All Products
Search
Document Center

WUYING Terminal:General prerequisites

Last Updated:Jun 10, 2025

To use various peripherals on cloud computers, specific prerequisites must be met, and the administrators or end users must perform specific preliminary operations. This topic lists the general prerequisites. Specific prerequisites vary depending on the peripheral type, client type, and other factors. For more information, see the configuration documentation for each type of peripheral.

Obtain peripheral information

Specific information about peripherals, such as the vendor identifiers (VIDs) and product identifiers (PIDs) of USB peripherals and the IP addresses and ports of network printers, is important for subsequent management and use of peripherals. Therefore, you must obtain peripheral information first.

Obtain USB peripheral information

For USB peripherals, the VIDs and PIDs are used when you configure peripheral policies. VIDs and PIDs are hexadecimal strings, such as 0xa12c, where the 0x prefix can usually be omitted. You can query the VIDs and PIDs of connected USB peripherals by using various methods.

Important

The availability of peripherals on cloud computers is determined by many factors, such as the type and version of Alibaba Cloud Workspace terminals, the type and version of cloud computer images, the type and version of the on-premises devices running the Alibaba Cloud Workspace clients, and the brand and model of peripherals. You can access the Query Peripheral Compatibility page in your browser to check the compatibility of cloud computers with specific peripherals. The data on this page is collected under laboratory conditions, and actual results may vary.

Use the Alibaba Cloud Workspace client

  1. Open and log on to the Alibaba Cloud Workspace client.

  2. Click the icon in the upper-right corner of the client and select Settings.

  3. In the left navigation pane of the Settings window, click Peripherals. In the Local USB Peripherals panel, view the VIDs and PIDs of USB peripherals.

    ex_vid_pid_on_tab_peripherals

Use the on-premises computer

You can obtain the VIDs and PIDs of peripherals in the device management information on your computer.

Windows

  1. Search for and open Device Manager from the Start menu.

  2. In the Device Manager window, choose the name of your hardware, click Universal Serial Bus controllers, and then double-click the USB device you want to query.

  3. On the Details tab of the properties dialog box, select Hardware Ids from the Property drop-down list to view the VID and PID in the text box below.

    db_windows_usb_info

macOS

  1. In the system taskbar, choose > About this Mac. In the dialog box, click More Info....

  2. At the bottom of the About this Mac panel, click System Report.

  3. In the left navigation pane of the new window, choose Hardware > USB. In the right panel, select the USB device you want to query to view its VID and PID.

    panel_macos_usb_info

Use a third-party tool

You can use the USB Device Tree Viewer tool to view peripheral information. This tool is only available for the Windows operating system.

  1. Download the tool at https://www.uwe-sieber.de/usbtreeview_e.html#download.

  2. Extract the downloaded package and double-click UsbTreeView.exe to open it.

  3. In the directory tree on the left side of the tool, select the USB device you want to query. In the Device ID section in the right panel, view the VID and PID of the device.

    panel_usbtreeview

Obtain network printer information

For a network printer, you must obtain the IP address and port number of the printer. Check the printer manual for instructions on how to find the printer's IP address and port number (usually available by default).

Configure peripheral policies as an administrator

The permissions and behaviors to use peripherals on cloud computers are controlled by policies at multiple levels, including cloud computer policies configured by administrators in the console, custom configurations specified by end users on the client, and recommended configurations from the best practices library. Policies at different levels have different priorities and scopes of influence.

Policy priority

Policy level

Priority

Scope of influence

Configuration method

Configured by

Requirements

Custom peripheral rules in cloud computer policies

Highest

All cloud computers associated with the policies

Console

Administrator

Client version not earlier than V7.10

Custom configurations of end users

Medium

Current client

Client

End users

None

Recommended configurations from the best practices library

Lowest

Global (default configuration)

No configuration required

None

None

Configure peripheral policies in the console

Peripheral policies are included in cloud computer policies and need to be created and maintained by administrators in the console.

General steps for creating or modifying peripheral policies

Create a custom policy and associate it with a cloud computer

By default, newly created cloud computers are associated with a system-generated default policy. However, the default policy cannot be modified. Administrators need to create a custom cloud computer policy in the console and associate it with the cloud computers.

  1. Log on to the EDS Enterprise console.

  2. In the left-side navigation pane, choose Operation & Maintenance > Policies.

  3. On the Policies page, click Create Policy.

  4. On the Create Policy page, enter the Policy Name as prompted, modify the policy configuration as needed, and click OK.

    After the policy is created, you can view the new policy in the list on the Policies page.

  5. In the left-side navigation pane, choose Resources > Cloud Computers.

  6. On the Cloud Computers page, perform one of the following operations based on your business requirements:

    • Single operation: Find the target cloud computer, click the ⋮ icon in the Actions column, and then select Change Policy.

    • Batch operation: Select one or more cloud computers. At the bottom of the page, choose More > Change Policy.

  7. On the Required Policy tab of the Change Policy panel, click Change Policy, select the newly created custom policy, and click Confirm.

    Note

    If the resource group to which a cloud computer belongs is associated with a policy, you cannot directly replace the policy for the cloud computer. You can either replace the policy for the resource group or remove the cloud computer from the resource group and then replace the policy for the cloud computer.

  8. Click OK at the bottom of the Change Policy panel. In the message that appears, click OK.

Modify a custom policy with which a cloud computer is associated

If cloud computers are already associated with a custom policy, administrators can directly modify the policy in the console.

  1. Log on to the EDS Enterprise console.

  2. In the left-side navigation pane, choose Operation & Maintenance > Policies.

  3. On the Policies page, find the custom policy you want to modify, and click Change Policy in the Actions column.

  4. On the Modify Policy page, modify the policy configuration based on your business requirements, and click OK.

Description of peripheral-related rules in cloud computer policies

Configuration item

Description

Requirement or limit

Peripheral connection guide

Peripheral Connection Guide

By default, this feature is enabled. When this feature is disabled, the terminal does not show the connection guide pop-up of connected peripherals.

Only Windows cloud computers are supported.

Peripherals and printers

Peripherals and Printers Shortcut

The Peripherals and Printers shortcut is shown by default on cloud computers. Select Hide Shortcut to remove it from view. Valid values:

  • Show Shortcut

  • Hide Shortcut

Only Windows cloud computers are supported.

Local disk redirection

Local Disk Mapping

Maps the disks of local devices to the disks of cloud computers. This enables cloud computers to access the disks of local devices. Valid values:

  • Read-only: You can view and copy data stored in the disks of local devices from cloud computers. However, you do not have permissions to write data to the disks.

  • Close: You are not allowed to access data stored in the disks of local devices from cloud computers.

  • Read/Write: You can view, copy, and modify data stored in the disks of local devices from cloud computers.

None.

Peripheral redirection

USB Redirection

After you enable this feature, you can use a cloud computer to access USB devices connected to a client. In addition, you can configure a USB device whitelist or blacklist or configure USB redirection for different types of devices. After you disable this feature, the corresponding peripheral is automatically switched from USB Redirection to Deny.

Web clients do not support USB redirection because they do not support USB devices.

Webcam

Redirection policies for different types of peripherals. Valid values:

  • USB Redirection: redirects local USB devices to cloud computers. To use these USB devices, you must first install the corresponding drivers on cloud computers.

    Note

    To select a USB redirection method, you must first enable USB redirection.

  • Device Redirection: redirects local USB devices to cloud computers. You need only to install the corresponding drivers on clients.

  • Deny: disables peripheral redirection. If you select this option for a peripheral, cloud computers cannot use the peripheral.

Only ASP-based Windows cloud computers are supported. Only device redirection is supported.

Scanner

Only USB redirection is supported.

ADB

No limit.

Printer

To enable print redirection to allow a cloud computer to use the printers of local devices, make sure that the end user connects to the cloud computer through a Windows client or macOS client.

Serial Device

Only Windows cloud computers are supported.

Cloud Hub

By default, this feature is disabled. Once enabled, it offers cloud-based peripheral services.

This feature requires local management software to operate.

Peripheral blacklist and whitelist

Peripheral Blacklist/Whitelist

After you configure USB redirection policies for different types of peripherals, you can configure a peripheral whitelist or blacklist. The peripheral blacklist and whitelist take precedence over USB redirection policies configured for different types of peripherals.

  • After you add a USB device to the blacklist, even if you have disabled USB redirection for this type of peripheral, cloud computers are still allowed to access the USB device.

  • After you add a USB device to the whitelist, even if you have enabled USB redirection for this type of peripheral, cloud computers are not allowed to access the USB device.

  • You can add up to 100 blacklist or whitelist rules. The priorities of peripherals in the whitelist or blacklist are in descending order. You can adjust the order of the peripherals in the list.

  • Vendor Identifiers (VIDs) and Product Identifiers (PIDs) are 4-bit hexadecimal strings, such as a12c.

  • After you configure a whitelist or blacklist, the configuration takes effect the next time a client connects to the corresponding cloud computer.

Peripheral management policies

Custom Rules

You can configure custom redirection policies to manage peripherals based on VIDs and PIDs.

  • You can add up to 100 custom policies.

  • VIDs and PIDs are 4-bit hexadecimal strings, such as a12c.

  • Only Alibaba Cloud Workspace terminals of V6.4.0 or later are supported.

Recommended Rule for Best Practice

Policies recommended by EDS for best practices.

  • You cannot modify the recommended policies. Custom policies take precedence over the recommended policies.

  • Only Alibaba Cloud Workspace terminals of V6.4.0 or later are supported.

(Optional) Install UsbDk as an end user

Note

You must install USB Development Kit (UsbDk) on your on-premises Windows computer only when you use Windows clients and use peripherals in USB redirection mode. In other cases, you do not need to install UsbDk.

UsbDk is an open-source driver library for Windows operating systems designed to provide applications with direct and exclusive access to USB devices. It is crucial for the normal use of USB peripherals on cloud computers. The Windows client installation program includes the UsbDk installation step. If you skip this step during installation, it may cause peripheral usage issues. In this case, you can reinstall UsbDk by performing the following steps:

  1. Open the Alibaba Cloud Workspace client download page, and download the latest version of the Windows client.

  2. Double-click to run the installation program. On the Select Components interface, make sure to select UsbDk Runtime Libraries, and follow the prompts to complete the installation process.

    db_install_usbdk