4.6
Table Of Contents
- VMware View Installation
- Contents
- VMware View Installation
- System Requirements for Server Components
- System Requirements for Client Components
- Supported Operating Systems for View Agent
- Supported Operating Systems for View Client and View Client with Local Mode
- Hardware Requirements for Local Mode Desktops
- Client Browser Requirements for View Portal
- Remote Display Protocol and Software Support
- Adobe Flash Requirements
- Smart Card Authentication Requirements
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- Configuring View Client Connections
- Sizing Windows Server Settings to Support Your Deployment
- Installing the View Connection Server Software
- Installing View Transfer Server
- Configuring Certificate Authentication
- Replacing the Default Certificate
- Add keytool and openssl to the System Path
- Use an Existing PKCS#12 Certificate and Private Key
- Convert a PKCS#12 Keystore to JKS Format
- Creating a New SSL Certificate
- Configure a View Connection Server Instance or Security Server to Use a New Certificate
- Configure a View Transfer Server Instance to Use a New Certificate
- Configure SSL for Client Connections
- Configure SSL for View Transfer Server Communications
- Using Group Policy to Configure Certificate Checking in View Client
- Creating an Event Database
- Installing and Starting View Client
- Install the Windows-Based View Client or View Client with Local Mode
- Start the Windows-Based View Client or View Client with Local Mode
- Install View Client by Using View Portal
- Install View Client on Mac OS X
- Start View Client on Mac OS X
- Set Printing Preferences for the Virtual Printer Feature on Windows Clients
- Using USB Printers
- Installing View Client Silently
- Index
Procedure
1 On the IIS application server host, click Start > Programs > Administrative Tools > Internet Information
Services (IIS) Manager.
The Internet Information Services (IIS) Manager appears.
2 To view the list of sites hosted by the server, expand the local computer entry and click Web Sites.
3 Right-click the Web site entry that contains the certificate you want to export and select Properties.
4 On the Directory Security tab, click Server Certificate.
5 When the Web Server Certificate wizard appears, click Next.
6 Select Export the current certificate to a .pfx file and click Next.
7 Specify a filename for the certificate file and click Next.
8 Type and confirm a password to be used to encrypt the information you want to export and click Next.
The system displays summary information about the certificate you are about export.
9 Verify the summary information and click Next > Finish.
10 If you want to use the certificate with a View Transfer Server instance, use openssl to export the private
key and server certificate in the required PEM format.
a Open a command prompt and use openssl to export the private key from your .p12 or .pfx certificate
file.
For example: openssl pkcs12 -in server.pfx -nocerts -out key.pem
b Remove the pass phrase from the private key and save it to the file server.key.
This step prevents Apache from prompting you for your pass phrase each time it is restarted.
For example: openssl rsa -in key.pem -out server.key
c Export the server certificate from your certificate file and save it to the file server.crt.
For example: openssl pkcs12 -in server.pfx -clcerts -nokeys -out server.crt
What to do next
Configure your View Connection Server instance, security server, or View Transfer Server instance to use the
certificate. See “Configure a View Connection Server Instance or Security Server to Use a New Certificate,” on
page 85 or “Configure a View Transfer Server Instance to Use a New Certificate,” on page 86.
Chapter 7 Configuring Certificate Authentication
VMware, Inc. 81