Installation

Table Of Contents
6 Restart the View Composer service to make your changes take eect.
Example: SviConfig ReplaceCertificate
The following example replaces the certicate that is bound to the View Composer port:
sviconfig -operation=ReplaceCertificate
-delete=false
Configure Client Endpoints to Trust Root and Intermediate
Certificates
If a View server certicate is signed by a CA that is not trusted by client computers and client computers
that access View Administrator, you can congure all Windows client systems in a domain to trust the root
and intermediate certicates. To do so, you must add the public key for the root certicate to the Trusted
Root Certication Authorities group policy in Active Directory and add the root certicate to the Enterprise
NTAuth store.
For example, you might have to take these steps if your organization uses an internal certicate service.
You do not have to take these steps if the Windows domain controller acts as the root CA, or if your
certicates are signed by a well known CA. For well known CAs, the operating system venders preinstall
the root certicate on client systems.
If your server certicates are signed by a lile-known intermediate CA, you must add the intermediate
certicate to the Intermediate Certication Authorities group policy in Active Directory.
For client devices that use other operating systems than Windows, see the following instructions for
distributing root and intermediate certicates that users can install:
n
For Horizon Client for Mac, see “Congure Horizon Client for Mac to Trust Root and Intermediate
Certicates,” on page 89.
n
For Horizon Client for iOS, see “Congure Horizon Client for iOS to Trust Root and Intermediate
Certicates,” on page 90.
n
For Horizon Client for Android, see documentation on the Google Web site, such as the Android 3.0
User's Guide
n
For Horizon Client for Linux, see the Ubuntu documentation
Prerequisites
Verify that the server certicate was generated with a KeyLength value of 1024 or larger. Client endpoints
will not validate a certicate on a server that was generated with a KeyLength under 1024, and the clients will
fail to connect to the server.
Procedure
1 On your Active Directory server, use the certutil command to publish the certicate to the Enterprise
NTAuth store.
For example: certutil -dspublish -f path_to_root_CA_cert NTAuthCA
View Installation
88 VMware, Inc.