Linux Containers Authors: Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Liz McMillan, Pat Romanski

Related Topics: Linux Containers

Linux Containers: Article

KDE's KIOSK Admin Tool

The desktop policeman

Linux is infinitely configurable. It's so flexible it runs on mainframes, cell phones, PCs, even gaming stations and digital video recorders (DVRs). This is one of its biggest strengths especially for those who want control or the freedom to tailor a desktop PC to their specific needs. It is also a boon to the system administrator who may want to configure the desktop to the point where it serves user needs, not their whims. Depending on your organization your desktop may be locked down so you can't install unnecessary programs that can cause the system to fail. In cases like schools there might be a reason to restrict functions. Linux can accommodate customization just like Windows does through the use of policies.

KDE's KIOSK framework provides a mechanism for managing and specifically restricting the KDE environment so users can't perform undesireable actions on their desktop. This capability is extremely useful in situations where PCs are used by multiple users or are left unattended as in libraries and other places to allow limited access to PC functions. As a Windows user you might be familiar with ini files where you can set certain parameters for the Windows operating system and programs. An interesting example is when you set the shell= line in the system.ini in Windows 98. It can replace the Windows shell with Word or another application and run the operating system with only one application. In KDE there are a number of configuration files that store settings like the Windows ini files. The KIOSK Admin tool can be used to configure and lock down a number of features in the KDE desktop. It works by creating profiles for certain types of users and applying those profiles to user accounts. Different accounts can be subject to different limitations, making it possible to turn a PC into a low-maintenances public access terminal kept in an immutable state that allows no permanent changes other than those made by an administrator.

The kinds of things you can do with KIOSK are very broad but the things that KIOSK can do fall into three basic categories.

  • Lock Down - You can lock down the K Panel so that no changes are made or configure network proxy settings so they are unchangeable. Users are then unable to circumvent proxies that filter content that doesn't fall within appropriate use policies.
  • Disable - KIOSK can be used to limit functionality. This might include taking advantage of certain programs or features like Desktop Sharing that are available to the fully privileged user. You can disable the Logout option, the Run Command, and a host of others.
  • Look-and-Feel - You can pre-configure a desktop so themes and other settings are static and the cosmetic aspects of the operating system stay intact.
This is handy when making a public use terminal that may advertise a company or organization. The desktop wallpaper and the look-and-feel can be maintained to represent the organization's interests without fear that vandals will change the wallpaper or leave inappropriate messages on the system.

KIOSK Admin Tool isn't so much an extension of KDE functionality as it is a systems management tool that can be used by a corporate systems administrator or parent who might be concerned about how his children are using their PCs. It's a great way to set up shared workstations among a great number of users or just a few. The tool isn't that well documented but the KIOSK Mailing List provides a good forum and valuable archives on how to do things or troubleshoot problems. While you could edit and tweak configuration files individually this type of tool, it's helpful in centralizing many common Linux configuration files into an easy-to-use menu driven interface.

Other Resources:
- www.tldp.org/HOWTO/KDE-KIOSK-Mode/
KDE KIOSK Mailing List - https://mail.kde.org/mailman/listinfo/kde-KIOSK


Interview with KIOSK Admin Tool Creater Waldo Bastian

LWM: I noticed the KIOSK Tool was included with SuSE 9.2 but that's the first I've seen of it. Can you give me some history on it?

Bastian: KIOSK and generic lock-down functionality were added to KDE 3.0 and from there it has slowly progressed based on feedback from our users. The functionality was originally aimed at making public terminals public-proof, hence the name KIOSK, but it quickly became clear that similar functionality is also very valuable in an enterprise setting where it can be put to use to reduce support costs.

What was still missing was an easy-to-use way for system administrators to unlock its potential. I started with the development of a graphical administration tool for it, the KIOSK Admin Tool, at the beginning of 2004. The aim was to have it ready in time for the Novell Linux Desktop.

LWM: It seems like the idea to lock down a Linux desktop would be appealing to other distributions as well. Is KIOSK dependent on anything outside of KDE?

Bastian: All the functionality provided by the KIOSK Admin Tool is part of the standard KDE platform; there are no outside dependencies.

LWM: Is there a home page for KIOSK, other than http://extragear.kde.org/apps/KIOSKtool.php?

Bastian: http://extragear.kde.org/apps/KIOSKtool.php is the homepage of the KIOSK Admin tool but the System Administration section on the KDE Web site also contains valuable information for administrators who want to deploy KDE. It is here: www.kde.org/areas/sysadmin/

Another good source of information is the [email protected] mailing list. You'll find many people there who have successfully used the KIOSK framework while deploying KDE. See https://mail.kde.org/mailman/listinfo/kde-KIOSK

LWM: Do you have any favorite KIOSK success stories?

Bastian: My favorite is about a new school in Denmark that's using KDE and SUSE and KIOSK to provide the teaching staff and the 138 children with desktops. KIOSK provides both young and old with a safe computing environment where they don't have to be afraid of breaking anything. As with many schools they don't have a big budget, so they use a thin client setup that allows them to run one central server with a mixture of old and very old PCs as clients

More Stories By Mark R. Hinkle

Mark Hinkle is the Senior Director, Open Soure Solutions at Citrix. He also is along-time open source expert and advocate. He is a co-founder of both the Open Source Management Consortium and the Desktop Linux Consortium. He has served as Editor-in-Chief for both LinuxWorld Magazine and Enterprise Open Source Magazine. Hinkle is also the author of the book, "Windows to Linux Business Desktop Migration" (Thomson, 2006). His blog on open source, technology, and new media can be found at http://www.socializedsoftware.com.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

IoT & Smart Cities Stories
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...