5.2
Table Of Contents
- VMware Horizon View Installation
- Contents
- VMware Horizon View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Installing View Transfer Server
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure View Clients to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configuring Certificate Checking in View Client for Windows
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- View Transfer Server and SSL Certificates
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the View Connection Server License Key
- Add vCenter Server Instances to View Manager
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support View Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring View Client Connections
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Replace the Default Ports for View Transfer Server
- Sizing Windows Server Settings to Support Your Deployment
- Configuring User Accounts for vCenter Server and View Composer
- Adding the View Desktops Plug-in to the vSphere Web Client
- Configuring Event Reporting
- Index
3 Verify that the new certificate contains a private key by taking one of these steps:
n
Verify that a yellow key appears on the certificate icon.
n
Double-click the certificate and verify that the following statement appears in the Certificate
Information dialog box: You have a private key that corresponds to this certificate..
4 Right-click the new certificate and click Properties.
5 On the General tab, delete the Friendly name text and type the Friendly name that you have chosen.
Make sure that you enter exactly the same name in the SSLCertWinCertFriendlyName setting in the
Windows registry, as described in the next procedure.
6 Click Apply and click OK.
The PSG presents the CA-signed certificate to View Client devices that connect to the View server over
PCoIP.
NOTE This procedure does not affect legacy View Client devices. The PSG continues to present the default
legacy certificate to legacy View Client devices that connect the this View server over PCoIP.
What to do next
Configure the certificate Friendly name in the Windows registry.
Set the PSG Certificate Friendly Name in the Windows Registry
The PSG identifies the SSL certificate to use by means of the server name and certificate Friendly name. You
must set the Friendly name value in the Windows registry on the View Connection Server or security server
computer on which the PSG is running.
The certificate Friendly name vdm is used by all View Connection Server instances and security servers. By
contrast, you can configure your own certificate Friendly name for the PSG certificate. You must configure a
Windows registry setting to enable the PSG to match the correct name with the Friendly name that you will
set in the Windows certificate store.
The PSG can use the same SSL certificate as the View server on which the PSG is running. If you configure
the PSG to use the same certificate as the View server, the Friendly name must be vdm.
The Friendly name value, in both the registry and the Windows certificate store, is case sensitive.
Prerequisites
n
Verify that the Window registry contains the correct subject name that is used to reach the PSG port and
that matches the PSG certificate subject name or subject alternate name. See “Verify That the Server
Name Matches the PSG Certificate Subject Name,” on page 84.
n
Verify that the certificate Friendly name is configured in the Windows local computer certificate store.
See “Configure a PSG Certificate in the Windows Certificate Store,” on page 85.
Procedure
1 Start the Windows Registry Editor on the View Connection Server or security server computer where
the PCoIP Secure Gateway is running.
2 Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Teradici\SecurityGateway registry key.
3 Add a new String (REG_SZ) value, SSLCertWinCertFriendlyName, to this registry key.
VMware Horizon View Installation
86 VMware, Inc.