Administration

Table Of Contents
4 To congure smart card authentication for administrators logging in to View Administrator, click the
Authentication tab and select a conguration option from the Smart card authentication for
administrators drop-down menu in the View Administration Authentication section.
Option Action
Not allowed
Smart card authentication is disabled on the View Connection Server
instance.
Optional
Administrators can use smart card authentication or password
authentication to log in to the View Administrator. If smart card
authentication fails, the administrator must provide a password.
Required
Administrators are required to use smart card authentication when they
log in to View Administrator.
5 Click OK.
6 Restart the View Connection Server service.
You must restart the View Connection Server service for changes to smart card seings to take eect,
with one exception. You can change smart card authentication seings between Optional and Required
without having to restart the View Connection Server service.
Currently logged in user and administrators are not aected by changes to smart card seings.
What to do next
Prepare Active Directory for smart card authentication, if required. See “Prepare Active Directory for Smart
Card Authentication,” on page 50.
Verify your smart card authentication conguration. See “Verify Your Smart Card Authentication
Conguration,” on page 52.
Configure Smart Card Authentication on Third-Party Solutions
Third-party solutions such as load balancers and gateways can perform smart card authentication by
passing a SAML assertion that contains the smart card's X.590 certicate and encrypted PIN.
This topic outlines the tasks involved in seing up third-party solutions to provide the relevant X.590
certicate to View Connection Server after the certicate has been validated by the partner device. Because
this feature uses SAML authentication, one of the tasks is to create a SAML authenticator in View
Administrator.
For information about conguring smart card authentication on Unied Access Gateway, see Deploying and
Conguring Unied Access Gateway.
Procedure
1 Create a SAML authenticator for the third-party gateway or load balancer.
See “Congure a SAML Authenticator in Horizon Administrator,” on page 62.
2 Extend the expiration period of the View Connection Server metadata so that remote sessions are not
terminated after only 24 hours.
See “Change the Expiration Period for Service Provider Metadata on Connection Server,” on page 64.
3 If necessary, congure the third-party device to use service provider metadata from View Connection
Server.
See the product documentation for the third-party device.
4 Congure smart card seings on the third-party device.
See the product documentation for the third-party device.
Chapter 3 Setting Up Smart Card Authentication
VMware, Inc. 49