User manual

Table Of Contents
n
Is the certicate signed by an unknown or untrusted certicate authority (CA)? Self-signed certicates
are one type of untrusted CA.
To pass this check, the certicate's chain of trust must be rooted in the device's local certicate store.
N For information about distributing a self-signed root certicate that users can install on their Linux
client systems, see the Ubuntu documentation.
Horizon Client uses the PEM-formaed certicates stored in the /etc/ssl/certs directory on the client
system. For information about importing a root certicate stored in this location, see "Importing a Certicate
into the System-Wide Certicate Authority Database" in the document at
hps://help.ubuntu.com/community/OpenSSL.
In addition to presenting a server certicate, Connection Server also sends a certicate thumbprint to
Horizon Client. The thumbprint is a hash of the certicate public key and is used as an abbreviation of the
public key. If Connection Server does not send a thumbprint, you see a warning that the connection is
untrusted.
If your administrator has allowed it, you can set the certicate checking mode. Select File > Preferences
from the menu bar. You have three choices:
n
Never connect to untrusted servers. If any of the certicate checks fails, the client cannot connect to the
server. An error message lists the checks that failed.
n
Warn before connecting to untrusted servers. If a certicate check fails because the server uses a self-
signed certicate, you can click Continue to ignore the warning. For self-signed certicates, the
certicate name is not required to match the server name you entered in Horizon Client.
n
Do not verify server identity . This seing means that no certicate checking occurs.
Chapter 3 Managing Remote Desktop and Application Connections
VMware, Inc. 55