Installation

Table Of Contents
Prerequisites
Verify that all client devices that connect to this server, including thin clients, run Horizon Client 5.2 for
Windows or Horizon Client 2.0 or later releases. You must upgrade the legacy clients.
Procedure
1 Start the Windows Registry Editor on the View Connection Server or security server computer where
the PCoIP Secure Gateway is running.
2 Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Teradici\SecurityGateway registry key.
3 Add a new String (REG_SZ) value, SSLCertPresentLegacyCertificate, to this registry key.
4 Set the SSLCertPresentLegacyCertificate value to 0.
5 Restart the VMware Horizon View PCoIP Secure Gateway service to make your changes take eect.
Setting View Administrator to Trust a vCenter Server or View
Composer Certificate
In the View Administrator dashboard, you can congure View to trust a vCenter Server or View Composer
certicate that is untrusted.
VMware strongly recommends that you congure vCenter Server and View Composer to use SSL
certicates that are signed by a CA. Alternatively, you can accept the thumbprint of the default certicate for
vCenter Server or View Composer.
Similarly, VMware recommends that you congure SAML 2.0 authenticators to use SSL certicates that are
signed by a CA. Alternatively, in the View Administrator dashboard you can congure View to trust an
untrusted SAML 2.0 server certicate by accepting the thumbprint of the default certicate.
Benefits of Using SSL Certificates Signed by a CA
A CA is a trusted entity that guarantees the identity of the certicate and its creator. When a certicate is
signed by a trusted CA, users no longer receive messages asking them to verify the certicate, and thin
client devices can connect without requiring additional conguration.
You can request an SSL server certicate that is specic to a Web domain such as www.mycorp.com, or you can
request a wildcard SSL server certicate that can be used throughout a domain such as *.mycorp.com. To
simplify administration, you might choose to request a wildcard certicate if you need to install the
certicate on multiple servers or in dierent subdomains.
Typically, domain-specic certicates are used in secure installations, and CAs usually guarantee more
protection against losses for domain-specic certicates than for wildcard certicates. If you use a wildcard
certicate that is shared with other services, the security of the VMware Horizon product also depends on
the security of those other services. If you use a wildcard certicate, you must ensure that the private key is
transferrable between servers.
When you replace the default certicate with your own certicate, clients use your certicate to authenticate
the server. If your certicate is signed by a CA, the certicate for the CA itself is typically embedded in the
browser or is located in a trusted database that the client can access. After a client accepts the certicate, it
responds by sending a secret key, which is encrypted with the public key contained in the certicate. The
secret key is used to encrypt trac between the client and the server.
Chapter 8 Configuring SSL Certificates for View Servers
VMware, Inc. 95