Administration

Table Of Contents
Configure a SAML Authenticator in View Administrator
To launch remote desktops and applications from VMware Identity Manager or to connect to remote
desktops and applications through a third-party load balancer or gateway, you must create a SAML
authenticator in View Administrator. A SAML authenticator contains the trust and metadata exchange
between View and the device to which clients connect.
You associate a SAML authenticator with a View Connection Server instance. If your deployment includes
more than one View Connection Server instance, you must associate the SAML authenticator with each
instance.
You can allow one static authenticator and multiple dynamic authenticators to go live at a time. You can
congure vIDM (Dynamic) and Access Point (Static) authenticators and retain them in active state. You can
make connections through either of these authenticators.
You can congure more than one SAML authenticator to a View Connection Server and all the
authenticators can be active simultaneously. However, the entity-ID of each of these SAML authenticators
congured on the View Connection Server must be dierent.
The status of the SAML authenticator in dashboard is always green as it is predened metadata that is static
in nature. The red and green toggling is only applicable for dynamic authenticators.
For information about conguring a SAML authenticator for VMware Access Point appliances, see Deploying
and Conguring Access Point.
Prerequisites
n
Verify that Workspace Portal, VMware Identity Manager, or a third-party gateway or load balancer is
installed and congured. See the installation documentation for that product.
n
Verify that the root certicate for the signing CA for the SAML server certicate is installed on the
connection server host. VMware does not recommend that you congure SAML authenticators to use
self-signed certicates. For information about certicate authentication, see the View Installation
document.
n
Make a note of the FQDN or IP address of the Workspace Portal server, VMware Identity Manager
server, or external-facing load balancer.
n
(Optional) If you are using Workspace Portal or VMware Identity Manager, make a note of the URL of
the connector Web interface.
n
If you are creating an authenticator for Access Point or a third-party appliance that requires you to
generate SAML metadata and create a static authenticator, perform the procedure on the device to
generate the SAML metadata, and then copy the metadata.
Procedure
1 In View Administrator, select  > Servers.
2 On the Connection Servers tab, select a server instance to associate with the SAML authenticator and
click Edit.
View Administration
60 VMware, Inc.