6.0

Table Of Contents
Figure 51. Restricted Entitlements Example
DMZ
client device
View
Connection
Server
Tag: “External”
desktop pool A
Tag: “External”
View
Security
Server
VM VM
VM VM
client device
View
Connection
Server
Tag: “Internal”
desktop pool B
Tag: “Internal”
VM VM
VM VM
external
network
You can also use restricted entitlements to control desktop access based on the user-authentication method
that you configure for a particular View Connection Server instance. For example, you can make certain
desktop pools available only to users who have authenticated with a smart card.
The restricted entitlements feature only enforces tag matching. You must design your network topology to
force certain clients to connect through a particular View Connection Server instance.
Using Group Policy Settings to Secure Remote Desktops and
Applications
View includes Group Policy administrative (ADM) templates that contain security-related group policy
settings that you can use to secure your remote desktops and applications.
For example, you can use group policy settings to perform the following tasks.
n
Specify the View Connection Server instances that can accept user identity and credential information
that is passed when a user selects the Log in as current user check box in Horizon Client for Windows.
n
Enable single sign-on for smart card authentication in Horizon Client.
n
Configure server SSL certificate checking in Horizon Client.
n
Prevent users from providing credential information with Horizon Client command line options.
n
Prevent non-Horizon Client systems from using RDP to connect to remote desktops. You can set this
policy so that connections must be Horizon Client-managed, which means that users must use View to
connect to remote desktops.
See the Setting Up Desktop and Application Pools in View for information on using remote desktop and
Horizon Client group policy settings.
Chapter 5 Planning for Security Features
VMware, Inc. 77