5.0

Table Of Contents
5 Expand the Computer Configuration section and open Windows Settings\Security Settings\Public
Key.
6 Right-click Intermediate Certification Authorities and select Import.
7 Follow the prompts in the wizard to import the intermediate certificate (for example,
intermediateCA.cer) and click OK.
8 Close the Group Policy window.
All of the systems in the domain now have a copy of the intermediate certificate in their intermediate
certification authority store.
Verify Your Smart Card Authentication Configuration
After you set up smart card authentication for the first time, or when smart card authentication is not working
correctly, you should verify your smart card authentication configuration.
Procedure
n
Verify that each client system has View Client, smart card middleware, a smart card with a valid certificate,
and a smart card reader.
See the documentation provided by your smart card vendor for information on configuring smart card
software and hardware.
n
On each client system, select Start > Settings > Control Panel > Internet Options > Content >
Certificates > Personal to verify that certificates are available for smart card authentication.
When a user inserts a smart card into the smart card reader, Windows copies certificates from the smart
card to the user's computer so that View Client can use them.
n
In the locked.properties file on the View Connection Server or security server host, verify that the
useCertAuth property is set to true and is spelled correctly.
The locked.properties file is located in
install_directory
\VMware\VMware
View\Server\sslgateway\conf. The useCertAuth property is commonly misspelled as userCertAuth.
n
If you configured smart card authentication on a View Connection Server instance, check the smart card
authentication setting in View Administrator.
a Select View Configuration > Servers, select the View Connection Server instance, and click Edit.
b On the Authentication tab, verify that Smart card authentication is set to either Optional or
Required.
You must restart the View Connection Server service for changes to smart card settings to take effect.
n
If the domain a smart card user resides in is different from the domain your root certificate was issued
from, verify that the user’s UPN is set to the SAN contained in the root certificate of the trusted CA.
a Find the SAN contained in the root certificate of the trusted CA by viewing the certificate properties.
b On your Active Directory server, select Start > Administrative Tools > Active Directory Users and
Computers.
c Right-click the user in the Users folder and select Properties.
The UPN appears in the User logon name text boxes on the Account tab.
n
If smart card users use the PCoIP display protocol to connect to View desktops, verify that the View Agent
PCoIP Smartcard subfeature is installed on desktop sources. The PCoIP Smartcard subfeature lets users
authenticate with smart cards when they use the PCoIP display protocol.
NOTE The PCoIP Smartcard subfeature is not supported on Windows Vista.
Chapter 7 Setting Up User Authentication
VMware, Inc. 129