Installation
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Installing View in an IPv6 Environment
- Setting Up View in an IPv6 Environment
- Supported vSphere, Database, and Active Directory Versions in an IPv6 Environment
- Supported Operating Systems for View Servers in an IPv6 Environment
- Supported Windows Operating Systems for Desktops and RDS Hosts in an IPv6 Environment
- Supported Clients in an IPv6 Environment
- Supported Remoting Protocols in an IPv6 Environment
- Supported Authentication Types in an IPv6 Environment
- Other Supported Features in an IPv6 Environment
- Installing View in FIPS Mode
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Creating a User Account for a Standalone View Composer Server
- Create a User Account for View Composer AD Operations
- Create a User Account for Instant-Clone Operations
- Configure the Restricted Groups Policy
- Using Horizon 7 Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Disable Weak Ciphers in SSL/TLS
- Installing View Composer
- Prepare a View Composer Database
- Configuring an SSL Certificate for View Composer
- Install the View Composer Service
- Enable TLSv1.0 on vCenter and ESXi Connections from View Composer
- Configuring Your Infrastructure for View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on View Connection Server and Security Server
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Configuring View Connection Server for the First Time
- Horizon Administrator and Horizon Connection Server
- Log In to View Administrator
- Install the Product License Key
- Add vCenter Server Instances to View
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Configure the PCoIP Secure Gateway and Secure Tunnel Connections
- Configure the Blast Secure Gateway
- Configuring External URLs for Secure Gateway and Tunnel Connections
- Set the External URLs for a View Connection Server Instance
- Modify the External URLs for a Security Server
- Give Preference to DNS Names When View Connection Server Returns Address Information
- Allow HTML Access Through a Load Balancer
- Allow HTML Access Through a Gateway
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Control Port for PCoIP Secure Gateway on Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to View Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
- Index
Similarly, if a SAML 2.0 authenticator is congured for View Connection Server, the View Connection Server
computer must have installed the root certicate of the signing CA for the SAML 2.0 server certicate.
Overview of Tasks for Setting Up SSL Certificates
To set up SSL server certicates for View servers, you must perform several high-level tasks.
In a pod of replicated View Connection Server instances, you must perform these tasks on all instances in
the pod.
The procedures for carrying out these tasks are described in the topics that follow this overview.
1 Determine if you need to obtain a new signed SSL certicate from a CA.
If your organization already has a valid SSL server certicate, you can use that certicate to replace the
default SSL server certicate provided with View Connection Server, security server, or View
Composer. To use an existing certicate, you also need the accompanying private key.
Starting Place Action
Your organization provided you with a valid SSL server
certicate.
Go directly to step 2.
You do not have an SSL server certicate. Obtain a signed SSL server certicate from a
CA.
2 Import the SSL certicate into the Windows local computer certicate store on the View server host.
3 For View Connection Server instances and security servers, modify the certicate Friendly name to vdm.
Assign the Friendly name vdm to only one certicate on each View server host.
4 On View Connection Server computers, if the root certicate is not trusted by the Windows Server host,
import the root certicate into the Windows local computer certicate store.
In addition, if the View Connection Server instances do not trust the root certicates of the SSL server
certicates congured for security server, View Composer, and vCenter Server hosts, you also must
import those root certicates. Take these steps for View Connection Server instances only. You do not
have to import the root certicate to View Composer, vCenter Server, or security server hosts.
5 If your server certicate was signed by an intermediate CA, import the intermediate certicates into the
Windows local computer certicate store.
To simplify client conguration, import the entire certicate chain into the Windows local computer
certicate store. If intermediate certicates are missing from the View server, they must be congured
for clients and computers that launch View Administrator.
6 For View Composer instances, take one of these steps:
n
If you import the certicate into the Windows local computer certicate store before you install
View Composer, you can select your certicate during the View Composer installation.
n
If you intend to replace an existing certicate or the default, self-signed certicate with a new
certicate after you install View Composer, run the SviConfig ReplaceCertificate utility to bind
the new certicate to the port used by View Composer.
7 If your CA is not well known, congure clients to trust the root and intermediate certicates.
Also ensure that the computers on which you launch View Administrator trust the root and
intermediate certicates.
8 Determine whether to recongure certicate revocation checking.
View Connection Server performs certicate revocation checking on View servers, View Composer, and
vCenter Server. Most certicates signed by a CA include certicate revocation information. If your CA
does not include this information, you can congure the server not to check certicates for revocation.
Chapter 8 Configuring SSL Certificates for View Servers
VMware, Inc. 81










