User manual

Table Of Contents
Link</a><br>
<form><input type="button" value="TestButton" onClick="window.location.href=
'vmware-view://view.mycompany.com/Primary%20Desktop?action=start-session'"></form> <br>
</body>
</html>
Configuring Certificate Checking for End Users
Administrators can congure the certicate verication mode so that, for example, full verication is always
performed.
Certicate checking occurs for SSL connections between Connection Server and Horizon Client.
Administrators can congure the verication mode to use one of the following strategies:
n
End users are allowed to choose the verication mode. The rest of this list describes the three
verication modes.
n
(No verication) No certicate checks are performed.
n
(Warn) End users are warned if a self-signed certicate is being presented by the server. Users can
choose whether or not to allow this type of connection.
n
(Full security) Full verication is performed and connections that do not pass full verication are
rejected.
For details about the types of verication checks performed, see “Seing the Certicate Checking Mode for
Horizon Client,” on page 54.
Use the view.sslVerificationMode property to set the default verication mode:
n
1 implements Full Verification.
n
2 implements Warn If the Connection May Be Insecure.
n
3 implements No Verification Performed.
To congure the mode so that end users cannot change the mode, set the view.allowSslVerificationMode
property to "False" in the /etc/vmware/view-mandatory-config le on the client system. See “Horizon
Client Conguration Seings and Command-Line Options,” on page 27.
Configuring Advanced TLS/SSL Options
You can select the security protocols and cryptographic algorithms that are used to encrypt communications
between Horizon Client and Horizon servers or between Horizon Client and the agent in the remote
desktop.
These options are also used to encrypt the USB channel (communication between the USB service daemon
and the agent).
With the default seing, cipher suites use 128- or 256-bit AES, remove anonymous DH algorithms, and then
sort the current cipher list in order of encryption algorithm key length.
By default, TLS v1.0, TLS v1.1, and TLS v1.2 are enabled. SSL v2.0 and v3.0 are not supported.
N If TLS v1.0 and RC4 are disabled, USB redirection does not work when users are connected to
Windows XP desktops. Be aware of the security risk if you choose to make this feature work by enabling
TLS v1.0 and RC4.
Chapter 2 Configuring Horizon Client for End Users
VMware, Inc. 41