Administration

Table Of Contents
3 On the Authentication tab, select a seing from the Delegation of authentication to VMware Horizon
(SAML 2.0 Authenticator) drop-down menu to enable or disable the SAML authenticator.
Option Description
Disabled
SAML authentication is disabled. You can launch remote desktops and
applications only from Horizon Client.
Allowed
SAML authentication is enabled. You can launch remote desktops and
applications from both Horizon Client and VMware Identity Manager or
the third-party device.
Required
SAML authentication is enabled. You can launch remote desktops and
applications only from VMware Identity Manager or the third-party
device. You cannot launch desktops or applications from Horizon Client
manually.
You can congure each Connection Server instance in your deployment to have dierent SAML
authentication seings, depending on your requirements.
4 Click Manage SAML Authenticators and click Add.
5 Congure the SAML authenticator in the Add SAML 2.0 Authenticator dialog box.
Option Description
Type
For Unied Access Gateway or a third-party device, select Static. For
VMware Identity Manager select Dynamic. For dynamic authenticators,
you can specify a metadata URL and an administration URL. For static
authenticators, you must rst generate the metadata on the
Unied Access Gateway or a third-party device, copy the metadata, and
then paste it into the SAML metadata text box.
Label
Unique name that identies the SAML authenticator.
Description
Brief description of the SAML authenticator. This value is optional.
Metadata URL
(For dynamic authenticators) URL for retrieving all of the information
required to exchange SAML information between the SAML identity
provider and the Connection Server instance. In the URL https://<YOUR
HORIZON SERVER NAME>/SAAS/API/1.0/GET/metadata/idp.xml, click
<YOUR HORIZON SERVER NAME> and replace it with the FQDN or IP
address of the VMware Identity Manager server or external-facing load
balancer (third-party device).
Administration URL
(For dynamic authenticators) URL for accessing the administration console
of the SAML identity provider. For VMware Identity Manager, this URL
should point to the VMware Identity Manager Connector Web interface.
This value is optional.
SAML metadata
(For static authenticators) Metadata text that you generated and copied
from the Unied Access Gateway or a third-party device.
Enabled for Connection Server
Select this check box to enable the authenticator. You can enable multiple
authenticators. Only enabled authenticators are displayed in the list.
6 Click OK to save the SAML authenticator conguration.
If you provided valid information, you must either accept the self-signed certicate (not recommended)
or use a trusted certicate for Horizon 7 and VMware Identity Manager or the third-party device.
The Manage SAML Authenticators dialog box displays the newly created authenticator.
7 In the System Health section on the Horizon Administrator dashboard, select Other components >
SAML 2.0 Authenticators, select the SAML authenticator that you added, and verify the details.
If the conguration is successful, the authenticator's health is green. An authenticator's health can
display red if the certicate is untrusted, if VMware Identity Manager is unavailable, or if the metadata
URL is invalid. If the certicate is untrusted, you might be able to click Verify to validate and accept the
certicate.
Chapter 4 Setting Up Other Types of User Authentication
VMware, Inc. 63