Installation
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Installing Horizon 7 in an IPv6 Environment
- Setting Up Horizon 7 in an IPv6 Environment
- Supported vSphere, Database, and Active Directory Versions in an IPv6 Environment
- Supported Operating Systems for Horizon 7 Servers in an IPv6 Environment
- Supported Windows Operating Systems for Desktops and RDS Hosts in an IPv6 Environment
- Supported Clients in an IPv6 Environment
- Supported Remoting Protocols in an IPv6 Environment
- Supported Authentication Types in an IPv6 Environment
- Other Supported Features in an IPv6 Environment
- Installing Horizon 7 in FIPS Mode
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Creating a User Account for a Standalone View Composer Server
- Create a User Account for View Composer AD Operations
- Create a User Account for Instant-Clone Operations
- Configure the Restricted Groups Policy
- Using Horizon 7 Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Disable Weak Ciphers in SSL/TLS
- Installing View Composer
- Prepare a View Composer Database
- Configuring an SSL Certificate for View Composer
- Install the View Composer Service
- Enable TLSv1.0 on vCenter and ESXi Connections from View Composer
- Configuring Your Infrastructure for View Composer
- Installing Horizon Connection Server
- Installing the Horizon Connection Server Software
- Installation Prerequisites for Horizon Connection Server
- Install Horizon Connection Server with a New Configuration
- Install a Replicated Instance of Horizon Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for Horizon Connection Server
- Reinstall Horizon Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling Horizon 7 Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for Horizon 7 Servers
- Understanding SSL Certificates for Horizon 7 Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure Horizon Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting Horizon Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on Horizon Connection Server and Security Server
- Configuring Horizon 7 for the First Time
- Configuring User Accounts for vCenter Server, View Composer, and Instant Clones
- Configuring Horizon Connection Server for the First Time
- Horizon Administrator and Horizon Connection Server
- Log In to Horizon Administrator
- Install the Product License Key
- Add vCenter Server Instances to Horizon 7
- Configure View Composer Settings
- Configure View Composer Domains
- Add an Instant-Clone Domain Administrator
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Configure the PCoIP Secure Gateway and Secure Tunnel Connections
- Configure the Blast Secure Gateway
- Configuring External URLs for Secure Gateway and Tunnel Connections
- Set the External URLs for an Horizon Connection Server Instance
- Modify the External URLs for a Security Server
- Give Preference to DNS Names When Horizon Connection Server Returns Address Information
- Allow HTML Access Through a Load Balancer
- Allow HTML Access Through a Gateway
- Replacing Default Ports for Horizon 7 Services
- Replace the Default HTTP Ports or NICs for Horizon Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on Horizon Connection Server Instances and on Security Servers
- Replace the Default Control Port for PCoIP Secure Gateway on Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to Horizon 7 Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
9 Verify that the new certificate contains a private key.
a In the Certificates (Local Computer) > Personal > Certificates folder, double-click the new
certificate.
b In the General tab of the Certificate Information dialog box, verify that the following statement
appears: You have a private key that corresponds to this certificate.
What to do next
Modify the certificate Friendly name to vdm.
Modify the Certiļ¬cate Friendly Name
To configure a Connection Server instance or security server to recognize and use an SSL certificate, you
must modify the certificate Friendly name to vdm.
You do not have to modify the Friendly name of SSL certificates that are used by View Composer.
Prerequisites
Verify that the server certificate is imported into the Certificates (Local Computer) > Personal >
Certificates folder in the Windows Certificate Store. See Import a Signed Server Certificate into a
Windows Certificate Store.
Procedure
1 In the MMC window on the Windows Server host, expand the Certificates (Local Computer) node
and select the Personal > Certificates folder.
2 Right-click the certificate that is issued to the Horizon 7 server host and click Properties.
3 On the General tab, delete the Friendly name text and type vdm.
4 Click Apply and click OK.
5 Verify that no other server certificates in the Personal > Certificates folder have a Friendly name of
vdm.
a Locate any other server certificate, right-click the certificate, and click Properties.
b If the certificate has a Friendly name of vdm, delete the name, click Apply, and click OK.
What to do next
Import the root certificate and intermediate certificates into the Windows local computer certificate store.
After all certificates in the chain are imported, you must restart the Connection Server service or Security
Server service to make your changes take effect.
View Installation
VMware, Inc. 96










