Administration

Table Of Contents
Configure Workspace ONE Access Policies in Horizon Administrator
Workspace ONE, or VMware Identity Manager (vIDM) administrators can congure access policies to
restrict access to entitled desktops and applications in Horizon 7. To enforce policies created in vIDM you
put Horizon client into Workspace ONE mode so that Horizon client can push the user into Workspace ONE
client to launch entitlements. When you log in to Horizon Client, the access policy directs you to log in
through Workspace ONE to access your published desktops and applications.
Prerequisites
n
Congure the access policies for applications in Workspace ONE. For more information about seing
access policies, see the VMware Identity Manager Administration Guide.
n
Entitle users to published desktops and applications in Horizon Administrator.
Procedure
1 In Horizon Administrator, select  > Servers.
2 On the Connection Servers tab, select a server instance that is associated with a SAML authenticator
and click Edit.
3 On the Authentication tab, set the Delegation of authentication to VMware Horizon (SAML 2.0
Authenticator) option to Required.
The Required option enables SAML authentication. The end user can only connect to the Horizon
server with a SAML token provided by vIDM or a third-party identity provider. You cannot start
desktops or applications from Horizon Client manually.
4 Select Enable Workspace ONE mode.
5 In the Workspace ONE server hostname text box, enter the Workspace ONE Hostname FQDN value.
6 (Optional) Select Block connections from clients that don't support Workspace ONE mode to restrict
Horizon Clients that support Workspace ONE mode from accessing applications.
Horizon Clients earlier than 4.5 do not support the Workspace ONE mode feature. If you select this
option, Horizon Clients earlier than 4.5 cannot access applications in Workspace ONE. The Workspace
ONE mode feature is not enabled for versions later than Horizon 7 version 7.2 if the Workspace ONE
version is earlier than version 2.9.1.
Configure Biometric Authentication
You can congure biometric authentication by editing the pae-ClientConfig aribute in the LDAP database.
Prerequisites
See the Microsoft TechNet Web site for information on how to use the ADSI Edit utility on your Windows
server.
Procedure
1 Start the ADSI Edit utility on the View Connection Server host.
2 In the Connection Seings dialog box, select or connect to DC=vdi,DC=vmware,DC=int.
3 In the Computer pane, select or type localhost:389 or the fully qualied domain name (FQDN) of the
View Connection Server host followed by port 389.
For example: localhost:389 or mycomputer.mydomain.com:389
View Administration
66 VMware, Inc.