Reset Search
 

 

Article

KB9085 - What are the required permissions to install and run Pulse Connect Secure legacy client components or Pulse Secure Desktop client?

« Go Back

Information

 
Last Modified Date9/15/2015 2:06 PM
Synopsis

This article provides information about the permissions that are required to install and run the Pulse Connect Secure client components (such as SAM or Network Connect) and Pulse Secure Desktop client.

Problem or Goal
Describe how to find documentation about the permissions that are required to install and run the Pulse Connect Secure client components and Pulse Secure Desktop client.
Cause
Solution

Pulse Connect Secure clients (except for Pulse Secure Desktop clients):

The Client Side Changes Guide outlines the permissions and client side changes that are required to install and run Pulse Secure client components (such as Network Connect, WSAM, and so on) by using the PCS’s ActiveX, ActiveX installer service, and Java mechanisms. The Client Side Changes Guide can be found as follows:

  1. Go to Pulse Secure Technical Documentation:  https://www.pulsesecure.net/support
  2. Refer to the Pulse Secure client Side Changes Guide.
If users do not have administrative rights, refer to KB9084 - [PCS] FAQ - PCS client component deployment


Pulse Secure Desktop Clients:

Administrator privileges are required for the initial installation or removal of Pulse Secure Desktop client for Windows.  Any subsequential upgrades will use Pulse Secure Installer Service (built-in with Pulse Secure Desktop client for Windows as a default component) when Pulse Secure client connects directly to the PCS device or using a web browser.  Administrator rights are required when deploying Pulse Secure client via MSI.  

For  Mac OS X, The built-in Pulse Secure Installer Service is not available and administrator privileges will be required for the initial install and subsequent upgrades. For more information, refer to KB9084 - [PCS] FAQ - PCS client component deployment

 
Related Links
Attachment 1 
Created ByData Deployment

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255