The computer details window displays everything that is known about a particular computer. You can open the computer details window for a computer by double clicking the computer in the Computers window. By customizing columns in the Computers window (right click in its window header area), you can display most of the information from the Detail window's Information and Audit panes in tabular form in the Computers window itself. See the Computers Window Documentation for more general information about computers.
The Categorization pane shows the most basic information about how KeyServer identifies and treats this computer. The Login type affects whether the client can login to the server, and how a seat is allocated for it. If a date is shown next to the Login type, this shows the date and time at which the server seat for this client will be revoked if there is no further activity on the client computer. To read more about Login types, refer to the Computer Window Document. The menu at the right is used for Lifecycle Management and the value can be changed as appropriate. The default value is "Deployed", and the other two choices are "Maintenance" and "Retired". Only Deployed computers will be displayed in Avaiability Maps. Next the Computer ID is shown. The Computer ID is assigned by KeyServer, according to the settings in Computer ID Types in the Config Menu. The version of KeyAccess is shown, as well as the Division which has been assigned to this computer, if any. Finally, a Tags field allows configuration of Tags for this Computer. For more, read the Tags documentation.
This pane shows hardware information about the computer, such as the Computer Name and the Last Address the computer used when connecting to KeyServer. If you hold the cursor over some of these properties, you may see additional information. For example, holding the cursor over the MAC address will reveal information about what type of interface it is (e.g. Gigabit Ethernet), and will show any additional MAC addresses which have been identified on the client.
This pane shows information about software audits from the computer.
This pane contains one item - a list of Manage Policies which this computer currently has a license for, or in some cases simply has used. Node and Lease Policies are listed in bold, and these policies currently have a license allocated to the computer. Policies which are not in bold are Site or Concurrent policies, and these have been used on the computer, but are not necessarily currently in use (and therefore not necessarily allocated). Site or Concurrent Policies which have not been used on the computer for over 60 days are listed in italics.
Since an administrator can add and delete computers from node lists for policies, this list may show policies which the computer has never actually used (in which case the Last Usage column will show the time at which the administrator manually added the computer to the node list).
Also note that policies can be dragged directly from the Policies window into this list in order to add the computer to the node list for the policy. Likewise, policies can be deleted from this list, deleting the computer from the node list for the policy. In the case of a Node or Lease Policy, deleting the policy from the list will also revoke it, allowing a different computer to then use that license if necessary.
This pane contains a list of groups which the computer belongs to as a member of the node list for the group. That is, the computer may be able to match a group based on location or filter definitions associated with the group, but that group won't be listed in the Groups pane of the computer details, because the computer isn't explicitly defined in the node list of the group.
This pane allows you to view and configure custom fields for each computer. They are part of the internal KSComputers table which can be accessed through ksODBC. They can be automatically populated from the client, if it finds values on the local computer. Windows KeyAccess looks in the registry in the directory:
with keys assetID, assetLocation, and assetOwner. If no value is found in the registry for assetID, Windows KeyAccess will then check WMI for Win32_SystemEnclosure -> SMBIOSAssetTag.
Mac KeyAccess looks for the same property names in:
So one way to set these values on a Mac is using the command line:
sudo defaults write /Library/Preferences/com.sassafras.KeyAccess assetID my_id
If the client sends asset related properties, the Confirmed and Confirmed By fields will not be populated. In this case, the Admin can click the Confirmed button to force these fields to be populated. Note one subtlety - once the Confirmed field has been populated, it will not be cleared - even if the client subsequently sends up a new Asset ID.
However, you can also manually enter values in KeyConfigure, in the Asset ID, Location, and Owner fields. If you enter a value in any of these fields and save the change, the Confirmed field will automatically be filled in with the current date and time, and the Confirmed By field will be filled in with the KeyServer account name which you are logged into KeyConfigure with. As long as no clients have registry/plist entries for these values, the manually entered data will remain as is. However, if clients have registry entries, the values will get overwritten with the values from the client when it next logs in. So if you are trying to force a manual change, you should check the “Locked” checkbox - this will prevent any automatic changes originating from the client.
This pane shows any custom columns which have been defined. For more information on defining and using custom columns, see the Custom Columns documentation.
This pane contains a single item, which is a free-form text field. You can use it for any information you want. It can be seen here in the KeyConfigure interface, and can also be used in reports.