5.0

Table Of Contents
Table 14-4. Using Secure, Tunneled Connection and SSL for Local Desktop Operations
Setting Description
Use secure tunnel connection for Local Mode operations Local desktops use tunneled communications. Network
traffic is routed through View Connection Server or a
security server if one is configured.
If you do not use this setting, data transfers take place directly
between local desktops and the corresponding remote
desktops in the datacenter.
The default is not to use secure tunnel connections.
Use SSL for Local Mode operations Communications and data transfers between client
computers and the datacenter use SSL encryption. These
operations include checking in and checking out desktops
and replicating data from client computers to the datacenter,
but do not include transfers of View Composer base images.
They involve connections between client computers and
View Transfer Server.
The default is not to use SSL.
Use SSL when provisioning desktops in Local Mode Transfers of View Composer base-image files from the
Transfer Server repository to client computers use SSL
encryption. These operations involve connections between
client computers and View Transfer Server.
The default is not to use SSL.
Change the Local Desktop Encryption Key Cipher for New Key Generation
By default, View Connection Server uses AES-128 to encrypt the virtual disk (.vmdk) file when users check in
and check out a local desktop. If you prefer stronger encryption, you can change the encryption key cipher to
AES-192 or AES-256 by editing a global property in View LDAP on your View Connection Server host.
After you change the encryption key cipher for local desktops, the new cipher is used for new key generation,
for example, when a local desktop is checked out for the first time. Previously generated keys are not changed.
To change the encryption key cipher for existing local desktops, see “Change the Encryption Key Cipher for
an Existing Local Desktop,” on page 264.
You use the ADSI Edit utility to modify View LDAP. The ADSI Edit utility is installed with View Connection
Server. When you change View LDAP on a View Connection Server instance, the change is propagated to all
replicated View Connection Server instances.
Prerequisites
See the Microsoft TechNet Web site for information on how to use the ADSI Edit utility on your Windows
operating system version.
Procedure
1 Start the ADSI Edit utility on your View Connection Server host.
2 Select or connect to DC=vdi, DC=vmware, DC=int.
3 On the object CN=Common, OU=Global, OU=Properties, set the pae-OVDIKeyCipher attribute to the
new encryption key cipher value.
You can set the encryption key cipher value to AES-128, AES-192 or AES-256. The default value is AES-128.
Chapter 14 Managing Local Desktops
VMware, Inc. 263