User manual

Table Of Contents
n
The Connection Server instance must present a valid root-signed
certicate to Horizon Client.
Horizon Client
requirements
n
Set the certicate checking mode to Never connect to untrusted servers
or Warn before connecting to untrusted servers. For information about
seing the certicate checking mode, see “Seing the Certicate
Checking Mode for Horizon Client,” on page 27.
n
Enable Touch ID by tapping Enable Touch ID on the View server login
screen. After you successfully log in, your Active Directory credentials
are stored securely in the iOS device's Keychain. The Enable Touch ID
option is shown the rst time you log in and does not appear after Touch
ID is enabled.
You can use Touch ID with smart card authentication and as part of two-factor authentication with RSA
SecurID and RADIUS authentication. If you use Touch ID with smart card authentication, Horizon Client
connects to the server after you enter your PIN and the Touch ID login screen does not appear.
Supported Desktop Operating Systems
Administrators create virtual machines with a guest operating system and install agent software in the guest
operating system. End users can log in to these virtual machines from a client device.
For a list of the supported Windows guest operating systems, see the "Supported Operating Systems for
View Agent" topic in the View 5.x or 6.x installation documentation. See the "Supported Operating Systems
for Horizon Agent" topic in the Horizon 7 installation documentation.
Some Linux guest operating systems are also supported if you have View Agent 6.1.1 or later, or
Horizon Agent 7.0 or later. For information about system requirements, conguring Linux virtual machines
for use in Horizon 6 or Horizon 7, and a list of supported features, see Seing Up Horizon 6 for Linux
Desktops, which is part of the Horizon 6, version 6.1 documentation, or see Seing Up Horizon 7 for Linux
Desktops.
Preparing Connection Server for Horizon Client
Administrators must perform specic tasks to enable end users to connect to remote desktops and
applications.
Before end users can connect to Connection Server or a security server and access a remote desktop or
application, you must congure certain pool seings and security seings:
n
If you plan to use Access Point, congure Connection Server to work with Access Point. See Deploying
and Conguring Access Point. Access Point appliances fulll the same role that was previously played by
only security servers.
n
If you are using a security server, verify that you are using the latest maintenance releases of
Connection Server 5.3.x and Security Server 5.3.x or later releases. For more information, see the View
Installation document.
n
If you plan to use a secure tunnel connection for client devices and if the secure connection is
congured with a DNS host name for Connection Server or a security server, verify that the client
device can resolve this DNS name.
To enable or disable the secure tunnel, in View Administrator, go to the Edit View Connection Server
Seings dialog box and use the check box called Use secure tunnel connection to desktop.
n
Verify that a desktop or application pool has been created and that the user account that you plan to use
is entitled to access the pool.
Chapter 1 Setup and Installation
VMware, Inc. 11