Administration

Table Of Contents
Procedure
1 On your View Connection Server or security server host, use the keytool utility to import the root
certificate, intermediate certificate, or both into the server truststore file.
For example:
keytool -import -alias alias -file root_certificate -keystore truststorefile.key
In this command, alias is a unique case-sensitive name for a new entry in the truststore file,
root_certificate is the root or intermediate certificate that you obtained or exported, and
truststorefile.key is the name of the truststore file that you are adding the root certificate to. If the file
does not exist, it is created in the current directory.
Note The keytool utility might prompt you to create a password for the truststore file. You will be
asked to provide this password if you need to add additional certificates to the truststore file at a later
time.
2 Copy the truststore file to the SSL gateway configuration folder on the View Connection Server or
security server host.
For example: install_directory\VMware\VMware
View\Server\sslgateway\conf\truststorefile.key
What to do next
Modify View Connection Server configuration properties to enable smart card authentication.
Modify View Connection Server Configuration Properties
To enable smart card authentication, you must modify View Connection Server configuration properties on
your View Connection Server or security server host.
Prerequisites
Add the CA (certificate authority) certificates for all trusted user certificates to a server truststore file.
These certificates include root certificates and can include intermediate certificates if the user's smart
card certificate was issued by an intermediate certificate authority.
Procedure
1 Create or edit the locked.properties file in SSL gateway configuration folder on the View
Connection Server or security server host.
For example: install_directory\VMware\VMware
View\Server\sslgateway\conf\locked.properties
View Administration
VMware, Inc. 50