Contents
1E Business Intelligence
Business Intelligence is an optional component installed by Tachyon Setup on the Master Stack, and requires SQL Server Analysis Services (SSAS). Business Intelligence is a prerequisite for the Patch Success application to support efficient presentation of visualizations on a large scale.
ActiveEfficiency
Tachyon Setup supports optional installation of ActiveEfficiency Server to support Nomad, and simplifies configuration of HTTPS.
Nomad 7.0.200 uses the ActiveEfficiency Server for the following features. Please click on the links below to learn more about configuring Nomad features and their prerequisites, which can be configured after installing ActiveEfficiency Server:
- Single-site download (SSD)
- Pre-caching
- Integrating with WakeUp which also requires NightWatchman Management Center and WakeUp servers
- Nomad Dashboard
- Nomad Download Pause which also requires Tachyon (local or remote)
ActiveEfficiency Server is also used as an inventory repository by the following 1E solutions, which also require the ActiveEfficiency Scout as a connector to capture the data from Configuration Manager. Tachyon Setup does not install or configure the Scout.
- Shopping 6.0 - ActiveEfficiency Server is used as a raw inventory repository for device and user usage data. Shopping Central server processes this data into its own database.
- AppClarity 5.2 - ActiveEfficiency Server is used as a raw non-normalized inventory repository for device, user and application usage data. AppClarity processes this data into its own database to support usage reports and software reclaim features. 1E recommend using AppClarity 7.1 instead, which uses Tachyon instead of ActiveEfficiency to get inventory data.
Tachyon Setup can install ActiveEfficiency Server. However, systems that support over 50000 clients require separation of Tachyon and Nomad client traffic to ensure optimum performance. Therefore, you must choose one of the following installation options for ActiveEfficiency Server:
- Tachyon Master Stack and Response Stack on one server, and ActiveEfficiency Server on a remote server
- Tachyon Master Stack including ActiveEfficiency Server on one server, and the Tachyon Response Stack installed on a remote server
- A single-server with Tachyon Master Stack and ActiveEfficiency Server using one network interface, and the Tachyon Response Stack using its own network interface(s). This effectively separates traffic for Master and Response Stacks. Each Stack has its own DNS Name, which also makes it easier to relocate the Response Stack if required, or add further Response Stacks using the same DNS Name
The picture opposite shows the third option, where the Tachyon Server has two DNS Names, one each for Master and Response Stacks.
Tachyon systems supporting over 50000 clients also require the Response Stack to have a dedicated network interface for connection to a remote SQL Server. This is to keep incoming and outgoing response traffic separate. Network interface requirements are explained further in Networking and DNS requirements.
Applications and Tools
Tachyon applications and tools are consumers, and all consumers connect to the Tachyon Consumer API.
Tachyon Applications
The following consumer applications run on Tachyon Platform and are installed using Tachyon Setup. See License requirements for consumer applications.
Application | Purpose | Type |
---|---|---|
Inventory 5.1 | View and export inventory, and manage associations. | Inventory, configuration |
Settings 1.3 | Configure and monitor platform features. | Configuration |
AppClarity 7.1 | Manage software license compliance, License Demand Calculations, license entitlements, and for reclaiming unused software. | Inventory |
Application Migration 3.1 | Intelligently automate the migration of applications during a Configuration Manager OS deployment. | Inventory |
Experience 1.2 | Measure performance, stability and responsiveness for applications and devices to assess user experience across your enterprise. | Client |
Explorer 5.1 | Investigate, remediate issues and manage operations across all your endpoints in real-time. | Client |
Guaranteed State 1.4 | Ensure endpoint compliance to enterprise IT policies. | Client |
Patch Success 1.2.104 | Reports on and ensures successful patching of your enterprise. Requires SLA Business Intelligence to be installed by Tachyon Setup, as described in Business Intelligence. It also needs connectors to get meta-data for patches from whichever of the following that you use to approve patches:
| Inventory |
The following types of application require 1E Client (with Tachyon features enabled) to be deployed to all in-scope devices.
- All Client applications
- Inventory applications if you intend using the Tachyon connector to populate your inventory, because this depends on the Tachyon client features of the 1E Client.
The AI Powered Auto-curation feature is optionally used by Inventory applications to provide automatic curation of new products. This avoids having to manually add products to the 1E Catalog, or wait for it be updated. This optional feature requires additional memory on the Tachyon Server (Master Stack). Please refer to AI Powered Auto-curation: Memory requirements for details.
Some benefits of using AI Powered Auto-curation are that you can:
- Achieve significantly more normalized software from the first sync
- Reduce the manual effort required to normalize software
- Get an expanded SAM offering as more data is available for AppClarity
- Get additional coverage for Application Migration
- Identify more software to review for security threats.
Tachyon Tools
The following are tools included in Tachyon Platform. These tools are not installed using Tachyon Setup. They have either their own installers or are included in download zips.
- Tachyon Configuration Manager UI extensions - installed as part of the Tachyon Toolkit, this is a right-click extension for the Microsoft System Center Configuration Manager console that provides a graphical user interface for the user to browse and run an instruction on devices in a specified Collection
- Tachyon Run Instruction command-line tool - installed as part of the Tachyon Toolkit, it is used for sending instructions to the Tachyon server from a script or from a command prompt
- Tachyon Product Pack Deployment Tool - included in the Tachyon Platform zip ProductPacks folder
- Tachyon Instruction Management Studio) - used for development of Tachyon instructions using the Tachyon SDK.
A typical Tachyon license allows use of all these tools.
Telemetry
Telemetry (introduced in Tachyon Platform 5.1) helps 1E to continually improve your experience with Tachyon. Only summarized statistical information is collected which enables 1E to see how customers use features of the application. No personally identifiable data is collected. 1E use this information to:
- Understand how the product is being used to influence future development decisions
- Plan supported platforms (OS, SQL etc. versions) over time
- Deliver a smooth upgrade experience as we can focus testing on implemented scenarios
- Improve system performance
- Identify early warning signs of potential issues such as excessive growth of database tables, instruction failures etc. so we can pro-actively address them.
Full details of the data sent to 1E is provided in Telemetry data. The information is compressed, encrypted and sent to 1E through email on a configurable schedule.
The feature is enabled by default but may be disabled using Tachyon Setup during installation or upgrade, and can be enabled or disabled as a post-installation task. 1E encourages customers to enable sending telemetry, to help us build better products.
License requirements for consumer applications
For any application, tool or feature to use instructions, its consumer and prefix pattern must be registered in your license. The table below shows the consumers and prefix patterns that are typically included in a Tachyon license. The table also includes other applications where instructions - and therefore licensing - is not applicable. Tachyon expects to find the license file in: %PROGRAMDATA%\1E\Licensing on your Tachyon (Master Stack) Server.
Application or Feature | Consumer name | Prefix patterns | Where to obtain the Product Pack | Notes |
---|---|---|---|---|
Explorer | Explorer | You will need prefixes for any Tachyon instructions you want to use, including custom prefixes for your own and/or third party. Included in the base Tachyon license are:
|
| Explorer application provides functionality to run, approve and schedule instructions, view Tachyon managed devices. Used to investigate, remediate issues and manage operations across all your endpoints in real-time. If you want to use instructions developed by third parties, your own developers, or 1E developers on your behalf, then you must ask 1E to register the third party and customer prefixes in your license. Please refer to Developing your own instructions. You cannot create or update instructions using other prefixes because they must be signed by others. |
Guaranteed State | GuaranteedState |
(for v5.1 onwards Guaranteed State requires licensing for its instruction fragments) |
| Guaranteed State application ensures endpoint compliance to enterprise IT policies. The application allows you to manage rules and policies, and report on compliance. |
Inventory | Inventory |
|
| Inventory application is used to view and export inventory, and manage associations (new in 5.0). Inventory data can be captured from various sources using connectors. Data is consolidated, normalized and stored in inventory repositories. The Tachyon connector is one method of collecting data, and this uses four inventory instructions which are available in the 1E Inventory Product Pack. This pack also includes another instruction used by Patch Success. The 1E-Inventory Product Pack replaces 1E-Inventory-ProductPacks previously included in the installation of the SLA component of the Tachyon platform. |
Settings | Platform | N/A | N/A | The Settings application is used to administer Tachyon. For example, permissions management, instruction set management, connector management, repository management, sync scheduling etc. |
Experience | Experience | N/A | N/A | 1E Experience provides interactive charts that help visualise your end-users experience of IT service delivery across your enterprise. Experience derives a score that is based on metrics that cover four categories:
|
AppClarity | AppClarity | N/A | N/A | AppClarity is a Tachyon application aimed at Software Asset Management (SAM) users, helping you get to grips with software waste, take control of license compliance and manage application portfolios easily. It offers an immediate reduction in software costs by helping you manage your software assets on desktops more effectively and maintain software license compliance. The main benefits of using AppClarity are:
Now, you can financially quantify all software waste by identifying and controlling unused software across your enterprise and improve your compliance status. |
PatchSuccess |
|
| Patch Success is a Tachyon application that lets you maximize success of enterprise-wide patch deployment. It provides a view of patch state of your estate, as well as supplementing your existing patch deployment methods. Required instructions need to be licensed as well as the consumer. Three instructions are available in the 1E Patch Success Product Pack and another one in the 1E Inventory Product Pack. | |
Tachyon Configuration Manager UI extensions | CmConsoleExtensions RunInstructionUI |
|
| The Configuration Manager Console extensions is installed as part of The 1E Tachyon Toolkit. |
TachyonRunInstruction | You will need prefixes for any Tachyon instructions you want to use, including custom prefixes for your own and/or third party. | The Tachyon Run Instruction command-line tool is installed as part of The 1E Tachyon Toolkit. | ||
1E ITSM Connect | ServiceNowCore | You will need prefixes for any Tachyon instructions you want to use, including custom prefixes for your own and/or third party. | N/A | 1E ITSM Connect (with 1E Core) provides a User Interface in ServiceNow similar to Tachyon Explorer, that allows ServiceNow users to use any instruction that is permissioned for the 1E ITSM Connect app user role. |
ServiceNowCore | You will need prefixes for any Tachyon instructions you want to use, including custom prefixes for your own and/or third party. | 1E Service Catalog Connect (with 1E Core) provides a User Interface in ServiceNow similar to the 1E Shopping app portal, that allows ServiceNow users to use any instruction that is permissioned for the 1E ITSM Connect app user role. | ||
Application Migration and WSS | Nomad | N/A | N/A | Application Migration intelligently automates the migration of applications during a Configuration Manager OS deployment. Using migration rules (defined by an administrator), previously installed applications can be reinstalled, upgraded or replaced with an alternative during an OS deployment task sequence. These rules can include usage criteria, allowing you to choose to only install previously installed applications if they were being used, or perhaps replace a rarely used application with a less costly alternative. This functionality enables applications to be actively rationalized during an OS migration exercise, standardizing on products and versions and reclaiming unused software. |
Nomad (various) | Nomad |
|
| Nomad Download Pause is a feature of Nomad and requires an installation of ActiveEfficiency Server. The feature is available as:
Nomad Admin tools for the Configuration Manager are installed using the NomadBranchAdminUIExt.msi installer. |
Nomad |
|
| Many businesses rely on Microsoft Endpoint Manager Configuration Manager (MEMCM) to deploy software, patches and updates across their company networks. It is crucial that Configuration Manager is working effectively. The MEMCM Client Health policy monitors Configuration Manager client health and performance. It checks for cache availability, inventory cycles, service availability and Configuration Manager WMI integrity - common causes of Configuration Manager client problems on devices. The MEMCM Client Health policy replaces the previous SCCM Client Health policy and covers the following:
This policy is intended for deployment to Windows devices only. | |
Nomad |
|
| Nomad is included as part of the 1E Client, and as part of that integration, we offer a Nomad client health compliance policy in Guaranteed State. This verifies common Nomad requirements such as ACP registration, disk availability, firewall exceptions, crash notifications and cache monitoring. The Nomad client health policy replaces the client health tile in the Nomad dashboard plus additional remediation steps:
This policy is intended for deployment to Windows devices only. | |
Nomad |
|
| ||
NightWatchman Online Status | NightWatchman | N/A | N/A | The NightWatchman console uses Tachyon to display traffic lights live status of its clients – indicating whether they are currently online or offline (or unknown). You can also check the status of groups within the NightWatchman client hierarchy. |
Infrastructure dependencies
PKI and certificates
Client-Switch communication uses WebSocket Secure protocol, whereby each Tachyon client establishes a secure link to the Switch which is then used by the Switch to send instructions to the Tachyon client. This is shown as a dotted line in the pictures in the Communication Ports page.
All other communications from external devices use HTTPS, including Tachyon client connecting to the Background Channel in order to download resources that may be required by instructions, and using the Tachyon Portal to administer and use the system.
All communication is encrypted, which requires a Public Key Infrastructure (PKI). More specifically, PKI is required for:
- Tachyon web server certificate - prerequisite for each Tachyon Server website, must contain all the DNS Names used for the server
- Tachyon Server certificate - usually an exported version of the website certificate
- Tachyon client certificates - each Tachyon client uses the device's client certificate to authenticate itself to Tachyon Switches
- Certificate Revocation Lists (CRLs) - Tachyon clients and Switches use HTTP-based CRL Distribution Points to validate certificates
- Code signing certificates - used for signing custom and modified instructions, so they can be imported into Tachyon and then run
- Digital signing certificates - used for signing 1E software
You can use Tachyon Setup to install Tachyon Server so it does not require Tachyon clients to present certificates to the Tachyon Switch. The Platform can be reconfigured later to re-enable use of client certificates when your environment is ready. The Tachyon Server requires a Web Server certificate. If this is an issue for you then please contact 1E.
Miscellaneous
In addition to PKI and network requirements, other infrastructure dependencies are:
- DNS - each Tachyon Server requires a DNS Name, this is also useful for ActiveEfficiency Server if it is installed
- Active Directory - for installation and user accounts and groups; Tachyon supports multi-domain, multi-forest environments that have two-way trusts
- IIS - a standard configuration required on each Tachyon Server
- SQL Server - for Tachyon Master and Response Stack databases, Catalog SLA and BI databases, and ActiveEfficiency if installed
- SQL Analysis Services - must be installed in multi-dimensional mode, for Business Intelligence (SLA BI cube) required by Patch Success
- Email - optional for approval and notification emails, but required if using two-factor authentication (2FA)
- Internet access - the Master Stack requires access to the 1E license service via the Internet in order to keep the Tachyon license activated, and 1E Catalog requires access to the 1E Catalog Cloud service to download Catalog updates
For more detail on these infrastructure dependencies, please refer to the Requirements page.
Infrastructure dependencies that require design decisions are listed below.
Email and two-factor authentication
You will need to decide if you want to use the Email and two-factor authentication features.
If the 2FA feature is enabled, Tachyon users are prompted to enter a one-time authentication code in addition to their password in order to confirm they want to submit an action instruction.
The one-time authentication code is sent to the user by email. The two-factor authentication feature requires email.
Please refer to Tachyon Server post-installation tasks: Enabling or disabling Two-factor Authentication.
SQL Server
You will need to decide if Tachyon databases are installed locally or on remote SQL Server instance(s).
Databases that are remote from their Tachyon Servers increase the complexity of design and installation in the following ways:
- Tachyon Server installation depends on the server installation account having appropriate rights on the SQL Server instance. Remote SQL Servers are typically run on farms managed by other teams who may not want to grant permissions to your installation account.
- If a Response Stack serves over 500 devices then you will require an additional network interface, which requires network routing as described in Network interfaces below.
You will need to regularly backup the Tachyon Master database. The Tachyon Server can be re-installed from scratch using the existing database or a restored backup.
There is no requirement to backup the Tachyon Responses database because it only contains transient data. You can backup and restore the Responses database if that is your organization's preference for recovery.
Microsoft SQL Server Express is not supported for either Master or Responses databases, due to its limitations.
For details about configuration and sizing of Tachyon databases please refer to Requirements: SQL Server requirements.
Please contact 1E if you require Microsoft SQL Clustering to be used.
You will also require SQL Server Analysis Services if you are using Experience or Patch Success applications.
Active Directory
Tachyon Servers must be domain-joined.
Each Tachyon user requires an account in Active Directory. AD accounts must have their userPrincipalName (UPN) attribute populated, which is normal, but may be missing if users accounts have been created using scripts.
Tachyon users and approvers should have email addresses to support approval workflow and notifications. Email addresses are mandatory if Two-factor Authentication is enabled.
Active Directory security groups are strongly recommended for role-based access control (RBAC) but are not mandatory. AD security groups can be assigned to Tachyon roles after installation, they are not required during installation. They are added as Tachyon users and configured in the same way as AD user accounts. A Tachyon user can therefore be a domain user account or a security group. Groups are not mandatory because users can be assigned to roles and managed within Tachyon instead of AD, or a combination.
Tachyon Setup assigns a limited set of permissions to the server installation account, as described in Tachyon user permissions, which cannot be edited. However, the installation account's permissions can be extended if the account is a member of one or more AD Groups configured as Tachyon users.
An AD security group is also useful to configure access to the CatalogWeb Admin page, as described in Rebuilding the 1E Catalog.
AD distribution groups are not supported.
Please contact 1E if you require a DMZ Server that is not domain-joined.
Networking and DNS requirements
Network interfaces
A server that hosts Response Stack components requires additional network interfaces depending on the number of client devices it needs to support:
- Each Switch requires its own network interface for incoming Response traffic. These interfaces can be shared with a Background Channel. Each interface can have its own DNS Name or share the same DNS Name as explained in DNS Names below.
- If the Tachyon Responses database is not local, and the server supports more than 500 devices, then for performance reasons you should have an additional network interface for outgoing SQL traffic to keep it apart from incoming Switch traffic.
- If the server hosting the Tachyon Master Stack is also required to host a non-Tachyon client-facing service such as ActiveEfficiency Server for Nomad, or Application Migration, and the number of clients is more than 5,000 then for performance reasons you should do one of the following:
- install the Tachyon Response Stack on a dedicated server, which should have an additional network interface for connection with the Master Stack, but this is not mandatory. If an additional network interface is used then it requires its own DNS Name and a website binding manually added after installation. The additional DNS Name should be included in the server's web certificate, or a separate web certificate can be used.
- install the Tachyon Response Stack on the same server as the Master Stack and use an additional network interface for non-Tachyon client traffic and give it its own DNS Name and a website binding manually added after installation. If an HTTPS binding is required, then this additional DNS Name should be included in the server's web certificate, or a separate web certificate can be used.
Administration traffic for a Tachyon Master Stack does not have any additional network requirements.
Number and speed of server network interfaces
The following conditions apply to network interfaces, which must be configured before installing Tachyon on a server.
Switches | Each Switch supports up to 50,000 devices and requires its own network interface, with a minimum speed of 1Gbps. Switch interfaces can be on the same or different subnets. |
Response Stack serving using a remote SQL Server instance and more than 500 devices | In addition to the Switch interfaces, another interface is required for outgoing response traffic from the Response Stack Core to its remote SQL Server. This should have a minimum speed of 1Gbps, or 10Gbps if the Response Stack has 3 or more Switches. This is required to ensure optimum performance when SQL Server is remote. Network routing on the Response Stack server must be configured so that SQL traffic is routed over this interface. The simplest method is to route all outgoing traffic. The interface used for SQL traffic should not register its IP Address in DNS to avoid unnecessary incoming traffic and accidentally becoming part of a round-robin DNS Name used for Switches. |
ActiveEfficiency Server and Response Stack installed on the same server and more than 50000 devices | Tachyon Setup can install ActiveEfficiency Server. However, systems that support over 50000 clients require separation of Tachyon and Nomad client traffic to ensure optimum performance. Therefore, you must choose one of the following installation options for ActiveEfficiency Server:
|
DMZ Server | An additional internal facing interface is required for outgoing response traffic from Switches on the DMZ Server to the Core on the internal Tachyon Response Stack. This should have a minimum speed of 1Gbps. As stated above, each Switch must have it own external facing interface, used for incoming response traffic from Tachyon clients to Switches. The external facing interface(s) can also be used for Tachyon clients to the Background Channel. The simplest way to ensure the internal interface is used for outgoing traffic is for it be on a different subnet to the external interface(s) with no routing between them. |
Each network interface must be assigned a static IP Address. Tachyon Setup supports installation using IPv4.
If you have a working IPv6 environment, then please contact 1E for advice on using that.
For the remote SQL Server requirement, please refer to Preparation: Configuring a persistent route for SQL traffic. However, please ensure you also consult your server, firewall and networking teams.
Network impact
Most of the network traffic experienced by a Tachyon system is compressed responses from Tachyon clients to Switches. Responses to Tachyon instructions are returned by online Tachyon clients in a matter of a few seconds. Tachyon is designed for speed without impacting your network.
The Response Stack's Core then processes and stores uncompressed responses in the Tachyon Responses database. If the database is remote then this will create significant network traffic when saving responses, but normally this will be within a datacenter. Even so, a dedicated interface is recommended on each Response Stack for connection to a remote SQL Server in order to prevent network contention between incoming and outgoing response traffic.
Other network traffic generated by Tachyon is low by comparison. Tachyon Explorer is a single page application which uses paging to view responses.
Tachyon clients also download content from a Background Channel, which is a website hosted on the same server as Switches. They deliberately stagger the delay of their download for up to 5 minutes (configurable). By using 1E Nomad you can avoid the staggered delay on Windows PCs without impacting your network. For further information about 1E Nomad please refer to Downloading content and Nomad integration below.
WAN caching
Communications between Tachyon clients and Switches should not be cached or delayed, which can be prevented by excluding the Switch port(s) or the IP Addresses of Switch interfaces on caching devices.
Communications between Tachyon clients and the Background Channel can be cached, however, please refer to Downloading content and Nomad integration as an alternative to WAN caching.
Isolated Networks
Tachyon can operate in a multi-domain, multi-forest environment with Tachyon client devices on internal and external networks, supporting internal and external Certificate Authorities.
Each Tachyon client device must have a network connection to a Switch and Background Channel, with the necessary network firewall ports open. If Tachyon clients are unable to connect to the Tachyon Server on the corporate network, then it is necessary to install additional Tachyon Servers.
Firewall ports
For details of firewall ports and different types of network traffic, please refer to the Communication Ports page where you can find the following:
DNS Names
The correct choice of DNS Name(s) for your Tachyon Servers is perhaps the most fundamental decision you will make.
Each server that has Tachyon platform components installed requires its own DNS Name.
Master Stack | The Master Stack is used by the following, therefore it helps users if it has a recognizable and convenient DNS Name such as tachyon - this is specified during installation of the Tachyon Server using Tachyon Setup.
Platform services also reside on the Master Stack, which non-Tachyon clients connect to, for example:
|
DMZ Server | The DMZ Server is a type of Response Stack used to provide Tachyon Real-time and Inventory services to Internet-based clients. It requires an external DNS Name - for example tachyonext - this is specified during installation of the DMZ Server using Tachyon Setup. The DNS Name is shared between the Switch network interfaces and Background Channel on the DMZ Server, and specified during installation of Tachyon clients, and stored in their configuration file. |
Response Stack | A Response Stack is used to provide Tachyon Real-time and Inventory services to clients on the internal (corporate) network. The choice of DNS Name is discussed in the table below. The DNS Name is shared between the Switch network interfaces and Background Channel on the Response Stack, and specified during installation of Tachyon clients, and stored in their configuration file. |
The number of DNS Names used by a system depend on the location of Tachyon and other Platform services. The table below describes options.
Single DNS Name | A Tachyon system can have a single DNS Name if all components are installed on the same server, for example tachyon - this is specified during installation of the Tachyon Server using Tachyon Setup. If the server has multiple Switches, and therefore multiple network interfaces, then the same DNS Name can be shared by all Switches, the Background Channel and Master Stack. If ActiveEfficiency Server is installed, it can share the same DNS Name provided the server supports less than 5,000 clients. ActiveEfficiency requires its own network interface and DNS Name if the server supports more than 5,000 clients, as described under |
Multiple client-facing DNS Names | Master and Response Stacks must have different DNS Names if they exist on different servers:
When a Response Stack is installed on the same server as the Master Stack, it will normally share the same DNS Name as the Master Stack as described under Single DNS Name above. However, if you have multiple Response Stacks and want them to share the same DNS Name, then the Master Stack must use a different DNS Name. This approach of all Response Stacks sharing the same DNS Name simplifies adding further Response Stacks at a later date. Only one client-facing DNS Name can be specified during installation, other HTTPS bindings are added manually after installation. If Master and Response Stack are on the same server and you want them to have different DNS Names, then specify the DNS Name for the Response Stack during installation, and manually add the HTTPS binding for the Response Stack after installation. You will need to seek guidance from 1E on how to configure Switches to use the second DNS Name. A simpler option is to put the Response Stack on its own server. Remote Response Stacks are recommended if the Master Stack is also hosting services for ActiveEfficiency Server, AppClarity Software Reclaimer or Application Migration. You can optionally have additional DNS Name(s) on the Master Stack server for other services such as ActiveEfficiency Server, AppClarity Software Reclaimer and Application Migration. These bindings would be added manually after installation, and do not require any further complex configuration. ActiveEfficiency Server requires its own network interface and DNS Name if it is installed on the same server as a Response Stack and supports more than 5,000 clients:
|
Internal DNS Names | A DMZ Server is a special example of a Response Stack. The DMZ Server itself requires two DNS Names:
Both DNS Names must be included in the web server certificate. The Response Stack also requires an additional DNS Name - for example tachyonalt - for internal communications with the DMZ Server. Please refer to Implementing a Tachyon DMZ Server for more detail about DMZ Servers. |
Tachyon Setup supports installation of one HTTP and one HTTPS binding, but you can manually add more bindings after installation. HTTPS bindings can share a web server certificate provided it includes all DNS Names, or each HTTPS binding can have its own certificate.
Each DNS Name used to access a Tachyon Server must be included as a DNS Name in the Subject Alternate Name (SAN) entry of the web server certificate, and the Switch certificate files.
A DNS Name can be a DNS alias, CNAME or Host (A) record.
Tachyon Platform and applications use underlying IIS and SQL Server technology, and only require HTTP or MSSQLSvc class SPNs if your company security policy has configured IIS or SQL Server to use Kerberos authentication.
If your IIS server is using Kerberos, then each DNS Name used to access a Tachyon Web Server requires an HTTP class Service Principal Name (SPN) to be registered against the relevant service account in Active Directory, which is computer$ by default. This allows Tachyon web applications to authenticate clients using Windows Authentication where Kerberos is an authentication provider (primary, fallback or negotiated).
If your IIS server is using Kerberos then HTTP SPNs are required for web applications that use Windows Authentication, and are created using:
- the web application pool's service account, which is Network Service for all of Tachyon's application pools, and therefore is the computer$ account
- each (A) Host record used to access the web application. If the server is accessed using a CNAME record then you need to register an SPN for each (A) Host record used by the CNAME. A CNAME will have multiple (A) Host records when using round-robin or NLB to access the web server.
SPNs are not required for DNS Names used to connect to Switches and Background Channel, because they do not use Windows Authentication. However, the same DNS Name may be used to access other web applications.
Downloading content and Nomad integration
Tachyon client downloads content from the Tachyon Background Channel. Content is mainly scripts and other files required by Tachyon instructions. It also includes client resources such as extensible modules, providers, and other dependencies to maintain the 1E Client. In most cases, client resources are version controlled to prevent repeated downloads. Tachyon instructions always request a download even if they have run an instruction before, unless the content for that instruction has been cached in memory.
You may need to consider the impact on the network if there is a large amount of content included in an instruction. This is more of an operational consideration instead of a design consideration.
1E Nomad is an optionally licensed component of the 1E Client. It makes software deployment, patching and downloading content more efficient and reduces the impact on the network. It removes the need for remote Distribution Point servers in Microsoft System Center Configuration Manager systems. When Nomad is installed on computers it automatically elects a peer to download content from a server over the WAN and then peer-shares the content with other PCs at the same location. The downloaded content is cached locally on each PC in case it is needed again.
Tachyon can optionally use Nomad to download content from servers irrespective of whether Nomad is integrated with Configuration Manager or not, and also uses advanced Nomad features which use ActiveEfficiency.
Nomad integration disabled
If Nomad integration is not used, the following apply:
- Tachyon client waits a randomized stagger period defined by its DefaultStaggerRangeSeconds setting, and then downloads content from the specified Background Channel.
- Tachyon client retains modules and extensibles that it has downloaded, but does not retain instruction scripts after they have been run. Any instruction that requires a script or other file will download the latest version each time the instruction is run.
Nomad integration enabled
Nomad integration is available on Windows PC devices and is enabled by default, but can be disabled during installation of the 1E Client.
With the Nomad integration feature enabled, Tachyon client will detect if a supported version of Nomad is running on the device.
- Tachyon client immediately requests Nomad to download content from the specified HTTP source such as the Background Channel. Nomad behaves in the same way as it does with Configuration Manager by ensuring the latest version of content is obtained and electing a master to perform the actual download.
- Nomad maintains its own cache of downloaded content which avoids the need for repeat downloads over the WAN, and provides content to peers that require the same resources which avoids peer devices having to download over the WAN.
- If the Nomad integration feature is enabled, and requested content is not provided within the timeout period, the Tachyon client will fall back to downloading directly from the HTTP source. The most likely reason for a timeout is if Nomad is busy downloading other content.
To use Nomad, there is no special configuration of Tachyon Servers. The Background Channel is a web application on the Tachyon Server which uses HTTPS and default port is 443. The URL for the Background Channel is defined in the 1E Client configuration file and is specified during installation of the 1E Client if Tachyon features are enabled. The Tachyon client passes this URL to Nomad when it requests content to be downloaded. Instructions can also specify other HTTP sources.
Nomad does not need to be configured to use certificates in order to communicate with the Background Channel (the Nomad CertIssuer and CertSubject settings are used only with Configuration Manager Distribution Points that are configured to validate device certificates).
Nomad Single-Site Download (SSD) feature uses ActiveEfficiency Server to further reduce the impact downloading content over the WAN.
1E Client deployment
You will need to plan the deployment of 1E Client (with Tachyon features enabled) using whichever software deployment tools you have. For details of interactive and command-line installation, please refer to Deploying Tachyon clients.
Tachyon features require client certificates. For more detail, please refer to Requirements: Tachyon client Certificates.
Below are lists of supported OS Platforms, but please also refer to Requirements: Constraints of Legacy OS.
Supported Platforms
All 1E Client features are supported on the following Windows OS:
Windows
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows 10 CB 21H2
- Windows 11 CB 21H2
- Windows 10 CB 21H1
- Windows 10 CB 20H2
- Windows 10 CB 2004
- Windows 10 CB 1909
- Windows 10 CB 1903
- Windows 8.1
The zip for 1E Client for Windows is available for download from the 1E Support Portal .
Professional and Enterprise editions of Windows 10 are supported.
All versions are provided with 32-bit & 64-installers, and can be installed on physical and virtual computers.
This list is automatically updated to show only those OS versions in mainstream support by Microsoft, and therefore supported by 1E, and by 1E Client 5.1. However the following OS continue to be supported as exceptions to help customers during their migration to the latest OS:
- Windows Server 2012 R2
- Windows 7 SP1
Please refer to Constraints of Legacy OS regarding end of mainstream support.
For Microsoft product lifecycle details, please refer to https://support.microsoft.com/en-us/lifecycle/search.
Please refer to https://1eportal.force.com/s/support-for-msft-rapid-release-cycle for details of which Current Branch versions are supported by 1E products, and known issues regarding specific versions.
The Tachyon client features of 1E Client are supported on the following non-Windows OS:
macOS
- macOS Catalina 10.15
- macOS Mojave 10.14
- macOS High Sierra 10.13
Linux
- CentOS 8.1
- Debian 10.4
- Fedora 32
- openSUSE Leap 15.1
- Red Hat Enterprise Linux 7.1
- Red Hat Enterprise Linux 8.1
- SUSE Linux Enterprise 15.1
- Ubuntu 18.04
Solaris
- Solaris 11.4
- Solaris 11.3
1E Client supports only Tachyon features on non-Windows devices.
Other versions of these non-Windows OS should work but have not been tested by 1E.
The 1E Client for non-Windows zip is available for download from the 1E Support Portal, and includes 1E Client packages for the following architectures:
- Linux variations on Intel 64-bit platforms
- Solaris on Intel 64-bit and SPARC platforms
Also included in the download are 1E Client packages for the following legacy Linux distributions:
- Fedora 21
- openSUSE Leap 42.1
1E Client packages for other Linux distributions can be requested, including Raspbian for Raspberry Pi.
Developing your own instructions
You will need your own code signing certificate, and have it registered in your Tachyon license, if you want to develop your own custom Tachyon instructions, or modify those of other authors. Instructions that are provided in the Tachyon Platform zip or downloaded from the Tachyon Exchange have already been code signed using the Platform and Exchange certificates from 1E. Your Tachyon license controls whether you can use these instructions.
Ideally all of your Tachyon instruction developers should share a single code signing certificate between them. Each code signing certificate must be registered in your Tachyon license and associated with your organization's instruction name prefix. When you have chosen your prefix and have your code signing certificate(s) you then need to send details of these to 1E, who will update your Tachyon license. This will then automatically activate on your Tachyon Server (assuming it has connection to the Internet).
For a detailed step-by-step process, please refer to Setting up custom Tachyon Instructions for the first time.
The Tachyon SDK is where you can find comprehensive resources for developing your instructions.
You can also download Product Packs containing more instructions from the Tachyon Exchange, and ask questions in the Tachyon Forum.