/build/static/layout/Breadcrumb_cap_w.png

Dangers of Current User Keys left in Terminal Server packages?

Hi All,

As the post says, I am working at an organisation where before I arrived the previous company managing the project have been deploying packages to terminal servers with the Current User registry information still in the package. These packages are now on some live servers. We are about to start building some more servers for new departments and I was just checking the packages to make sure they were ok. Unfortunately the more I dig the more bad news i seem to find.
I know that when packaging applications for Terminal Servers that you need to install any Current User registry information to the shadow keys.
I do not like deploying bad packages that go against best practices and so want to advise management that they should consider repackaing these "bad" msi's. However, I will be asked what the danger is in deploying these packages with Current User information to the Terminal Servers so I was hoping that someone could tell me what the dangers are in deploying these packages and whether I should push for these to be repackaged correctly. My gut feeling is telling me we need to repackage these msi's.

What do you think? Any help or advice is much appreciated.

Rgds,
Mark

0 Comments   [ + ] Show comments

Answers (2)

Posted by: cygan 14 years ago
Fifth Degree Brown Belt
0
as per your concerns
I am working on a citrix migration project creating msi's for citrix presentation server 4.5
It is acceptable to install per-user registry information at setup time (for terminal server /citrix apps) as long as none of the keys contain user information (e.g. contains %USERPROFILE% or %USERNAME%).
For applications to be Terminal Server /citrix compliant, they must be able to work for multiple users concurrently. They cannot be CPU intensive or write user information to any shared files or registry keys.

also remove all advertising info and put them in the registry table as I am sure you don't want to trigger any kind of self repair on your servers.
and also do not advertise your features/ shortcuts
Posted by: MSIPackager 14 years ago
3rd Degree Black Belt
0
There is no problem having current user keys in your MSI packages destined for thin client servers - we do however remove keypaths for current user components to avoid the risk of kicking off a self repair. Some also like to diable advertising of shortcuts as cygan suggests.

The shadowing you refer to is done automatically, as long as the server is put into install mode (change user /install) before the installation and execute mode (change user /execute) after.

Doesnt meant to say there aren't other issues with the packages you are looking at, but on the face of it I don't consider this to be one.

Regards,
Rob.
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.
 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ