Installation
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Installing View in an IPv6 Environment
- Setting Up View in an IPv6 Environment
- Supported vSphere, Database, and Active Directory Versions in an IPv6 Environment
- Supported Operating Systems for View Servers in an IPv6 Environment
- Supported Windows Operating Systems for Desktops and RDS Hosts in an IPv6 Environment
- Supported Clients in an IPv6 Environment
- Supported Remoting Protocols in an IPv6 Environment
- Supported Authentication Types in an IPv6 Environment
- Other Supported Features in an IPv6 Environment
- Installing View in FIPS Mode
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Creating a User Account for a Standalone View Composer Server
- Create a User Account for View Composer AD Operations
- Create a User Account for Instant-Clone Operations
- Configure the Restricted Groups Policy
- Using Horizon 7 Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Disable Weak Ciphers in SSL/TLS
- Installing View Composer
- Prepare a View Composer Database
- Configuring an SSL Certificate for View Composer
- Install the View Composer Service
- Enable TLSv1.0 on vCenter and ESXi Connections from View Composer
- Configuring Your Infrastructure for View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on View Connection Server and Security Server
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Configuring View Connection Server for the First Time
- Horizon Administrator and Horizon Connection Server
- Log In to View Administrator
- Install the Product License Key
- Add vCenter Server Instances to View
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Configure the PCoIP Secure Gateway and Secure Tunnel Connections
- Configure the Blast Secure Gateway
- Configuring External URLs for Secure Gateway and Tunnel Connections
- Set the External URLs for a View Connection Server Instance
- Modify the External URLs for a Security Server
- Give Preference to DNS Names When View Connection Server Returns Address Information
- Allow HTML Access Through a Load Balancer
- Allow HTML Access Through a Gateway
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Control Port for PCoIP Secure Gateway on Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to View Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
- Index
Configure Horizon Client for iOS to Trust Root and Intermediate Certificates
If a server certicate is signed by a CA that is not trusted by iPads and iPhones that run Horizon Client for
iOS, you can congure the the device to trust the root and intermediate certicates. You must distribute the
root certicate and all intermediate certicates in the trust chain to the devices
Procedure
1 Send the root certicate and intermediate certicates as email aachments to the iPad.
2 Open the email aachment for the root certicate and select Install.
The certicate displays the following message:
Unverifiable Profile. The authenticity of Certificate name cannot be verified. Installing
this profile will change settings on your iPad.
Root Certificate. Installing the certificate Certificate name will add it to the list of
trusted certificates on your iPad.
3 Select Install again.
4 Repeat steps 2 and 3 for all intermediate certicates in the trust chain.
Configuring Certificate Revocation Checking on Server Certificates
Each View Connection Server instance performs certicate revocation checking on its own certicate and on
those of the security servers paired to it. Each instance also checks the certicates of vCenter and View
Composer servers whenever it establishes a connection to them. By default, all certicates in the chain are
checked except the root certicate. You can, however, change this default.
If a SAML 2.0 authenticator is congured for use by a View Connection Server instance, View Connection
Server also performs certicate revocation checking on the SAML 2.0 server certicate.
View supports various means of certicate revocation checking, such as certicate revocation lists (CRLs)
and the Online Certicate Status Protocol (OCSP). A CRL is a list of revoked certicates published by the
CA that issued the certicates. OCSP is a certicate validation protocol that is used to get the revocation
status of an X.509 certicate.
With CRLs, the list of revoked certicates is downloaded from a certicate distribution point (DP) that is
often specied in the certicate. The server periodically goes to the CRL DP URL specied in the certicate,
downloads the list, and checks it to determine whether the server certicate has been revoked. With OCSP,
the server sends a request to an OCSP responder to determine the revocation status of the certicate.
When you obtain a server certicate from a third-party certicate authority (CA), the certicate includes one
or more means by which its revocation status can be determined, including, for example, a CRL DP URL or
the URL for an OCSP responder. If you have your own CA and generate a certicate but do not include
revocation information in the certicate, the certicate revocation check fails. An example of revocation
information for such a certicate could include, for example, a URL to a Web-based CRL DP on a server
where you host a CRL.
If you have your own CA but do not or cannot include certicate revocation information in your certicate,
you can choose not to check certicates for revocation or to check only certain certicates in a chain. On the
server, with the Windows Registry Editor, you can create the string (REG_SZ) value
, under HKLM\Software\VMware, Inc.\VMware VDM\Security, and set this
value to one of the following data values.
View Installation
90 VMware, Inc.










