5.2

Table Of Contents
The most recent value of the smart card removal policy is enforced during offline smart card authentication.
The
smart card removal policy determines whether users must reauthenticate to gain access to their desktops
after removing their smart cards. If the policy is set to disconnect user sessions on smart card removal, when
users remove a smart card, the guest operating system in the View desktop is locked. The View Client window
remains open, and users can select Options > Send Ctrl-Alt-Delete to log in again. The smart card removal
policy is a View Connection Server setting.
Configure Smart Card Authentication
To configure smart card authentication, you must obtain a root certificate and add it to a server truststore file,
modify View Connection Server configuration properties, and configure smart card authentication settings.
Depending on your particular environment, you might need to perform additional steps.
Procedure
1 Obtain the Root Certificate from the CA on page 158
You must obtain the root certificate from the CA that signed the certificates on the smart cards presented
by your users.
2 Export a Root Certificate from a User Certificate on page 159
If you have a CA-signed user certificate or a smart card that contains one, you can export the root
certificate if it is trusted by your system.
3 Add the Root Certificate to a Server Truststore File on page 159
You must add the root certificate for all trusted users to a server truststore file so that View Connection
Server instances and security servers can authenticate smart card users and connect them to their View
desktops.
4 Modify View Connection Server Configuration Properties on page 160
To enable smart card authentication, you must modify View Connection Server configuration properties
on your View Connection Server or security server host.
5 Configure Smart Card Settings in View Administrator on page 161
You can use View Administrator to specify settings to accommodate different smart card authentication
scenarios.
Obtain the Root Certificate from the CA
You must obtain the root certificate from the CA that signed the certificates on the smart cards presented by
your users.
If you do not have the root certificate of the CA that signed the certificates on the smart cards presented by
your users, you can export a root certificate from a CA-signed user certificate or a smart card that contains one.
See “Export a Root Certificate from a User Certificate,” on page 159.
Procedure
1 Obtain the root certificate from one of the following sources.
n
A Microsoft IIS server running Microsoft Certificate Services. See the Microsoft TechNet Web site for
information on installing Microsoft IIS, issuing certificates, and distributing certificates in your
organization.
n
The public root certificate of a trusted CA. This is the most common source of a root certificate in
environments that already have a smart card infrastructure and a standardized approach to smart
card distribution and authentication.
VMware Horizon View Administration
158 VMware, Inc.