VMware VIEW COMPOSER 2.5 - ARCHITECTURE PLANNING EN-000350-01 Specifications Page 52

  • Download
  • Add to my manuals
  • Print
  • Page
    / 72
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 51
Administrators can use the vdmadmin command-line interface to configure domain filtering, which limits the
domains that a View Connection Server instance searches and that it displays to users. See the VMware View
Administrator's Guide for more information.
Policies, such as restricting permitted hours to log in and setting the expiration date for passwords, are also
handled through existing Active Directory operational procedures.
RSA SecurID Authentication
RSA SecurID provides enhanced security with two-factor authentication, which requires knowledge of the
user's PIN and token code. The token code is only available on the physical SecurID token.
Administrators can enable individual View Connection Server instances for RSA SecurID authentication by
installing the RSA SecurID software on the View Connection Server host and modifying View Connection
Server settings.
When users log in through a View Connection Server instance that is enabled for RSA SecurID authentication,
they are first required to authenticate with their RSA user name and passcode. If they are not authenticated at
this level, access is denied. If they are correctly authenticated with RSA SecurID, they continue as normal and
are then required to enter their Active Directory credentials.
If you have multiple View Connection Server instances, you can configure RSA SecurID authentication on
some instances and a different user authentication method on others. For example, you can configure RSA
SecurID authentication only for users who access View desktops remotely over the Internet.
VMware View is certified through the RSA SecurID Ready program and supports the full range of SecurID
capabilities, including New PIN Mode, Next Token Code Mode, RSA Authentication Manager, and load
balancing.
Smart Card Authentication
A smart card is a small plastic card that is embedded with a computer chip. Many government agencies and
large enterprises use smart cards to authenticate users who access their computer networks. A smart card is
also referred to as a Common Access Card (CAC).
Smart card authentication is supported by the Windows-based View Client and View Client with Local Mode
only. It is not supported by View Administrator.
Administrators can enable individual View Connection Server instances for smart card authentication.
Enabling a View Connection Server instance to use smart card authentication typically involves adding your
root certificate to a truststore file and then modifying View Connection Server settings.
Client connections that use smart card authentication must be SSL enabled. Administrators can enable SSL for
client connections by setting a global parameter in View Administrator.
To use smart cards, client machines must have smart card middleware and a smart card reader. To install
certificates on smart cards, you must set up a computer to act as an enrollment station.
To use smart cards with local desktops, you must select a 1024-bit or 2048-bit key size during smart card
enrollment. Certificates with 512-bit keys are not supported for local desktops. By default, View Connection
Server uses AES-128 to encrypt the virtual disk file when users check in and check out a local desktop. You
can change the encryption key cipher to AES-192 or AES-256.
VMware View Architecture Planning Guide
52 VMware, Inc.
Page view 51
1 2 ... 47 48 49 50 51 52 53 54 55 56 57 ... 71 72

Comments to this Manuals

No comments