4.6

Table Of Contents
The View client sends the user certificate to the View Connection Server instance or security server, which
verifies the certificate by checking the certificate trust and validity period. Typically, users can successfully
authenticate if their user certificate is signed and valid. If certificate revocation checking is configured, users
who have revoked user certificates are prevented from authenticating.
Display protocol switching is not supported with smart card authentication. To change display protocols after
authenticating with a smart card, a user must log off and log in again.
Logging In to Local Desktops with Offline Smart Card Authentication
With offline smart card authentication, users can log in to a local desktop with a smart card when the desktop
is not connected to View Connection Server.
To use offline smart card authentication, users must use the same authentication method that they used to
authenticate to View Connection Server the last time they logged in. For example, if a user logged in with smart
card A, logged in again with password authentication, and then logged in a final time with smart card B, the
user must use smart card B to authenticate with offline smart card authentication.
The most recent value of the smart card removal policy is enforced during offline smart card authentication.
The smart card removal policy determines whether users must reauthenticate to gain access to their desktops
after removing their smart cards. If the policy is set to disconnect user sessions on smart card removal, when
users remove a smart card, the guest operating system in the View desktop is locked. The View Client window
remains open, and users can select Options > Send Ctrl-Alt-Delete to log in again. The smart card removal
policy is a View Connection Server setting.
Configure Smart Card Authentication
To configure smart card authentication, you must obtain a root certificate and add it to a server truststore file,
modify View Connection Server configuration properties, and configure smart card authentication settings.
Depending on your particular environment, you might need to perform additional steps.
Procedure
1 Obtain the Root Certificate from the CA on page 123
You must obtain the root certificate from the CA that signed the certificates on the smart cards presented
by your users.
2 Export a Root Certificate from a User Certificate on page 123
If you have a CA-signed user certificate or a smart card that contains one, you can export the root
certificate if it is trusted by your system.
3 Add the Root Certificate to a Server Truststore File on page 124
You must add the root certificate for all trusted users to a server truststore file so that View Connection
Server instances and security servers can authenticate smart card users and connect them to their View
desktops.
4 Modify View Connection Server Configuration Properties on page 124
To enable smart card authentication, you must modify View Connection Server configuration properties
on your View Connection Server or security server host.
5 Configure Smart Card Settings in View Administrator on page 125
You can use View Administrator to specify settings to accommodate different smart card authentication
scenarios.
VMware View Administration
122 VMware, Inc.