Administration

Table Of Contents
Note If you upgrade to View 5.1 or later from an earlier Horizon 7 release, the global setting
Require SSL for client connections is displayed in Horizon Administrator, but only if the setting
was disabled in your Horizon 7 configuration before you upgraded. Because TLS is required for
all Horizon Client connections and Horizon Administrator connections to Horizon 7, this setting is
not displayed in fresh installations of Horizon 7 5.1 or later versions and is not displayed after an
upgrade if the setting was already enabled in the previous Horizon 7 configuration.
After an upgrade, if you do not enable the Require SSL for client connections setting, HTTPS
connections from Horizon clients will fail, unless they connect to an intermediate device that
is configured to make onward connections using HTTP. See Off-load TLS Connections to
Intermediate Servers.
Message Security Mode for Horizon 7 Components
You can set the message security mode to specify the security mechanism used when JMS
messages pass among Horizon 7 components.
The following table shows the options you can select to configure the message security mode. To
set an option, select it from the
Message security mode list in the Global Settings dialog window.
Table 2-4. Message Security Mode Options
Option Description
Disabled Message security mode is disabled.
Mixed Message security mode is enabled but not enforced.
You can use this mode to detect components in your Horizon 7 environment that predate Horizon 7 3.0.
The log files generated by Connection Server contain references to these components. This setting is not
recommended. Use this setting only to discover components that need to be upgraded.
Enabled Message security mode is enabled, using a combination of message signing and encryption. JMS
messages are rejected if the signature is missing or invalid, or if a message was modified after it was
signed.
Some JMS messages are encrypted because they carry sensitive information such as user credentials. If
you use the Enabled setting, you can also use IPSec to encrypt all JMS messages between Connection
Server instances, and between Connection Server instances and security servers.
Note Horizon 7 components that predate version 3.0 are not allowed to communicate with other Horizon
7 components.
Enhanced SSL is used for all JMS connections. JMS access control is also enabled so that desktops, security servers,
and Connection Server instances can only send and receive JMS messages on certain topics.
Horizon 7 components that predate Horizon 6 version 6.1 cannot communicate with a Connection Server
6.1 instance.
Note Using this mode requires opening TCP port 4002 between DMZ-based security servers and their
paired Connection Server instances.
Horizon 7 Administration
VMware, Inc. 38