Linux Containers Authors: Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Liz McMillan, Pat Romanski

Related Topics: Linux Containers

Linux Containers: Article

KDE's KIOSK Admin Tool

The desktop policeman

Linux is infinitely configurable. It's so flexible it runs on mainframes, cell phones, PCs, even gaming stations and digital video recorders (DVRs). This is one of its biggest strengths especially for those who want control or the freedom to tailor a desktop PC to their specific needs. It is also a boon to the system administrator who may want to configure the desktop to the point where it serves user needs, not their whims. Depending on your organization your desktop may be locked down so you can't install unnecessary programs that can cause the system to fail. In cases like schools there might be a reason to restrict functions. Linux can accommodate customization just like Windows does through the use of policies.

KDE's KIOSK framework provides a mechanism for managing and specifically restricting the KDE environment so users can't perform undesireable actions on their desktop. This capability is extremely useful in situations where PCs are used by multiple users or are left unattended as in libraries and other places to allow limited access to PC functions. As a Windows user you might be familiar with ini files where you can set certain parameters for the Windows operating system and programs. An interesting example is when you set the shell= line in the system.ini in Windows 98. It can replace the Windows shell with Word or another application and run the operating system with only one application. In KDE there are a number of configuration files that store settings like the Windows ini files. The KIOSK Admin tool can be used to configure and lock down a number of features in the KDE desktop. It works by creating profiles for certain types of users and applying those profiles to user accounts. Different accounts can be subject to different limitations, making it possible to turn a PC into a low-maintenances public access terminal kept in an immutable state that allows no permanent changes other than those made by an administrator.

The kinds of things you can do with KIOSK are very broad but the things that KIOSK can do fall into three basic categories.

  • Lock Down - You can lock down the K Panel so that no changes are made or configure network proxy settings so they are unchangeable. Users are then unable to circumvent proxies that filter content that doesn't fall within appropriate use policies.
  • Disable - KIOSK can be used to limit functionality. This might include taking advantage of certain programs or features like Desktop Sharing that are available to the fully privileged user. You can disable the Logout option, the Run Command, and a host of others.
  • Look-and-Feel - You can pre-configure a desktop so themes and other settings are static and the cosmetic aspects of the operating system stay intact.
This is handy when making a public use terminal that may advertise a company or organization. The desktop wallpaper and the look-and-feel can be maintained to represent the organization's interests without fear that vandals will change the wallpaper or leave inappropriate messages on the system.

KIOSK Admin Tool isn't so much an extension of KDE functionality as it is a systems management tool that can be used by a corporate systems administrator or parent who might be concerned about how his children are using their PCs. It's a great way to set up shared workstations among a great number of users or just a few. The tool isn't that well documented but the KIOSK Mailing List provides a good forum and valuable archives on how to do things or troubleshoot problems. While you could edit and tweak configuration files individually this type of tool, it's helpful in centralizing many common Linux configuration files into an easy-to-use menu driven interface.

Other Resources:
- www.tldp.org/HOWTO/KDE-KIOSK-Mode/
KDE KIOSK Mailing List - https://mail.kde.org/mailman/listinfo/kde-KIOSK


Interview with KIOSK Admin Tool Creater Waldo Bastian

LWM: I noticed the KIOSK Tool was included with SuSE 9.2 but that's the first I've seen of it. Can you give me some history on it?

Bastian: KIOSK and generic lock-down functionality were added to KDE 3.0 and from there it has slowly progressed based on feedback from our users. The functionality was originally aimed at making public terminals public-proof, hence the name KIOSK, but it quickly became clear that similar functionality is also very valuable in an enterprise setting where it can be put to use to reduce support costs.

What was still missing was an easy-to-use way for system administrators to unlock its potential. I started with the development of a graphical administration tool for it, the KIOSK Admin Tool, at the beginning of 2004. The aim was to have it ready in time for the Novell Linux Desktop.

LWM: It seems like the idea to lock down a Linux desktop would be appealing to other distributions as well. Is KIOSK dependent on anything outside of KDE?

Bastian: All the functionality provided by the KIOSK Admin Tool is part of the standard KDE platform; there are no outside dependencies.

LWM: Is there a home page for KIOSK, other than http://extragear.kde.org/apps/KIOSKtool.php?

Bastian: http://extragear.kde.org/apps/KIOSKtool.php is the homepage of the KIOSK Admin tool but the System Administration section on the KDE Web site also contains valuable information for administrators who want to deploy KDE. It is here: www.kde.org/areas/sysadmin/

Another good source of information is the [email protected] mailing list. You'll find many people there who have successfully used the KIOSK framework while deploying KDE. See https://mail.kde.org/mailman/listinfo/kde-KIOSK

LWM: Do you have any favorite KIOSK success stories?

Bastian: My favorite is about a new school in Denmark that's using KDE and SUSE and KIOSK to provide the teaching staff and the 138 children with desktops. KIOSK provides both young and old with a safe computing environment where they don't have to be afraid of breaking anything. As with many schools they don't have a big budget, so they use a thin client setup that allows them to run one central server with a mixture of old and very old PCs as clients

More Stories By Mark R. Hinkle

Mark Hinkle is the Senior Director, Open Soure Solutions at Citrix. He also is along-time open source expert and advocate. He is a co-founder of both the Open Source Management Consortium and the Desktop Linux Consortium. He has served as Editor-in-Chief for both LinuxWorld Magazine and Enterprise Open Source Magazine. Hinkle is also the author of the book, "Windows to Linux Business Desktop Migration" (Thomson, 2006). His blog on open source, technology, and new media can be found at http://www.socializedsoftware.com.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

IoT & Smart Cities Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...