deviceTRUST 19.3.200 is now available. See the release notes for more information.

Installing the eLux Client

Import the deviceTRUST certificate chain

The deviceTRUST eLux Client is signed with a certificate that must first be trusted by both ELIAS and the eLux devices. Full details of how to import certificates into ELIAS and deploy them to eLux devices can be found by searching for ‘Organizing certificates for package validation’ within the eLux documentation. The deviceTRUST certificate chain can be downloaded here.

  • The import of the deviceTRUST certificate chain is only necessary when the eLux environment is configured to check the signatures of packages. However, it is good practice to ensure that the packages match the certificates.

Within ELIAS:

  • Import devicetrust-gmbh-20200218.pem into Trusted Issuer.
  • Import globalsign-extended-validation-codesigning-sha256-g3-20240615.pem into Intermediate CA.
  • Import globalsign-20290318.pem into Trusted Root CA.

Within the Scout console:

  • Deploy the files devicetrust-gmbh-20200218.pem, globalsign-extended-validation-codesigning-sha256-g3-20240615.pem and globalsign-20290318.pem into the /setup/cacerts/ folder of the eLux device.

Install the package

Within ELIAS:

  • Ensure that the required ‘deviceTRUST Client’ package has been imported into the package library.
  • If you’ve imported the deviceTRUST certificate chain, then check the signatures of the package.
  • Assign the ‘deviceTRUST Client’ package to the image.

Within the Scout console:

  • Update your eLux devices.

Next time you connect using ICA or RDP to a server with a licensed deviceTRUST Host, the properties of your eLux device will be available within your virtual session.