Installation

Table Of Contents
If a SAML authenticator is congured for use with a View Connection Server instance, View
Connection Server also performs certicate revocation checking on the SAML server certicate.
Obtaining a Signed SSL Certificate from a CA
If your organization does not provide you with an SSL server certicate, you must request a new certicate
that is signed by a CA.
You can use several methods to obtain a new signed certicate. For example, you can use the Microsoft
certreq utility to generate a Certicate Signing Request (CSR) and submit a certicate request to a CA.
See the Scenarios for Seing Up SSL Certicates for View document for an example that shows you how to use
certreq to accomplish this task.
For testing purposes, you can obtain a free temporary certicate based on an untrusted root from many CAs.
I You must follow certain rules and guidelines when you obtain signed SSL certicates from a
CA.
n
When you generate a certicate request on a computer, make sure that a private key is generated also.
When you obtain the SSL server certicate and import it into the Windows local computer certicate
store, there must be an accompanying private key that corresponds to the certicate.
n
To comply with VMware security recommendations, use the fully qualied domain name (FQDN) that
client devices use to connect to the host. Do not use a simple server name or IP address, even for
communications within your internal domain.
n
Do not create certicates for servers using a certicate template that is compatible only with a Windows
Server 2008 enterprise CA or later.
n
Do not generate certicates for servers using a KeyLength value under 1024. Client endpoints will not
validate a certicate on a server that was generated with a KeyLength under 1024, and the clients will fail
to connect to the server. Certicate validations that are performed by View Connection Server will also
fail, resulting in the aected servers showing as red in the View Administrator dashboard.
For general information about obtaining certicates, consult the Microsoft online help available with the
Certicate Snap-in to MMC. If the Certicate Snap-in is not yet installed on your computer, see Add the
Certicate Snap-In to MMC,” on page 84.
Obtain a Signed Certificate from a Windows Domain or Enterprise CA
To obtain a signed certicate from a Windows Domain or Enterprise CA, you can use the Windows
Certicate Enrollment wizard in the Windows Certicate Store.
This method of requesting a certicate is appropriate if communications between computers remain within
your internal domain. For example, obtaining a signed certicate from a Windows Domain CA might be
appropriate for server-to-server communications.
If your clients connect to View servers from an external network, request SSL server certicates that are
signed by a trusted, third-party CA.
Prerequisites
n
Determine the fully qualied domain name (FQDN) that client devices use to connect to the host.
To comply with VMware security recommendations, use the FQDN, not a simple server name or IP
address, even for communications within your internal domain.
n
Verify that the Certicate snap-in was added to MMC. See Add the Certicate Snap-In to MMC,” on
page 84.
n
Verify that you have the appropriate credentials to request a certicate that can be issued to a computer
or service.
View Installation
82 VMware, Inc.