このページは、お客様の言語ではご利用いただけません。Huawei Cloudは、より多くの言語バージョンを追加するために懸命に取り組んでいます。ご協力ありがとうございました。
- Product Bulletin
- Function Overview
- Service Overview
- Getting Started
-
User Guide (End Users)
- Getting to Know Workspace
- Introduction to Terminals
- Logging In to a Desktop Using an SC
- Logging In to a Desktop Using a TC
- Logging In to a Desktop Using a Mobile Terminal (Android)
- Desktop Assistant
- Changing the Login Password
- Forbidden Operations
- Configuring Dual-Screen Display
- Common Function Configuration
- Change History
-
User Guide (Administrators)
- Overview
-
Desktops
- Managing Desktops
- Collaborative Desktops
- Assigning Desktops
- Unbinding a User
- Viewing Desktops That Fail to Be Created
- Modifying Specifications
- Recomposing a System Disk
- Adding a Disk
- Expanding the Disk Capacity
- Deleting a Disk
- Managing Tags
- Converting a Desktop to an Image
- Configuring a Desktop Network
- Changing the Desktop Billing Mode
- Renewing a Yearly/Monthly-Billed Desktop
- Unsubscribing from a Desktop
-
Desktop Pools
- Managing Desktop Pools
- Viewing Desktops That Fail to Be Created in the Desktop Pool
- Modifying Specifications
- Adding a Desktop to a Desktop Pool
- Recomposing a System Disk
- Adding Disks
- Expanding the Disk Capacity
- Deleting Disks
- Creating an Image
- Adding Users or User Groups
- Removing Users or User Groups
- Renewing a Yearly/Monthly-Billed Desktop Pool
- Unsubscribing from a Desktop Pool
- Users
- User Groups
- Policy Management
- OU Management
-
Tenant Configuration
-
Basic Configuration
- Configuring an AD Domain
- Configuring AD Domain Certificate Authentication
- Changing the Domain Administrator Password
- Modifying Domain Configurations
- Changing the Internet Access Mode
- Changing the Service Subnet
- Canceling a Service
- Reactivating a Service
- Configuring Whether to Block Notification Emails for Desktop Unsubscription or Deletion
- Multiple VPCs for Workspace
- VPC Sharing for Workspace
- Enabling NAT Mapping for Direct Connect
- Configuring User Log Collection
- Upgrading Client and VM Components and Rotating Authentication Credentials
- Other
- Authentication Configuration
- Other
-
Basic Configuration
- Internet Access Management
- Monitoring and Analysis
- Tasks
- O&M
- Application Center
- Private Images
- Permission Management
- Data Backup and Restoration
- Common Function Configuration
- Monitoring
- Subscribing to an Event
- Change History
- Best Practices
-
FAQs
-
FAQs for Administrators
- What Are the Features and Advantages of Workspace?
- How Is Workspace Charged?
- How Do I Check My Quotas?
- How Do I Increase My Quotas?
- How Do I Add a Disk?
- How Do I Connect the Desktop to a Local Printer?
- How Do I Connect the Desktop to a Network Printer?
- How Do I Do If the Desktop Fails to Connect to the AD?
- Can I Change the User Authentication Mode of the Desktop?
- How do I Enable LDAPS on the AD Server?
- How do I Export the Root Certificate of an LDAPS-enabled AD server?
- What If I Fail to Purchase a Desktop?
- How Do I Do If the Functions of Purchasing a Desktop, Creating a User, Creating a Policy, and Enabling the Internet are Unavailable?
- Can I Use Private Images to Purchase Desktops?
- How Many Private Images Can Be Created on Workspace at Most?
- What Are the Network Requirements for Logging In to Desktops?
- How Do I Do If My Desktop Cannot Access the Internet?
- How Do I Configure Workspace to Access the Internet?
- How Do I Configure Workspace to Access the Enterprise Intranet?
- How Do I Enable the Internet on Other Cloud Service Pages?
- How Do I Copy Files Between a Desktop and a Local Storage Device?
- What If I Lost the Administrator Password?
- How Does an Administrator Unlock an End User Account?
- How Do I Do If an End User Fails to Log In to a Desktop?
- How Do I Back Up and Restore a Desktop?
- How Do I Do If a Message Is Displayed Indicating Duplicate Policy Names During Policy Import?
- How Do I Do If a User Cannot Be Bound to a Client Using the Dynamic Verification Code of the Previously Bound MFA Device?
- How Do I Do If the Message "Insufficient permissions for the IAM account. Security Administrator permissions required." Is Displayed When I Enable an Agency?
- How Do I Do If a User Does Not Receive an Email for Creating a Desktop or Assigning a User?
- How Do I Add Resources to or Remove Resources from an Enterprise Project After Purchasing Workspace?
- Why Can't I Start a Pay-per-Use Cloud Desktop?
- How Do I Enable IPv6 on Workspace?
- How Do I Enable RDP on Workspace?
- How Do I Configure Security Group Rules When Using a Custom Security Group?
-
FAQs for End Users
-
Desktop Usage Issues
- How Do I Do If the Desktop Freezes?
- How Do I Do If the Disk Space Is Insufficient?
- How Do I Enter the CLI Mode?
- How Do I Do If My Desktop Cannot Connect to the Internet?
- Do Cloud Desktops Support Personalized Settings?
- How Do I Take a Screenshot?
- How Do I Do If the Printer Cannot Be Used?
- What If I Can't Use Network Printers on Workspace?
- How Do I Download the Software?
- How Do I Do If Data Disks of a Windows Desktop Cannot Be Found After Recomposing the System Disk?
- What Do I Do If I Cannot Copy Files Between a Desktop and a Local Storage Device?
- How Do I Do If the Desktop Screen Cannot Be Adapted?
- How Do I Do If I Cannot Receive an Email for Creating a Desktop or Assigning a User?
- How Do I Manually Configure Time Synchronization on a Windows Desktop?
-
Login Issues
- How Do I Do If I Forget the Password?
- What If the Account Is Locked?
- What Devices Can Be Used to Log In to a Desktop?
- What If I Fail to Log in to a Desktop?
- How Do I Do If I Cannot Pass Multi-Factor Authentication?
- How Do I Do If the System Displays a Message Indicating that the Login Fails Due to Policy Restrictions?
- Terminal Binding Problems
-
OS Issues
- Can I Update the Desktop OS?
- What OSs Can Run on Workspace?
- Which Software Cannot Be Uninstalled?
- Which Files Cannot Be Deleted?
- Which Software Cannot Be Upgraded?
- Which Ports Cannot Be Deleted?
- Which Commands Cannot Be Executed?
- How Do I Query the System Information?
- Is There Any Help Document for OSs?
-
Desktop Usage Issues
- Change History
-
FAQs for Administrators
- SDK Reference
-
API Reference
- Before You Start
- Overview
- Calling APIs
-
Workspace APIs
- Huawei Cloud Workspace
-
Desktop
- Creates a desktop.
- Queries desktops.
- Deletes one desktop.
- Queries details about one desktop.
- Deletes desktops in batches.
- Deregistering Desktops in Batches
- Queries the desktop details list.
- Performs operations on the desktop.
- Modifies specifications.
- Rebuild a Desktop
- Query the Desktop Network
- Switching a Desktop Network
- Desktop Statistics
- User
- User Group
- Disk
- Connection information
- Access policy
- Product Packages
- Authentication configuration
- Quota
- Image
- AZ
- Desktop Tag
- Task.
- Network
-
Binds a terminal to a desktop.
- Queries the configuration of the switch for binding a terminal to a desktop.
- Configures the switch for binding a terminal to a desktop.
- Queries terminal-desktop binding configurations.
- Adds a terminal-desktop binding configuration.
- Modifies a terminal-desktop binding configuration.
- Deletes a terminal-desktop binding configuration.
- Appendix
- Change History
-
User Guide (Application Streaming)
- Overview
-
Administrator Operation Guide
- Operation Procedure
- Logging In to the Workspace Application Streaming Console
- Enabling the Service
- Creating a User
- Applications and Images
- Server Groups
- Application Groups
- User Management
- Policy Groups
- Monitoring Analysis
- OU Management
- Application Internet Access Management
- Upgrading Protocol Components
- Scheduled Tasks
- Storage
- Tenant Configuration
- Private Images
- Configuring Personalized Data
- Subscribing to an Event
- Permissions Management
- Configuring Common Functions
-
FAQs
- What Is the Relationship Between Workspace Application Streaming and Workspace?
- What Types of Applications Can Be Published?
- What Can I Do If an Application Fails to Be Published?
- How Do I Deploy a Windows AD Server?
- How Do I Deploy an RD Licensing Server?
- How Do I Configure RDS Licensing and Security Policies?
- How Do I Create a User OU on the AD Server?
- How Do I Create a User Group on the AD Server?
- How Do I Create a User on the AD Server?
- How Do I Configure Network Connection Between Workspace Application Streaming and the Windows AD?
- How Do I Log in to an APS?
- How Do I Purchase the NAT and EIP Services to Enable Cloud Applications to Be Accessed Through the Internet?
- How Do I Check My Quotas?
- How Do I Increase My Quotas?
- How Do I Do If the Application Operation Page Has Black Borders and Cannot Be Moved?
- How Do I Do If an End User Fails to Log In to a Cloud Application?
- How Do I Reset a User Password?
- How Do I Do If I Fail to Add a Computer Back to the Domain?
- How Do I Add an ECS to the Domain of an APS?
- How Do I Use the GPO Group Policy to Make a Domain User Become a Local Administrator of a PC?
- How Do I Install Sandbox Software?
- How Do I Do If There Is No Sound or the Screen Is Frozen While There Is Sound When Using Google Chrome or Bilibili Player for Video Playback?
- How Do I Do If the Window Cannot Be Dragged When the Sandbox Application Is Started?
- RD License Server Fails to Be Added to the AD domain
- Error Code 6030/6047 Reported When Accessing a Shared Desktop Application
- File Resources on the APS Cannot Be Automatically Refreshed During Workspace Application Streaming Operations
- How Do I Update or Add an Application?
- How Do I Authorize an IAM User to Use Workspace Application Streaming?
- How Do I Calculate the Number of Concurrent Sessions of a Cloud Application?
- What If I Can't Open a Cloud Application?
-
Terminal User Operation Guide
- Process
- Using an Application on a Soft Client
- Using an Application on a Thin Client
-
FAQs
- How Do I Do If the Cloud Application Cannot Be Used?
- How Do I Do If I Cannot View Cloud Applications on Desktops?
- How Do I Do If I Forget the Password?
- How Do I Do If the Account is Locked?
- How Do I Do If I Fail to Log In to the Client?
- How Do I Enable a Local Storage Device to Copy Files to an APS?
- How Do I Recover Important Files and Documents from the Sandbox to the Local Computer?
- How Do I Delete a Sandbox?
- How Do I Remove the Yellow Border of an Application After the Sandbox Application Is Started?
- Change History
- General Reference
Copied.
Related Concepts
Desktop
A desktop is a virtual computer system that is installed with desktop agent software and can interact with desktop management components. Workspace hosts and manages all desktops in the data center in a unified manner. End users can log in to a desktop using soft clients (SCs), mobile terminals, and thin clients (TCs) to obtain PC-like desktop experience.
You can purchase a dedicated desktop for each end user so that they can exclusively use their own desktops.
Desktop Pool
A desktop pool is a collection of image desktops of the same specifications. It provides administrators with unified management and O&M capabilities for the next batch of desktops in a project. Desktop pools are classified into dynamic pools and static pools.
- A dynamic pool is a desktop group of the M:N pool type. The binding relationship between a VM in the desktop pool and a VM user is not fixed. Each time a VM user logs in to the desktop pool through the client, Workspace randomly assigns an available VM to the user.
- A static pool is a desktop group of the 1:1 pool type. Originally, the binding relationship between VMs in the desktop pool and VM users is not fixed. However, the binding relationship between a VM and a VM user is fixed after the VM user logs in to the VM for the first time. After that, the VM user will be assigned the same VM each time the user logs in to the desktop pool, and the VM will not be assigned to other users.
User
Users are classified into end users and administrators based on their permissions. An end user is a user who uses the desktop and has the permission for logging in to and using the desktop. An administrator is a tenant, that is, a user who assigns desktops to users who use desktops. The administrator has the permissions for purchasing desktops, deleting desktops, configuring policies, and managing users.
User Group
A user group is a collection of users. By assigning users to different groups, you can easily manage and control resource access. A user group can also have its own permissions and settings to control the behavior of its users.
Policy
Policies are classified into protocol policies and access policies.
A protocol policy is a set of security rules configured for desktops, including USB redirection, file redirection read/write permission, clipboard read/write permission, watermark, client automatic reconnection interval, and image display. A policy is used to control data transmission between user terminals and desktops and peripheral access permission.
An access policy is a group of rules configured for determining whether desktops are accessed from an Internet access address or Direct Connect access address.
Priority
The priority is the basis for Workspace to determine the execution sequence or weight of desktop policies. The priority is represented by a positive integer. A smaller value indicates a higher priority.
Software Client
A software client (SC) is a Workspace client installed on a local PC so that users can access desktops from the PC.
Thin Client
A thin client (TC) is a small-sized commercial PC that is designed based on the PC industry standard. It uses a professional embedded processor, small local flash memory, and simplified OS for desktop access. The TC sends the inputs of the mouse and keyboard to the background server for processing. Then the server returns the processing result to the monitor connected to the TC for display. The performance, peripheral interfaces, and operation GUIs of TCs vary depending on models, meeting requirements for common OA, security-sensitive OA, and high-performance graphics design.
Mobile Terminal
A mobile terminal is a Workspace client installed on a mobile device so that users can access the desktop through the mobile device. The mobile device is called a mobile terminal. Currently, only Android smart devices are supported.
AD Management Server
The Active Directory (AD) management server is the infrastructure component where the AD service is deployed. It provides a series of directory service functions that allow users to manage and access network resources in a unified manner. Workspace can connect to your own AD server to implement authentication and authorization of Workspace.
Region and AZ
A region and availability zone (AZ) identify the location of a data center. You can purchase desktops in a specific region or AZ.
Regions are determined based on geographical location and network latency. Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP, and Image Management Service (IMS), are shared within the same cloud region. Regions are classified as universal regions and dedicated regions. A universal region provides universal cloud services for common tenants. A dedicated region provides only services of the same type or provides services only for specific tenants.
An AZ contains one or more physical data centers. Each AZ has independent cooling, fire extinguishing, antimoisture, and electricity facilities. The computing, network, storage, and other resources in an AZ are logically divided into multiple clusters. AZs in a region are interconnected through high-speed optic fiber, so systems deployed across AZs can achieve higher availability.
Figure 1 shows the relationship between regions and AZs.
Huawei Cloud provides services in many regions around the world. Select a region and AZ as needed.
Project
Projects group and isolates resources (including compute, storage, and network resources) across physical regions. A default project is provided for each region, and subprojects can be created under each default project. Users can be granted permissions for accessing all resources in a specific project. If you need more refined access control, you can create subprojects under a default project and purchase resources in subprojects. Then you can assign required permissions for users to access only resources in specific subprojects.
Multi-factor Authentication
Multi-factor authentication (MFA) provides an additional layer of protection on top of the username and password. If you enable MFA, users need to enter the username and password as well as a verification code when logging in to a desktop.
Virtual MFA Device
A virtual MFA device generates 6-digit verification codes in compliance with the Time-based One-time Password Algorithm (TOTP). Virtual MFA devices used by Workspace are software-based applications that can run on mobile devices such as smartphones. Virtual MFA is one of the MFA modes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot