6.1

Table Of Contents
3 On the Authentication tab, select a setting from the Delegation of authentication to VMware Horizon
(SAML 2.0 Authenticator) drop-down menu to enable or disable the SAML authenticator.
Option Description
Disabled
SAML authentication is disabled. You can launch remote desktops and
applications only from Horizon Client.
Allowed
SAML authentication is enabled. You can launch remote desktops and
applications from both Horizon Client and Workspace Portal.
Required
SAML authentication is enabled. You can launch remote desktops and
applications only from Workspace Portal. You cannot launch desktops or
applications from Horizon Client manually.
You can configure each View Connection Server instance in your deployment to have different SAML
authentication settings, depending on your requirements.
4 Select Create New Authenticator from the SAML Authenticator drop-down menu, or, if a SAML
authenticator has already been added, click Manage Authenticators and click Add.
5 Configure the SAML authenticator in the Add SAML 2.0 Authenticator dialog box.
Option Description
Label
Unique name that identifies the SAML authenticator.
Description
Brief description of the SAML authenticator. This value is optional.
Metadata URL
URL for retrieving all of the information required to exchange SAML
information between the SAML identity provider and the View
Connection Server instance. Click <YOUR HORIZON SERVER NAME>
and replace it with the FQDN or IP address of the Workspace Portal server
or external-facing load balancer.
Administration URL
URL for accessing the administration console of the SAML identity
provider. This URL should point to the Workspace Portal Connector Web
interface. This value is optional.
6 Click OK to save the SAML authenticator configuration.
If you provided valid information, you must either accept the self-signed certificate (not recommended)
or use a trusted certificate for View and Workspace Portal.
The SAML 2.0 Authenticator drop-down menu displays the newly created authenticator, which is now
set as the selected authenticator.
7 In the System Health section on the View Administrator dashboard, select Other components > SAML
2.0 Authenticators, select the SAML authenticator that you added, and verify the details.
If the configuration is successful, the authenticator's health is green. An authenticator's health can
display red if the certificate is untrusted, if Workspace Portal is unavailable, or if the metadata URL is
invalid. If the certificate is untrusted, you might be able to click Verify to validate and accept the
certificate.
Using Smart Card Certificate Revocation Checking
You can prevent users who have revoked user certificates from authenticating with smart cards by
configuring certificate revocation checking. Certificates are often revoked when a user leaves an
organization, loses a smart card, or moves from one department to another.
View supports certificate revocation checking with certificate revocation lists (CRLs) and with the Online
Certificate Status Protocol (OCSP). A CRL is a list of revoked certificates published by the CA that issued the
certificates. OCSP is a certificate validation protocol that is used to get the revocation status of an X.509
certificate.
Chapter 3 Setting Up Authentication
VMware, Inc. 53