6.0

Table Of Contents
Table 23. Global Security Settings for Client Sessions and Connections
Setting Description
Reauthenticate secure tunnel connections after
network interruption
Determines if user credentials must be reauthenticated after a network
interruption when Horizon clients use secure tunnel connections to
remote desktops.
When you select this setting, if a secure tunnel connection is
interrupted, Horizon Client requires the user to reauthenticate before
reconnecting.
This setting offers increased security. For example, if a laptop is stolen
and moved to a different network, the user cannot automatically gain
access to the remote desktop without entering credentials.
When this setting is not selected, the client reconnects to the remote
desktop without requiring the user to reauthenticate.
This setting has no effect when the secure tunnel is not used.
Message security mode Determines if signing and verification of the JMS messages passed
between View components takes place. For details, see “Message
Security Mode for View Components,” on page 33.
By default, message security mode is enabled.
Use IPSec for Security Server connections Determines whether to use Internet Protocol Security (IPSec) for
connections between security servers and View Connection Server
instances.
By default, secure connections (using IPSec) for security server
connections is enabled.
NOTE If you upgrade to View 5.1 or later from an earlier View release, the global setting Require SSL for
client connections is displayed in View Administrator, but only if the setting was disabled in your View
configuration before you upgraded. Because SSL is required for all Horizon Client connections and View
Administrator connections to View, this setting is not displayed in fresh installations of View 5.1 or later
versions and is not displayed after an upgrade if the setting was already enabled in the previous View
configuration.
After an upgrade, if you do not enable the Require SSL for client connections setting, HTTPS connections
from Horizon clients will fail, unless they connect to an intermediate device that is configured to make
onward connections using HTTP. See “Off-load SSL Connections to Intermediate Servers,” on page 36.
Message Security Mode for View Components
You can set message security mode for View components. This setting determines how sender signatures in
JMS messages are treated. By default, JMS messages are rejected if the signature is missing or invalid, or if a
message was modified after it was signed.
If any component in your View environment predates View 3.0, when message security was introduced,
you can change the mode to log a warning if any of these conditions are found, or to not verify signatures at
all. These options are not recommended and it is preferable to upgrade older components.
Some JMS messages are encrypted because they carry sensitive information such as user credentials.
Consider using IPSec to encrypt all JMS messages between View Connection Server instances, and between
View Connection Server instances and security servers.
Table 2-4 shows the options you can select to configure the message security mode. To set an option, select it
from the Message security mode list in the Global Settings dialog window.
Chapter 2 Configuring View Connection Server
VMware, Inc. 33