performed on the SSL certificate presented by the Omnissa Horizon server:
Custom parameters – a semicolon-separated list of custom parameters for the Omnissa Horizon Client. Custom parameters can be used to extend the command line of the Omnissa Horizon Client executable (of the ‘Omnissa-view’ program) or to modify some Omnissa Horizon Client’s configuration files.
The syntax of each Omnissa custom parameter must be one of the following:
Destination: Omnissa-view command line
Parameter syntax: arg:cmdline_parameter
Example: arg:--launchMinimized
Example: arg:+CRLRevocationCheck
Note: the Omnissa Horizon Client application (the ‘Omnissa-view’ program) will be by default launched with the --skipCRLRevocationCheck command line parameter. This parameter lets the client to not perform the revocation checks of the SSL certificates. To enforce those checks, the ‘arg:+CRLRevocationCheck’ custom parameter must be used.
Destination: /etc/Omnissa/config file
Parameter syntax: config:parameter_name=parameter_value
Example: config:RemoteDisplay.AllowAudio = "false"
Destination: /etc/Omnissa/viewagent-custom.conf file
Parameter syntax: viewagent-custom.conf:parameter_name=parameter_value
Example: viewagent-custom.conf:BlastProxy.log.logLevel = 'verbose'
Destination: $HOME/.Omnissa/view-preferences file
Parameter syntax: view-preferences:parameter_name=parameter_value
Example: view-preferences:view.enableHEVC = 'FALSE'
Following Blast protocol settings can be configured for the Omnissa Horizon Client:
The Blast protocol settings configurable here are same as the ones which are configurable in the Omnissa Horizon Blast Configuration dialog, accessible from the File > Configure Omnissa Blast menu of the original Omnissa Client UI. Additionally, the Microsoft Teams optimization, multimedia, and web contents redirection settings are configurable under Blast Settings.
The Omnissa Horizon Client can be configured to Remember last logged user name. This option can be enabled in Omnissa Horizon Client’s Application Settings.
Note: The Guest mode option must be not enabled for the user name remembering feature to be able to persistently save the user name.
Omnissa Horizon Client needs to trust the issuer of the SSL server certificate presented by the Omnissa Horizon server (accessible through the Broker address specified in Application Settings). If necessary (e.g. when using organization’s own Certification Authority), to establish this necessary trust relationship, the certificates of Root and Intermediate Certification Authorities (X.509 certificates) can be added to LEAF OS devices under the Security settings. LEAF OS accepts Base64-encoded Certification Authority certificates. The Base64-encoded X.509 certificate format is commonly known as PEM format. Please refer to the ‘Security Settings’ section of ‘LEAF OS and RX-series User and Configuration Guide’ for more information (you will find the download link in the ‘Additional Resources’ section below).
Omnissa Horizon Client in LEAF OS supports the Native (functional) redirection of USB and network (JetDirect) printers. The native redirection of printers requires the printers to be defined locally on the LEAF OS device. When adding USB printers, a USB printer identification string needs to be pulled from the USB printer (if it is connected) or specified manually. This serves the purpose of identifying the different USB printers, when multiple USB printers will be connected. In case of single USB printer, this USB identification field can be left empty. For each configured printer, the exact name of Windows printer driver must be specified.
For each defined printer, LEAF OS will create two printers: first – with the original name, and the second – with the original name and with the ‘_local’ suffix appended. For the first printer, LEAF OS will not configure any Linux printer driver (so this printer will only act as a spooler and will then send the spooled print jobs to the physical printer without reformatting them). This printer will be used in VDI connections using the RDP protocol. The specified Windows printer driver name will be reported to the virtual desktop VM when making connection with the RDP protocol. The virtual desktop VM must have this exact driver installed to be able to load it when creating the redirected printer. ‘x64, Type 3 – User Mode’ printer drivers are appropriate for the Native redirection of printers with the RDP protocol. For the second printer (the one with ‘_local’ suffix), LEAF OS tries to find and to load an appropriate Linux printer driver. This second printer will be used for the printers redirection with the Blast protocol. No dedicated Windows printer driver needs to be installed on the virtual desktop VM in this case. The print job received from the virtual desktop will be rendered on LEAF OS with the help of the Linux printer driver and only then sent to the physical printer.
CCID-compliant, ACS, and Reiner SCT CyberJack smart card readers are supported and will be redirected with the Native method with both protocols (RDP and Blast).
Serial ports (USB-to-serial adapters) can be redirected with the Native redirection method when the RDP protocol will be selected. The /dev/ttyUSB0, /dev/ttyUSB1, /dev/ttyACM0 and /dev/ttyACM1 serial devices will be redirected as client’s COM1, COM2, COM3 and COM4 ports, accordingly.
Serial ports can be redirected with the Generic USB redirection method when the Blast protocol will be selected. Omnissa’s own Generic USB redirection implementation will be always used in this case, no matter what redirection method is selected for the Serial Ports in the Peripherals settings. Windows driver for the connected USB-to-serial adapter needs to be installed on the virtual desktop VM for the serial ports redirection to work in this case.
vSpace Pro Client and VERDE VDI Client related:
Native webcam redirection is supported in vSpace Pro Enterprise 12.4 or later. To enable this functionality, each user must grant camera access to applications under their system’s Privacy settings.
The VERDE VDI Client has been upgraded to support Microsoft Teams optimization when using the AVD client type. Users can now choose the AVD client for RDP connections to access VERDE VDI environments. For detailed setup on both the server and client sides, refer to this related knowledge base article knowledge-based article.
Local Chromium Browser, Microsoft Teams PWA, Custom Local Applications related:
The Microsoft Teams app for Linux was announced to be end-of-life (EOL) in April 2024. Microsoft recommends transitioning to the Teams PWA as a replacement. In LEAF OS 5.12.4 and later, the Teams PWA can be created within the built-in Chromium browser.
To enable Teams PWA from the built-in Chromium:
With the above configuration, the Chromium Browser and Teams PWA icons will appear in the Start Menu and/or on the Desktop and/or in the App Launcher. To only allow the access to Teams PWA, without enabling the access to Chromium browser:
Note: When launching Teams PWA for the first time, an instance of the Chromium browser will open to install the MS Teams Progressive Web Application. For subsequent launches, Teams PWA will function like a native application without opening the Chromium browser.
For each defined local printer, an additional instance of the same printer gets created with the '_local' suffix appended to the name. For this additional printer, based on the specified Windows Printer Driver Name, LEAF OS tries to find a suitable Linux printer driver. With that, the local Chromium web browser should be able to print. In Chromium, using the ‘See more…’ options in Printing dialog may be necessary to find the additional local printer:
In the example above, the 'HPDJ_5520' printer was defined in the device configuration. This caused the creation of two Linux printers: HPDJ_5520 (driverless, to be used in AVD, RDP, and Citrix sessions only) and HPDJ_5520_local (with Linux driver configured, to be used in Chromium browser).
Chromium policy customization file can be added Chromium browser under its Application Settings. Please refer this KB article ‘Customize local Chromium browser policy settings’ for configuration details.
LEAF OS is an x86-64 Linux-based operating system designed for PC and laptop repurposing. Technically, applications or drivers which can be installed in a 64-bit Ubuntu Desktop environment should also be installable on LEAF OS to expand its functionality. This is possible with LEAF OS firmware version 3.3.5 or higher versions.
3rd party applications need to be appropriately “packaged” to make them deployable to LEAF OS devices. This packaging process must be performed with care to ensure that all required components and dependencies for the application, such as libraries, system services, drivers, etc., are included. Depending on the 3rd party application specifics, different levels of Linux expertise is required to perform the packaging process. For more advanced applications, collecting the necessary dependencies might be a complicated process requiring several days of work. If you don’t feel comfortable doing it on your own, please ask your NComputing representative and we will be glad to assist with a one-time professional service fee.
The following is a list of relevant online articles describing this topic in detail:
The system extension needs to contain the following file:
/etc/rx-ui-params
This file can contain two parameters: microphone_default_volume and speaker_default_volume. They can be used to set the default volumes (in percents, where 100 is the maximum), as in following example:
microphone_default_volume=80
speaker_default_volume=90
Refer to the ‘Extending the base LEAF OS functionality with custom modules and custom applications’ section for more information about the system extension modules.
Networking and connectivity related:
LEAF OS supports Bluetooth audio and human interface devices (keyboard and mouse). It’s end-users’ responsibility to properly pair the necessary Bluetooth devices and mark them as trusted.
The preferred Bluetooth audio profile can be selected under Peripherals > Bluetooth:
Other device settings related:
LEAF OS allows using the Simple Certificate Enrollment Protocol for obtaining the Certification Authority and client certificates, which can then be used for the 802.1x network authentication with the TLS protocol. The SCEP settings can be configured on the Security > SCEP page of the Setup UI.
The configurable parameters are:
No other components than the Common Name will be included in the subject of the requested client certificate.
Note: The SCEP support has only been tested with the Microsoft Network Device Enrollment Service (NDES) acting as SCEP server. The NDES admin page selection for the SCEP challenge password source will only work when NDES and only when an address (not a URL) has been specified as SCEP server URL.
Information about the Certificate Authority certificate and client certificate currently stored on the LEAF OS device will be displayed above the SCEP settings on the Security > SCEP page of the Setup UI.
The Certification Authority and client certificates obtained with the SCEP protocol can be used for the 802.1x Ethernet and Wi-Fi network authentication with the TLS method. For this purpose, two new parameters have been added to Enterprise (802.1x) Ethernet and Wi-Fi network settings in LEAF OS 6.7.2 or newer version: CA certificate source and Client certificate source. Two selections are possible for both of them: Device configuration and SCEP.
Practical deployment advise:
As the 802.1x network access control standard disallows the network access from devices which cannot authenticate themselves, the LEAF OS device, to be able to make use of the SCEP protocol for obtaining the certificates necessary for 802.1x authentication, must be first temporarily connected to some open network. This open network should allow the device to connect to PMC Endpoint Manager, which should provide to the device the configuration which will: 1. contain the SCEP settings, and 2. contain the 802.1x network settings (including the options to enable 802.1x support with the TLS authentication method and to use the SCEP-obtained certificates for 802.1x authentication). Alternatively, assuming that the final destination of the deployed devices will allow fallback to an open network (e.g., to a guest VLAN), the fallback network should allow access to PMC Endpoint Manager which will provide the necessary configuration. The devices, once configured in the fallback network, should be able to automatically switch to the secured network, as they will already have all the information (especially the SCEP-obtained certificates) necessary to successfully complete the 802.1x authentication.
Before LEAF OS version 6.7.2 it was possible to configure a custom LEAF OS device name by specifying it in device’s General settings. The configured device name will be used by the DHCP client when requesting IP configuration, it gets reported to PMC during check-in, so it can be used to identify the device in PMC, also the VDI clients report the device name to the session hosts which in turn make it available for the applications through the CLIENTNAME environment variable. In older LEAF OS versions, the default device name was set to ‘LEAF’ with the MAC address of the Ethernet or (in absence of Ethernet) Wi-Fi network interface appended.
LEAF OS allows automating the device naming based on configurable rules. The device name prefix, its body (which can be parts of the MAC address), and the suffix are now configurable on the General > Devie Name page of the Setup UI. Following settings are available:
After resetting the device to factory defaults, the prefix will be set to ‘LEAF’, the body will be set to ‘whole MAC address’, and the suffix will be empty. With such settings, the default device name will be set in the same way as it was in the previous LEAF OS versions.
UDS Enterprise client has been updated to version 4.0 in LEAF OS 6.7.2 and newer versions. This client will be launched when the UDS Enterprise connection will be initiated in the Chromium browser and when the ‘RDP Tunnel for Desktop’ will be used for establishing the connection. The RDP Settings, which are configurable for the Chromium browser application, will be taken into account then. Especially, the type of the RDP client used for the connection initiated through Chromium browser can be selected. Selecting the AVD client as client type allows the UDS Enterprise users to benefit from the Microsoft Teams optimization.
LEAF OS 6.7.2 and newer versions contain the AuthX Authenticator application integrated. It allows using the RFID cards to quickly reconnect or disconnect Microsoft RDP or Citrix sessions.
As this feature is still at technical preview stage, the AuthX Authenticator app needs to be set up as a system application. Following parameters need to be configured when defining the AuthX Authenticator app:
General settings:
Application settings:
Following named parameters must be added to the System Application definition with the values taken from your AuthX-protected application settings in AuthX Portal:
LEAF OS provides built-in touchscreen identification tool for dual touchscreen setups (primary & secondary display).
The ‘onboard’ on-screen keyboard is integrated in LEAF OS. The on-screen keyboard can be configured on the Keyboard and Mouse > On-Screen Keyboard Settings page of Setup UI.
The LEAF OS device can be configured to execute the following actions when the user will press the power button:
The actions can be executed immediately or postponed for a specified period of time, when a pop-up message with a countdown counter will be displayed allowing the user to cancel the action or to select a different one.
To configure the ‘Power button actions’, go to Settings > Management > Power Button Actions.
The VDI client applications which perform user authentication and enumerate the VDI resources prior to starting the actual terminal session and for which LEAF OS has access to user credentials can be used to control access to other LEAF OS applications. To enable this feature, the Use this application to grant access to other applications checkbox needs to be selected in Application Settings. With this feature enabled, LEAF OS will not allow the access to all other applications (hide the application icons in Start Menu, on the Desktop, and in App Launcher) until the user will successfully authenticate in the one, which has this option enabled.
Following applications can be used for this purpose:
The IBus (Intelligent Input Bus) component can be optionally enabled under Keyboard and Mouse settings for the Chinese, Korean, Japanese, and Thai keyboard layouts. This allows proper keyboard input in local Chromium, Teams, and Zoom applications.
Note: Enabling IBus is not necessary (and even not advisable) if no local LEAF OS applications are used and the user will only work in remote desktop sessions.
PMC Endpoint Manager related:
Each LEAF OS device comes with a perpetual license for the PMC Endpoint Manager software and first-year complimentary software maintenance update (AMP for RDP) license. After the expiration of the first-year complimentary Device AMP license, the device will not be able to receive and apply firmware updates. An extended Device AMP licenses must be purchased and allocated to each RX540 and RX580 device to allow local or remote (via PMC) firmware updates.
To automate the PMC server discovery the DHCP option 207 can be used. This DHCP option should provide a string value containing the URL in form of ‘https://<PMC_address>’, like: ‘https://pmc.company.local’, or: ‘https://10.25.40.190’. If DHCP response will not contain the 207 option, LEAF OS will attempt to use the ‘https://pmc’ URL as PMC URL. This will work if the DNS system for the current DNS domain will be able to resolve the ‘pmc’ hostname to a valid PMC IP address. Concurrently, after booting up, LEAF OS will also try to get in touch with NComputing Management Portal to obtain the information about the LEAF OS device’s AMP subscription. Management Portal’s response can contain an address or URL of PMC. In Management Portal, separate PMC addresses or URLs can be provided for the license keys redeemed on the user account and used for LEAF OS activation. If one is returned, the LEAF OS device will attempt to connect to PMC through the URL or address returned by Management Portal. Effectively, the priority of the PMC server discovery methods is the following:
Once a PMC URL is determined using one method, no other methods will be tried. LEAF OS will keep trying to use the first auto-discovered URL even if the PMC connection through that URL will fail.
The software components allowing device screen shadowing from PMC act as yet another VNC viewer application. The VNC screen shadowing feature needs to be enabled on the devices for the PMC screen shadowing feature to work.
When the Require passcode for device onboarding option will be activated under System Settings of PMC Endpoint Manager, then newly connecting devices will prompt the users to provide the onboarding passcode. Only if the user will provide correct onboarding passcode the device will successfully check-in and will be added to PMC’s database. This is a one-time process only. Already onboarded devices will never prompt users for any onboarding passcode.
The results of network tests will be saved into a temporary file, which will be collected when creating a Troubleshooting File. The device will also execute the network tests when creating the Troubleshooting File on PMC administrator’s request. Appropriate test parameters (address and port) should be configured on the device before requesting the Troubleshooting File with PMC.
When the device user will press the Shift-Ctrl-F2 key combination to ‘raise hand’ to PMC, PMC will display a notification and put a timestamp information into the Raised Hand column of Devices list.
LEAF OS allows establishing Secure Shell (SSH) connections to LEAF OS Linux shell. The Secure Shell access is disabled by default and can be enabled under Management > Secure Shell settings. The user with Secure Shell access is ‘rx’ and a password must be set to allow the access.
RX420(RDP), RX440(RDP), RX-RDP+ and LEAF OS are easy-to-use and provision. For users who want to learn how to use advanced features and/or customizations, please refer to the RX420(RDP), RX-RDP+ and LEAF OS User Configuration Guide:
https://ncomputing.box.com/shared/static/310pp20tfhh4aqc6x4nj14sxch52q360.pdf
NComputing PMC is a endpoint management system designed and developed to remotely manage NComputing access devices.
Please refer to the PMC Quick Start Guide:
https://support.ncomputing.com/portal/en/kb/articles/pmc-3-0-start-guide