6.2
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Installing View in an IPv6 Environment
- Setting Up View in an IPv6 Environment
- Supported vSphere , Database, and Active Directory Versions in an IPv6 Environment
- Supported Operating Systems for View Servers in an IPv6 Environment
- Supported Windows Operating Systems for Desktops and RDS Hosts in an IPv6 Environment
- Supported Clients in an IPv6 Environment
- Supported Remoting Protocols in an IPv6 Environment
- Supported Authentication Types in an IPv6 Environment
- Other Supported Features in an IPv6 Environment
- Installing View in FIPS Mode
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Creating a User Account for a Standalone View Composer Server
- Create a User Account for View Composer AD Operations
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Disable Weak Ciphers in SSL/TLS for View Composer and View Agent Machines
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on View Connection Server and Security Server
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the Product License Key
- Add vCenter Server Instances to View
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Configure the PCoIP Secure Gateway and Secure Tunnel Connections
- Configure Secure HTML Access
- Configuring External URLs for Secure Gateway and Tunnel Connections
- Set the External URLs for a View Connection Server Instance
- Modify the External URLs for a Security Server
- Give Preference to DNS Names When View Connection Server Returns Address Information
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to View Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
- Index
The security server appears in the Security Servers pane in View Administrator.
The VMware Horizon View Connection Server (Blast-In) rule is enabled in the Windows Firewall on the
security server. This firewall rule allows Web browsers on client devices to use HTML Access to connect to
the security server on TCP port 8443.
NOTE If the installation is cancelled or aborted, you might have to remove IPsec rules for the security server
before you can begin the installation again. Take this step even if you already removed IPsec rules prior to
reinstalling or upgrading security server. For instructions on removing IPsec rules, see “Remove IPsec Rules
for the Security Server,” on page 69.
What to do next
Configure an SSL server certificate for the security server. See Chapter 8, “Configuring SSL Certificates for
View Servers,” on page 77.
You might have to configure client connection settings for the security server, and you can tune Windows
Server settings to support a large deployment. See “Configuring Horizon Client Connections,” on page 109
and “Sizing Windows Server Settings to Support Your Deployment,” on page 120.
Silent Installation Properties for a Security Server
You can include specific properties when you silently install a security server from the command line. You
must use a PROPERTY=value format so that Microsoft Windows Installer (MSI) can interpret the properties
and values.
Table 7‑3. MSI Properties for Silently Installing a Security Server
MSI Property Description Default Value
INSTALLDIR The path and folder in which the View Connection Server software is
installed.
For example: INSTALLDIR=""D:\abc\my folder""
The sets of two double quotes that enclose the path permit the MSI
installer to interpret the space as a valid part of the path.
This MSI property is optional.
%ProgramFiles
%\VMware\VMware
View\Server
VDM_SERVER_INSTANCE_
TYPE
The type of View server installation:
n
1. Standard installation
n
2. Replica installation
n
3. Security server installation
To install a security server, define VDM_SERVER_INSTANCE_TYPE=3
This MSI property is required when installing a security server.
1
VDM_SERVER_NAME The host name or IP address of the existing View Connection Server
instance to pair with the security server.
For example: VDM_SERVER_NAME=cs1.internaldomain.com
This MSI property is required.
None
VDM_SERVER_SS_EXTURL The external URL of the security server. The URL must contain the
protocol, externally resolvable security server name, and port number
For example:
VDM_SERVER_SS_EXTURL=https://view.companydomain.com:443
This MSI property is required.
None
VDM_SERVER_SS_PWD The security server pairing password.
For example: VDM_SERVER_SS_PWD=secret
This MSI property is required.
None
Chapter 7 Installing View Connection Server
VMware, Inc. 67