Architecture Planning
Table Of Contents
- View Architecture Planning
- Contents
- View Architecture Planning
- Introduction to View
- Planning a Rich User Experience
- Feature Support Matrix for View Agent
- Choosing a Display Protocol
- Using Hosted Applications
- Using View Persona Management to Retain User Data and Settings
- Using USB Devices with Remote Desktops and Applications
- Using the Real-Time Audio-Video Feature for Webcams and Microphones
- Using 3D Graphics Applications
- Streaming Multimedia to a Remote Desktop
- Printing from a Remote Desktop
- Using Single Sign-On for Logging In to a Remote Desktop
- Using Multiple Monitors
- Managing Desktop and Application Pools from a Central Location
- Architecture Design Elements and Planning Guidelines for Remote Desktop Deployments
- Virtual Machine Requirements for Remote Desktops
- View ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- RDS Host Virtual Machine Configuration
- vCenter Server and View Composer Virtual Machine Configuration
- View Connection Server Maximums and Virtual Machine Configuration
- vSphere Clusters
- Storage and Bandwidth Requirements
- View Building Blocks
- View Pods
- Advantages of Using Multiple vCenter Servers in a Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting Remote Desktop Access
- Using Group Policy Settings to Secure Remote Desktops and Applications
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding View Communications Protocols
- Overview of Steps to Setting Up a View Environment
- Index
Planning for Security Features 5
View offers strong network security to protect sensitive corporate data. For added security, you can
integrate View with certain third-party user-authentication solutions, use a security server, and implement
the restricted entitlements feature.
This chapter includes the following topics:
n
“Understanding Client Connections,” on page 69
n
“Choosing a User Authentication Method,” on page 71
n
“Restricting Remote Desktop Access,” on page 74
n
“Using Group Policy Settings to Secure Remote Desktops and Applications,” on page 75
n
“Implementing Best Practices to Secure Client Systems,” on page 75
n
“Assigning Administrator Roles,” on page 75
n
“Preparing to Use a Security Server,” on page 76
n
“Understanding View Communications Protocols,” on page 81
Understanding Client Connections
Horizon Client and View Administrator communicate with a View Connection Server host over secure
HTTPS connections. Information about the server certificate on View Connection Server is communicated to
the client as part of the SSL handshake between client and server.
The initial Horizon Client connection, which is used for user authentication and remote desktop and
application selection, is created when a user opens Horizon Client and provides a fully qualified domain
name for the View Connection Server or security server host. The View Administrator connection is created
when an administrator types the View Administrator URL into a Web browser.
A default SSL server certificate is generated during View Connection Server installation. By default, SSL
clients are presented with this certificate when they visit a secure page such as View Administrator.
You can use the default certificate for testing, but you should replace it with your own certificate as soon as
possible. The default certificate is not signed by a commercial Certificate Authority (CA). Use of noncertified
certificates can allow untrusted parties to intercept traffic by masquerading as your server.
n
Client Connections Using the PCoIP Secure Gateway on page 70
When clients connect to a remote desktop or application with the PCoIP display protocol from
VMware, Horizon Client can make a second connection to the PCoIP Secure Gateway component on a
View Connection Server instance or a security server. This connection provides the required level of
security and connectivity when accessing remote desktops and applications from the Internet.
VMware, Inc.
69