SlideShare a Scribd company logo
THE EXPERTS IN GLOBAL APPLE DEPLOYMENT
         UK • USA • AUSTRALIA • SINGAPORE




                 www.square-i.net
Normalizing a Worldwide Apple Deployment

       Paul Gibbons & Emmanuel Gomez
About us...
Midlands
  High Wycombe
   London
United Kingdom

USA




                       Singapore


                            Australia
What is Square?
What is Square?
‣   Apple Premium Reseller in the UK
What is Square?
‣   Apple Premium Reseller in the UK

‣   Apple Authorised Reseller in the USA, Latin
    America & Singapore (Square [ i ] International)
What is Square?
‣   Apple Premium Reseller in the UK

‣   Apple Authorised Reseller in the USA, Latin
    America & Singapore (Square [ i ] International)

‣   Hospitality specialists with our own IP in
    software solutions (IPTV & Business Centre)
What is Square?
‣   Apple Premium Reseller in the UK

‣   Apple Authorised Reseller in the USA, Latin
    America & Singapore (Square [ i ] International)

‣   Hospitality specialists with our own IP in
    software solutions (IPTV & Business Centre)

‣   International Apple Support Centres
What is Square?
‣   Apple Premium Reseller in the UK

‣   Apple Authorised Reseller in the USA, Latin
    America & Singapore (Square [ i ] International)

‣   Hospitality specialists with our own IP in
    software solutions (IPTV & Business Centre)

‣   International Apple Support Centres

‣   42 Square Design & Marketing Communications
The Challenge
The Challenge
How does the world’s largest Art Auction House deploy, manage & maintain
over 200 Macs across three continents within the following framework?
The Challenge
How does the world’s largest Art Auction House deploy, manage & maintain
over 200 Macs across three continents within the following framework?

 ‣ Only 2 Mac Support specialists based in London and New York
The Challenge
How does the world’s largest Art Auction House deploy, manage & maintain
over 200 Macs across three continents within the following framework?

 ‣ Only 2 Mac Support specialists based in London and New York
 ‣ Being able to work with and re-purpose existing ‘standard’ packages
The Challenge
How does the world’s largest Art Auction House deploy, manage & maintain
over 200 Macs across three continents within the following framework?

 ‣ Only 2 Mac Support specialists based in London and New York
 ‣ Being able to work with and re-purpose existing ‘standard’ packages
 ‣ 6 locations in 3 Continents - Distributing the Distribution Points!
Considerations
Considerations
‣   Choice of the Server for the JSS
Considerations
‣   Choice of the Server for the JSS

‣   Choice of the Server for the Distribution Point
Considerations
‣   Choice of the Server for the JSS

‣   Choice of the Server for the Distribution Point

‣   JSS setup
Considerations
‣   Choice of the Server for the JSS

‣   Choice of the Server for the Distribution Point

‣   JSS setup

‣   Security
Considerations
‣   Choice of the Server for the JSS                  ‣   Package Replication

‣   Choice of the Server for the Distribution Point

‣   JSS setup

‣   Security
Considerations
‣   Choice of the Server for the JSS                  ‣   Package Replication

‣   Choice of the Server for the Distribution Point   ‣   Replication servers

‣   JSS setup

‣   Security
Considerations
‣   Choice of the Server for the JSS                  ‣   Package Replication

‣   Choice of the Server for the Distribution Point   ‣   Replication servers

‣   JSS setup                                         ‣   Imaging Process

‣   Security
Considerations
‣   Choice of the Server for the JSS                  ‣   Package Replication

‣   Choice of the Server for the Distribution Point   ‣   Replication servers

‣   JSS setup                                         ‣   Imaging Process

‣   Security                                          ‣   What is Next? (In few words)
Choice of the Server for the JSS
Choice of the Server for the JSS
‣   Cloud
Choice of the Server for the JSS
‣   Cloud

‣   Windows
Choice of the Server for the JSS
‣   Cloud

‣   Windows

‣   Red Had Enterprise Linux
Choice of the Server for the JSS
‣   Cloud

‣   Windows

‣   Red Had Enterprise Linux

‣   Mac OS X
Choice of the Server for the DP
Choice of the Server for the DP
‣   Mac OS X
Choice of the Server for the DP
‣   Mac OS X

‣   Windows
Choice of the Server for the DP
‣   Mac OS X

‣   Windows

‣   Red Had Enterprise Linux / CentOS
Choice of the Server for the DP
‣   Mac OS X

‣   Windows

‣   Red Had Enterprise Linux / CentOS

‣   NAS Drives
JSS setup
jsscasper.mycomp.com




Mobile Devices and Computers Checking in from home or wireless hotspots
Network Setup
Network Setup




                         Firewall


                  3306              3306               3306                                      *

Casper Server                              Casper db                 Casper Server


                DMZ                                       LAN
                                                                    In and outbound connection
                                                                    LAN connection
                                                                *   Not available anymore
Network Setup
‣   Casper servers are clustered




                         Firewall


                  3306              3306               3306                                      *

Casper Server                              Casper db                 Casper Server


                DMZ                                       LAN
                                                                    In and outbound connection
                                                                    LAN connection
                                                                *   Not available anymore
Network Setup
‣   Casper servers are clustered

‣   Outside the LAN, managed devices
    will check in from the dmz



                         Firewall


                  3306              3306               3306                                      *

Casper Server                              Casper db                 Casper Server


                DMZ                                       LAN
                                                                    In and outbound connection
                                                                    LAN connection
                                                                *   Not available anymore
Network Setup
‣   Casper servers are clustered                       ‣   Only one port transits from DMZ to LAN 3306
                                                           (MySQL)
‣   Outside the LAN, managed devices
    will check in from the dmz



                         Firewall


                  3306              3306                   3306                                                  *

Casper Server                              Casper db                                 Casper Server


                DMZ                                           LAN
                                                                                    In and outbound connection
                                                                                    LAN connection
                                                                                *   Not available anymore
Network Setup
‣   Casper servers are clustered                       ‣   Only one port transits from DMZ to LAN 3306
                                                           (MySQL)
‣   Outside the LAN, managed devices
    will check in from the dmz                         ‣   Change of the JSS database password



                         Firewall


                  3306              3306                   3306                                                  *

Casper Server                              Casper db                                 Casper Server


                DMZ                                           LAN
                                                                                    In and outbound connection
                                                                                    LAN connection
                                                                                *   Not available anymore
How do you do that?
How do you do that?

https://jamfnation.jamfsoftware.com/article.html?id=174
How do you do that?
* subject to changes




JSS seen from the Public jsscasper.mycomp.com   JSS seen from the Private jsscasper.mycomp.com
Replication server and package replication
*




*
Madrid                    Helsinki    Munich             Singapore      London Edu




                                                  London

                                                                   *
                                                               *




          Paris                     Amsterdam        NY                Santa Fe   Hong Kong
                                                           *




Netboot            AFP sharepoint                                                   * Not available anymore
How do you do that?
How do you do that?
Replication using keypair 2048 bit encryption rsync via ssh tunnel
How do you do that?
Replication using keypair 2048 bit encryption rsync via ssh tunnel

  #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION"
  #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys'
How do you do that?
Replication using keypair 2048 bit encryption rsync via ssh tunnel

  #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION"
  #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys'


rsync via ssh tunnel
How do you do that?
Replication using keypair 2048 bit encryption rsync via ssh tunnel

  #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION"
  #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys'


rsync via ssh tunnel

  #rsync -avrpogz --delete -e ssh root@myjssserver:"Source" "Destination" >>yourlogfile
Imaging Process
Possible Workflow with Pre-Stage
Possible Workflow with Pre-Stage
    Computer is added to Prestage imaging
Possible Workflow with Pre-Stage
    Computer is added to Prestage imaging



    Computer netboots
Possible Workflow with Pre-Stage
    Computer is added to Prestage imaging



    Computer netboots



    Computer is automatically imaged
Possible Workflow with Pre-Stage
    Computer is added to Prestage imaging



    Computer netboots



    Computer is automatically imaged



    Computer is ready to be given to the end user
Possible Workflow with QuickAdd
Possible Workflow with QuickAdd

    Computer is given to the end user
Possible Workflow with QuickAdd

    Computer is given to the end user




    Computer is setup by the user. QuickAdd package is installed
Possible Workflow with QuickAdd

    Computer is given to the end user




    Computer is setup by the user. QuickAdd package is installed



    Computer is added to the inventory
Possible Workflow with QuickAdd

    Computer is given to the end user




    Computer is setup by the user. QuickAdd package is installed



    Computer is added to the inventory



    The policies are triggered automatically according to the network segment
Possible Workflow with Customised QuickAdd
Possible Workflow with Customised QuickAdd

    Computer is given to the end user
Possible Workflow with Customised QuickAdd

    Computer is given to the end user



    Computer is setup by the user. Customised QuickAdd package is installed
Possible Workflow with Customised QuickAdd

    Computer is given to the end user



    Computer is setup by the user. Customised QuickAdd package is installed


    User complete a predefined set of information
Possible Workflow with Customised QuickAdd

    Computer is given to the end user



    Computer is setup by the user. Customised QuickAdd package is installed


    User complete a predefined set of information


    Computer is added to the inventory
Possible Workflow with Customised QuickAdd

    Computer is given to the end user



    Computer is setup by the user. Customised QuickAdd package is installed


    User complete a predefined set of information


    Computer is added to the inventory


    The policies are triggered automatically according to the Extended attributes set by the user.
QuickAdd




cocoaDialog                         postflight script




              Customised QuickAdd
What is Next?
What is Next?
Cloud Storage integration
What is Next?
Cloud Storage integration

VM Environment integration
Paul Gibbons
              paul@squaregroup.co.uk



        Emmanuel Gomez Verardo
        emmanuel.gomez@squaregroup.co.uk




www.square-i.net                       @squaregroup

More Related Content

What's hot

Intel ESB2 ASF Firmware Update
Intel ESB2 ASF Firmware UpdateIntel ESB2 ASF Firmware Update
Intel ESB2 ASF Firmware Update
webhostingguy
 
Cumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's NewCumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's New
Cumulus Networks
 
CloudStack + SDN
CloudStack + SDNCloudStack + SDN
CloudStack + SDN
Chiradeep Vittal
 
Manage your switches like servers
Manage your switches like serversManage your switches like servers
Manage your switches like servers
Cumulus Networks
 
IBM System Networking Easy Connect Mode
IBM System Networking Easy Connect ModeIBM System Networking Easy Connect Mode
IBM System Networking Easy Connect Mode
IBM System Networking
 
Network Architecture for Containers
Network Architecture for ContainersNetwork Architecture for Containers
Network Architecture for Containers
Cumulus Networks
 
Network Design patters with Docker
Network Design patters with DockerNetwork Design patters with Docker
Network Design patters with Docker
Daniel Finneran
 
Operationalizing VRF in the Data Center
Operationalizing VRF in the Data CenterOperationalizing VRF in the Data Center
Operationalizing VRF in the Data Center
Cumulus Networks
 
Collaborate vdb performance
Collaborate vdb performanceCollaborate vdb performance
Collaborate vdb performance
Kyle Hailey
 
Open Networking for Your OpenStack
Open Networking for Your OpenStackOpen Networking for Your OpenStack
Open Networking for Your OpenStack
Cumulus Networks
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
solarisyougood
 
Linux networking is Awesome!
Linux networking is Awesome!Linux networking is Awesome!
Linux networking is Awesome!
Cumulus Networks
 
vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.
Ajeet Singh
 

What's hot (13)

Intel ESB2 ASF Firmware Update
Intel ESB2 ASF Firmware UpdateIntel ESB2 ASF Firmware Update
Intel ESB2 ASF Firmware Update
 
Cumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's NewCumulus Linux 2.5.5 What's New
Cumulus Linux 2.5.5 What's New
 
CloudStack + SDN
CloudStack + SDNCloudStack + SDN
CloudStack + SDN
 
Manage your switches like servers
Manage your switches like serversManage your switches like servers
Manage your switches like servers
 
IBM System Networking Easy Connect Mode
IBM System Networking Easy Connect ModeIBM System Networking Easy Connect Mode
IBM System Networking Easy Connect Mode
 
Network Architecture for Containers
Network Architecture for ContainersNetwork Architecture for Containers
Network Architecture for Containers
 
Network Design patters with Docker
Network Design patters with DockerNetwork Design patters with Docker
Network Design patters with Docker
 
Operationalizing VRF in the Data Center
Operationalizing VRF in the Data CenterOperationalizing VRF in the Data Center
Operationalizing VRF in the Data Center
 
Collaborate vdb performance
Collaborate vdb performanceCollaborate vdb performance
Collaborate vdb performance
 
Open Networking for Your OpenStack
Open Networking for Your OpenStackOpen Networking for Your OpenStack
Open Networking for Your OpenStack
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
Linux networking is Awesome!
Linux networking is Awesome!Linux networking is Awesome!
Linux networking is Awesome!
 
vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.
 

Similar to Square i minneapolis presentation v1.1

Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetup
Scott Edwards
 
Osol Netadmin Solaris Administrator
Osol Netadmin Solaris AdministratorOsol Netadmin Solaris Administrator
Osol Netadmin Solaris Administrator
Opeyemi Olakitan
 
Net Basics
Net BasicsNet Basics
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
Pavel Odintsov
 
Keeping your rack cool with one "/IP route rule"
Keeping your rack cool with one "/IP route rule"Keeping your rack cool with one "/IP route rule"
Keeping your rack cool with one "/IP route rule"
Faelix Ltd
 
Cloud Networking is not Virtual Networking - London VMUG 20130425
Cloud Networking is not Virtual Networking - London VMUG 20130425Cloud Networking is not Virtual Networking - London VMUG 20130425
Cloud Networking is not Virtual Networking - London VMUG 20130425
Greg Ferro
 
Neutron Network Namespaces and IPtables--A Technical Deep Dive
Neutron Network Namespaces and IPtables--A Technical Deep DiveNeutron Network Namespaces and IPtables--A Technical Deep Dive
Neutron Network Namespaces and IPtables--A Technical Deep Dive
Mirantis
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
APNIC
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
Bangladesh Network Operators Group
 
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
ozkan01
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
P1Security
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012
Brent Salisbury
 
Network Automation (Bay Area Juniper Networks Meetup)
Network Automation (Bay Area Juniper Networks Meetup)Network Automation (Bay Area Juniper Networks Meetup)
Network Automation (Bay Area Juniper Networks Meetup)
Alejandro Salinas
 
Tech f42
Tech f42Tech f42
CloudStack Networking Deepdive CCCEU13
CloudStack Networking Deepdive CCCEU13CloudStack Networking Deepdive CCCEU13
CloudStack Networking Deepdive CCCEU13
Chiradeep Vittal
 
What CloudStackers Need To Know About LINSTOR/DRBD
What CloudStackers Need To Know About LINSTOR/DRBDWhat CloudStackers Need To Know About LINSTOR/DRBD
What CloudStackers Need To Know About LINSTOR/DRBD
ShapeBlue
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Jiunn-Jer Sun
 
How to setup your linux server
How to setup your linux serverHow to setup your linux server
How to setup your linux server
Marian Marinov
 
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
ContainerDay Security 2023
 
Openstack@ebay: Practical SDN deployment with Quantum
Openstack@ebay: Practical SDN deployment with QuantumOpenstack@ebay: Practical SDN deployment with Quantum
Openstack@ebay: Practical SDN deployment with Quantum
Jean-Christophe "JC" Martin
 

Similar to Square i minneapolis presentation v1.1 (20)

Open contrail slides for BANV meetup
Open contrail slides for BANV meetupOpen contrail slides for BANV meetup
Open contrail slides for BANV meetup
 
Osol Netadmin Solaris Administrator
Osol Netadmin Solaris AdministratorOsol Netadmin Solaris Administrator
Osol Netadmin Solaris Administrator
 
Net Basics
Net BasicsNet Basics
Net Basics
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Keeping your rack cool with one "/IP route rule"
Keeping your rack cool with one "/IP route rule"Keeping your rack cool with one "/IP route rule"
Keeping your rack cool with one "/IP route rule"
 
Cloud Networking is not Virtual Networking - London VMUG 20130425
Cloud Networking is not Virtual Networking - London VMUG 20130425Cloud Networking is not Virtual Networking - London VMUG 20130425
Cloud Networking is not Virtual Networking - London VMUG 20130425
 
Neutron Network Namespaces and IPtables--A Technical Deep Dive
Neutron Network Namespaces and IPtables--A Technical Deep DiveNeutron Network Namespaces and IPtables--A Technical Deep Dive
Neutron Network Namespaces and IPtables--A Technical Deep Dive
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
OpenContrail Presentation at Openstack Days Tokyo Japan Feb 13 2014
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012Software Defined Data Centers - June 2012
Software Defined Data Centers - June 2012
 
Network Automation (Bay Area Juniper Networks Meetup)
Network Automation (Bay Area Juniper Networks Meetup)Network Automation (Bay Area Juniper Networks Meetup)
Network Automation (Bay Area Juniper Networks Meetup)
 
Tech f42
Tech f42Tech f42
Tech f42
 
CloudStack Networking Deepdive CCCEU13
CloudStack Networking Deepdive CCCEU13CloudStack Networking Deepdive CCCEU13
CloudStack Networking Deepdive CCCEU13
 
What CloudStackers Need To Know About LINSTOR/DRBD
What CloudStackers Need To Know About LINSTOR/DRBDWhat CloudStackers Need To Know About LINSTOR/DRBD
What CloudStackers Need To Know About LINSTOR/DRBD
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
How to setup your linux server
How to setup your linux serverHow to setup your linux server
How to setup your linux server
 
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
 
Openstack@ebay: Practical SDN deployment with Quantum
Openstack@ebay: Practical SDN deployment with QuantumOpenstack@ebay: Practical SDN deployment with Quantum
Openstack@ebay: Practical SDN deployment with Quantum
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Square i minneapolis presentation v1.1

  • 1. THE EXPERTS IN GLOBAL APPLE DEPLOYMENT UK • USA • AUSTRALIA • SINGAPORE www.square-i.net
  • 2.
  • 3. Normalizing a Worldwide Apple Deployment Paul Gibbons & Emmanuel Gomez
  • 4.
  • 6. Midlands High Wycombe London
  • 7. United Kingdom USA Singapore Australia
  • 8.
  • 10. What is Square? ‣ Apple Premium Reseller in the UK
  • 11. What is Square? ‣ Apple Premium Reseller in the UK ‣ Apple Authorised Reseller in the USA, Latin America & Singapore (Square [ i ] International)
  • 12. What is Square? ‣ Apple Premium Reseller in the UK ‣ Apple Authorised Reseller in the USA, Latin America & Singapore (Square [ i ] International) ‣ Hospitality specialists with our own IP in software solutions (IPTV & Business Centre)
  • 13. What is Square? ‣ Apple Premium Reseller in the UK ‣ Apple Authorised Reseller in the USA, Latin America & Singapore (Square [ i ] International) ‣ Hospitality specialists with our own IP in software solutions (IPTV & Business Centre) ‣ International Apple Support Centres
  • 14. What is Square? ‣ Apple Premium Reseller in the UK ‣ Apple Authorised Reseller in the USA, Latin America & Singapore (Square [ i ] International) ‣ Hospitality specialists with our own IP in software solutions (IPTV & Business Centre) ‣ International Apple Support Centres ‣ 42 Square Design & Marketing Communications
  • 15.
  • 17. The Challenge How does the world’s largest Art Auction House deploy, manage & maintain over 200 Macs across three continents within the following framework?
  • 18. The Challenge How does the world’s largest Art Auction House deploy, manage & maintain over 200 Macs across three continents within the following framework? ‣ Only 2 Mac Support specialists based in London and New York
  • 19. The Challenge How does the world’s largest Art Auction House deploy, manage & maintain over 200 Macs across three continents within the following framework? ‣ Only 2 Mac Support specialists based in London and New York ‣ Being able to work with and re-purpose existing ‘standard’ packages
  • 20. The Challenge How does the world’s largest Art Auction House deploy, manage & maintain over 200 Macs across three continents within the following framework? ‣ Only 2 Mac Support specialists based in London and New York ‣ Being able to work with and re-purpose existing ‘standard’ packages ‣ 6 locations in 3 Continents - Distributing the Distribution Points!
  • 21.
  • 23. Considerations ‣ Choice of the Server for the JSS
  • 24. Considerations ‣ Choice of the Server for the JSS ‣ Choice of the Server for the Distribution Point
  • 25. Considerations ‣ Choice of the Server for the JSS ‣ Choice of the Server for the Distribution Point ‣ JSS setup
  • 26. Considerations ‣ Choice of the Server for the JSS ‣ Choice of the Server for the Distribution Point ‣ JSS setup ‣ Security
  • 27. Considerations ‣ Choice of the Server for the JSS ‣ Package Replication ‣ Choice of the Server for the Distribution Point ‣ JSS setup ‣ Security
  • 28. Considerations ‣ Choice of the Server for the JSS ‣ Package Replication ‣ Choice of the Server for the Distribution Point ‣ Replication servers ‣ JSS setup ‣ Security
  • 29. Considerations ‣ Choice of the Server for the JSS ‣ Package Replication ‣ Choice of the Server for the Distribution Point ‣ Replication servers ‣ JSS setup ‣ Imaging Process ‣ Security
  • 30. Considerations ‣ Choice of the Server for the JSS ‣ Package Replication ‣ Choice of the Server for the Distribution Point ‣ Replication servers ‣ JSS setup ‣ Imaging Process ‣ Security ‣ What is Next? (In few words)
  • 31.
  • 32. Choice of the Server for the JSS
  • 33. Choice of the Server for the JSS ‣ Cloud
  • 34. Choice of the Server for the JSS ‣ Cloud ‣ Windows
  • 35. Choice of the Server for the JSS ‣ Cloud ‣ Windows ‣ Red Had Enterprise Linux
  • 36. Choice of the Server for the JSS ‣ Cloud ‣ Windows ‣ Red Had Enterprise Linux ‣ Mac OS X
  • 37.
  • 38. Choice of the Server for the DP
  • 39. Choice of the Server for the DP ‣ Mac OS X
  • 40. Choice of the Server for the DP ‣ Mac OS X ‣ Windows
  • 41. Choice of the Server for the DP ‣ Mac OS X ‣ Windows ‣ Red Had Enterprise Linux / CentOS
  • 42. Choice of the Server for the DP ‣ Mac OS X ‣ Windows ‣ Red Had Enterprise Linux / CentOS ‣ NAS Drives
  • 43.
  • 45. jsscasper.mycomp.com Mobile Devices and Computers Checking in from home or wireless hotspots
  • 46.
  • 48. Network Setup Firewall 3306 3306 3306 * Casper Server Casper db Casper Server DMZ LAN In and outbound connection LAN connection * Not available anymore
  • 49. Network Setup ‣ Casper servers are clustered Firewall 3306 3306 3306 * Casper Server Casper db Casper Server DMZ LAN In and outbound connection LAN connection * Not available anymore
  • 50. Network Setup ‣ Casper servers are clustered ‣ Outside the LAN, managed devices will check in from the dmz Firewall 3306 3306 3306 * Casper Server Casper db Casper Server DMZ LAN In and outbound connection LAN connection * Not available anymore
  • 51. Network Setup ‣ Casper servers are clustered ‣ Only one port transits from DMZ to LAN 3306 (MySQL) ‣ Outside the LAN, managed devices will check in from the dmz Firewall 3306 3306 3306 * Casper Server Casper db Casper Server DMZ LAN In and outbound connection LAN connection * Not available anymore
  • 52. Network Setup ‣ Casper servers are clustered ‣ Only one port transits from DMZ to LAN 3306 (MySQL) ‣ Outside the LAN, managed devices will check in from the dmz ‣ Change of the JSS database password Firewall 3306 3306 3306 * Casper Server Casper db Casper Server DMZ LAN In and outbound connection LAN connection * Not available anymore
  • 53.
  • 54. How do you do that?
  • 55. How do you do that? https://jamfnation.jamfsoftware.com/article.html?id=174
  • 56. How do you do that?
  • 57.
  • 58. * subject to changes JSS seen from the Public jsscasper.mycomp.com JSS seen from the Private jsscasper.mycomp.com
  • 59.
  • 60. Replication server and package replication
  • 61. * *
  • 62. Madrid Helsinki Munich Singapore London Edu London * * Paris Amsterdam NY Santa Fe Hong Kong * Netboot AFP sharepoint * Not available anymore
  • 63.
  • 64. How do you do that?
  • 65. How do you do that? Replication using keypair 2048 bit encryption rsync via ssh tunnel
  • 66. How do you do that? Replication using keypair 2048 bit encryption rsync via ssh tunnel #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION" #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys'
  • 67. How do you do that? Replication using keypair 2048 bit encryption rsync via ssh tunnel #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION" #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys' rsync via ssh tunnel
  • 68. How do you do that? Replication using keypair 2048 bit encryption rsync via ssh tunnel #ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -C "LOCATION" #cat ~/.ssh/id_rsa.pub | ssh myjssserver 'cat - >> ~/.ssh/authorized_keys' rsync via ssh tunnel #rsync -avrpogz --delete -e ssh root@myjssserver:"Source" "Destination" >>yourlogfile
  • 69.
  • 71.
  • 73. Possible Workflow with Pre-Stage Computer is added to Prestage imaging
  • 74. Possible Workflow with Pre-Stage Computer is added to Prestage imaging Computer netboots
  • 75. Possible Workflow with Pre-Stage Computer is added to Prestage imaging Computer netboots Computer is automatically imaged
  • 76. Possible Workflow with Pre-Stage Computer is added to Prestage imaging Computer netboots Computer is automatically imaged Computer is ready to be given to the end user
  • 77.
  • 79. Possible Workflow with QuickAdd Computer is given to the end user
  • 80. Possible Workflow with QuickAdd Computer is given to the end user Computer is setup by the user. QuickAdd package is installed
  • 81. Possible Workflow with QuickAdd Computer is given to the end user Computer is setup by the user. QuickAdd package is installed Computer is added to the inventory
  • 82. Possible Workflow with QuickAdd Computer is given to the end user Computer is setup by the user. QuickAdd package is installed Computer is added to the inventory The policies are triggered automatically according to the network segment
  • 83.
  • 84. Possible Workflow with Customised QuickAdd
  • 85. Possible Workflow with Customised QuickAdd Computer is given to the end user
  • 86. Possible Workflow with Customised QuickAdd Computer is given to the end user Computer is setup by the user. Customised QuickAdd package is installed
  • 87. Possible Workflow with Customised QuickAdd Computer is given to the end user Computer is setup by the user. Customised QuickAdd package is installed User complete a predefined set of information
  • 88. Possible Workflow with Customised QuickAdd Computer is given to the end user Computer is setup by the user. Customised QuickAdd package is installed User complete a predefined set of information Computer is added to the inventory
  • 89. Possible Workflow with Customised QuickAdd Computer is given to the end user Computer is setup by the user. Customised QuickAdd package is installed User complete a predefined set of information Computer is added to the inventory The policies are triggered automatically according to the Extended attributes set by the user.
  • 90.
  • 91. QuickAdd cocoaDialog postflight script Customised QuickAdd
  • 92.
  • 94. What is Next? Cloud Storage integration
  • 95. What is Next? Cloud Storage integration VM Environment integration
  • 96.
  • 97. Paul Gibbons paul@squaregroup.co.uk Emmanuel Gomez Verardo emmanuel.gomez@squaregroup.co.uk www.square-i.net @squaregroup

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n
  73. \n
  74. \n
  75. \n
  76. \n
  77. \n
  78. \n
  79. \n
  80. \n
  81. \n
  82. \n
  83. \n
  84. \n
  85. \n
  86. \n
  87. \n
  88. \n
  89. \n
  90. \n
  91. \n
  92. \n
  93. \n
  94. \n
  95. \n
  96. \n
  97. \n
  98. \n
  99. \n
  100. \n
  101. \n
  102. \n
  103. \n
  104. \n
  105. \n
  106. \n
  107. \n
  108. \n
  109. \n
  110. \n
  111. \n
  112. \n
  113. \n
  114. \n
  115. \n
  116. \n
  117. \n
  118. \n
  119. \n
  120. \n
  121. \n
  122. \n
  123. \n
  124. \n
  125. \n
  126. \n
  127. \n
  128. \n
  129. \n
  130. \n
  131. \n
  132. \n
  133. \n
  134. \n
  135. \n
  136. \n
  137. \n
  138. \n
  139. \n
  140. \n
  141. \n
  142. \n
  143. \n
  144. \n
  145. \n