5.2
Table Of Contents
- VMware Horizon View Installation
- Contents
- VMware Horizon View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Installing View Transfer Server
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure View Clients to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configuring Certificate Checking in View Client for Windows
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- View Transfer Server and SSL Certificates
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the View Connection Server License Key
- Add vCenter Server Instances to View Manager
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support View Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring View Client Connections
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Replace the Default Ports for View Transfer Server
- Sizing Windows Server Settings to Support Your Deployment
- Configuring User Accounts for vCenter Server and View Composer
- Adding the View Desktops Plug-in to the vSphere Web Client
- Configuring Event Reporting
- Index
Configuring Certificate Checking in View Client for Windows
You can use a security-related group policy setting in the View Client Configuration ADM template file
(vdm_client.adm) to configure SSL server certificate checking in the Windows-based View Client.
Certificate checking occurs for SSL connections between View Connection Server and View Client.
Certificate verification includes all the following checks:
n
Has the certificate been revoked? Is it possible to determine whether the certificate has been revoked?
n
Is the certificate intended for a purpose other than verifying the identity of the sender and encrypting
server communications? That is, is it the correct type of certificate?
n
Has the certificate expired, or is it valid only in the future? That is, is the certificate valid according to
the computer clock?
n
Does the common name on the certificate match the host name of the server that sends it? A mismatch
can occur if a load balancer redirects the View client to a server with a certificate that does not match
the host name the user entered. A mismatch can also occur if the user enters an IP address rather than a
host name in the client.
n
Is the certificate signed by an unknown or untrusted certificate authority (CA)? Self-signed certificates
are one type of untrusted CA.
To pass this check, the certificate's chain of trust must be rooted in the local certificate store of the
device.
When you first set up a View environment, a default self-signed certificate is used. By default,Warn But
Allowis the certificate verification mode. In this mode, when either of the following server certificate issues
occurs, a warning is displayed, but the user can choose to continue on and ignore the warning:
n
A self-signed certificate is provided by the View server. In this case, it is acceptable if the certificate
name does not match the View Connection Server name provided by the user in View Client.
n
A verifiable certificate that was configured in your deployment has expired or is not yet valid.
You can change the default certificate verification mode. You can set the mode to No Security, so that no
certificate checking is done, or you can set the mode to Full Security, so that users are not allowed to
connect to the server if any one of the checks fails. You can also allow end users to set the mode for
themselves.
Use the Certificate verification mode group policy setting in the Client Configuration ADM template file
to change the verification mode. When this group policy setting is configured, the setting is locked in View
Client. Users can view the selected verification mode in View Client, but cannot configure the setting. When
this group policy setting is not configured or disabled, View Client users can select a verification mode.
ADM template files for View components are installed in the install_directory\VMware\VMware
View\Server\Extras\GroupPolicyFiles directory on your View Connection Server host. For information
about using these templates to control GPO settings, see the VMware Horizon View Administration document.
Configure the PCoIP Secure Gateway to Use a New SSL Certificate
To comply with industry or jurisdiction security regulations, you can replace the default SSL certificate that
is generated by the PCoIP Secure Gateway (PSG) service with a certificate that is signed by a CA.
In View 5.2 or later releases, the PSG service creates a default, self-signed SSL certificate when the service
starts up. The PSG service presents the self-signed certificate to clients running View Client 2.0 (or View
Client 5.2 for Windows) or later releases that connect to the PSG.
The PSG also provides a default legacy SSL certificate that is presented to clients running View Client 1.7 (or
View Client 5.1 for Windows) or earlier releases that connect to the PSG.
Chapter 7 Configuring SSL Certificates for View Servers
VMware, Inc. 83