Securing VMware View Communication Channels with SSL Certificates TECHNICAL WHITE PAPER
|
|
|
- Clemence Wilkinson
- 10 years ago
- Views:
Transcription
1 Securing VMware View Communication Channels with SSL Certificates TECHNICAL WHITE PAPER
2 Table of Contents About VMware View Changes in VMware View SSL Authentication Mechanism X.509 Certificate Validation Flow X.509 Certificate Configuration on Different Components and Integration with VMware View X.509 Certificate, Issued by Trusted Certification Authority, Configuration on Secure Gateway Components....6 X.509 Certificate, Issued by Trusted Certification Authority, Configuration on View Composer X.509 Certificate, Issued by Trusted Certification Authority, Configuration on vcenter Server Revocation Checking Other Revocation Check Settings Certificate Types and Their Use in VMware View Events and Logs to Troubleshoot Common Misconfigurations Self-Signed Certificate Configured on a Connection Server / Security Server Trusted CA-Signed Certificate Configured on a Connection Server / Security Server... 9 Trusted CA-Signed Certificate Configured on a Connection Server / Security Server Expires Trusted CA-Signed Certificate Configured on a Connection Server / Security Server About to Expire Trusted CA-Signed Certificate Configured on a Connection Server / Security Server Revoked About the Authors Acknowledgements TECHNICAL WHITE PAPER / 2
3 About VMware View VMware View is a best-in-class enterprise desktop virtualization platform. The VMware View solution separates the personal desktop environment from the physical system by moving desktops to a datacenter, from which the users can access the desktops using a client-server computing model. VMware View incorporates a rich set of features required for any enterprise deployment by providing a robust platform for hosting virtual desktops from VMware vsphere. Additional capabilities such as distributed infrastructure services and virtual desktop failover and recovery make it an ideal solution for desktop virtualization. VMware View consists of various components such as Connection Server, Security Server, View Composer, and vcenter Server. Communication between each of these components is established in a secure manner. The communication channel is secured using a Secure Socket Layer (SSL) encryption mechanism. This paper provides a technical overview of these features, in addition to the specific configurations required in an ideal implementation. Overall, this paper covers: A brief discussion of SSL authentication X.509 certificate validation flow on Secure Gateway components X.509 certificate configuration in different View components and SSL integration with VMware View Basic troubleshooting Changes in VMware View 5.1 VMware View 5.1 has many new features and enhancements. This paper focuses on enhancements to HTTP communication between different View components. In VMware View 5.0, VMware supported JKS and PKCS12 file-based certificate stores for configuring certificates on View components. From View 5.1 onward, VMware View instead uses the Windows Certificate Store. This change allows better integration with mainstream certificate management processes. When upgrading to View 5.1, existing JKS and PKCS12 certificate stores are automatically migrated to the Windows Certificate Store. Refer to the VMware View 5.1 Readme documentation for detailed information. The use of SSL is now mandated for HTTP communication between View components. Although a trust-onfirst-use mechanism is included, it is a best practice to place valid certificates signed by a trusted Certificate Authority (CA) on all View components. In View 5.1, the View Administrator dashboard shows the certificate s present health status in the appropriate components. Figure 1 depicts the use of Secure SSL Communication between different VMware View components. In the case of vcenter Server and View Composer, Administrators are given the option to accept the existing selfsigned or invalid certificates after verifying the identity of the certificate from the View Administrator UI. View Client View Security Server View Connection Server vcenter Server View Composer Server Figure 1: Channels Protected by SSL in VMware View TECHNICAL WHITE PAPER / 3
4 SSL Authentication Mechanism SSL authentication is primarily based on the Transport Layer Security (TLS) protocol. The main goal of TLS is to provide privacy and data integrity between two communicating applications. The TLS Handshake Protocol authenticates the server with the client and, optionally, the client with the server. TLS also negotiates an encryption algorithm and cryptographic keys before the application protocol (server and client) transmits or receives its first byte of data. The Handshake Protocol creates a secure channel by: Authenticating peers (client or server) using asymmetric (public-private) keys Agreeing upon cryptographic protocols to be used, such as 3DES, RSA Negotiating a shared secret Once the handshake is completed between peers, the peers start to communicate in a secured fashion using the negotiated encryption algorithm and cryptographic keys, which negate any eavesdropping and man-in-themiddle attacks. Detailed information about the SSL Authentication Mechanism can be found in The TLS Protocol: Version 1.0 and The Transport Layer Security (TLS) Protocol: Version 1.2. X.509 Certificate Validation Flow This section describes the validation flow of x.509 certificates, the standard form of public key certificates. These are configured on the Connection Server, Security Server, View Composer and vcenter Server. The certificate health of each of these components is displayed in the View Administrator dashboard, as shown in Figure 2. Figure 2: View Administrator Showing the Certificate Health of a Secure Gateway Component A default certificate is generated for each of these components. It is a best practice to replace these certificates with certificates issued by a trusted CA. Configuring certificates in each of these components is discussed later in the X.509 Certificate Configuration section. TECHNICAL WHITE PAPER / 4
5 YES Is Certificate Issued by a Trusted CA YES Is Certificate Expired/Not Yet Valid NO Is Certificate Revoked NO Certificate Accepted Start Is Connection URL=CN in Certificate YES NO YES Accept Certificate Validation Complete Stop NO Prompt User to Accept/Reject Certificate Not Accepted Reject Figure 3: Flow of Certificate Validation in VMware View Components Each Connection Server validates the certificate of the other components connected to it. The flow chart in Figure 3 depicts the flow of certificate validation in VMware View. The validation consists of the following checks: Hostname match The Connection Server checks that the server name portion of the connection URL (in the case of a Security Server, the configured External URL) matches one of the subject names in the presented certificate. If there is a mismatch, the status of the appropriate component displays as Server s Certificate does not match the URL in the View Administrator dashboard. Certificate issuer s verification The Connection Server verifies the authenticity of the certificate issuer and verifies that the issuer s certificate is trusted. Certificate Expired/Not Yet Valid The validity of the certificate in the certificate chain is checked by verifying if the current date and time fall within the validity period of the issued certificate. If they do not, an appropriate status for the component either Certificate Expired or Certificate Not Yet Valid is shown in the View Administrator Dashboard. Certificate revocation checking VMware View supports Revocation Checking, a technique to ensure that the certificate issuer has not withdrawn the certificate for some reason. View performs revocation checking using both CRLs (Certificate Revocation Lists) and OCSPs (Online Certificate Status Protocols). The CRL distribution point / OCSP responder address specified in the certificate is used for revocation checking. If the certificate is found to be revoked or if the Certificate Distribution Point (CDP) is not accessible, the status of the appropriate component in View Administrator displays as Revocation status cannot be checked. Note: The revocation check happens for the whole chain except the root. This means that all the certificates present in the chain up to the root certificate are checked for revocation. The root certificate is excluded because active management of the root certificate store should ensure that only current, unrevoked certificates will be trusted. If you do not feel confident that the root certificate store is fully up to date, it is advisable to extend the scope of revocation checking to include root certificates. If any of the certificates fails the revocation check, the status of the appropriate component in the View Administrator displays as Server Certificate has been revoked. TECHNICAL WHITE PAPER / 5
6 X.509 Certificate Configuration on Different Components and Integration with VMware View X.509 Certificate, Issued by Trusted Certification Authority, Configuration on Secure Gateway Components During installation of the VMware View Connection Server and Security Server, a default certificate is generated and configured. It is recommended that you replace this default certificate with a certificate issued by a trusted Certificate Authority (CA). The complete procedure for configuring x.509 certificates on Secure Gateway components is specified in the Configuring SSL Certificates for View Servers section of the VMware View 5.1 Installation guide. Note: In cases where the Secure Gateway components are being upgraded and the previous version was configured with valid certificates signed by a trusted CA, those certificates will be automatically migrated to the Windows Certificate Store at the time of installation. X.509 Certificate, Issued by Trusted Certification Authority, Configuration on View Composer During installation of VMware View Composer, a default certificate is generated and configured. It is recommended that you replace this default certificate with a certificate issued by a trusted Certificate Authority (CA). Note: If you already have a certificate issued by a trusted CA, you can point the Composer installer to the certificate at the time of installation. Detailed steps for configuring an x.509 certificate on View Composer are specified in the Install the View Composer Service section of the VMware View 5.1 Installation guide. If the composer needs to be configured with certificates after installation, please follow the steps specified in the Configuring an SSL Certificate for View Composer section of the VMware View 5.1 Installation guide. X.509 Certificate, Issued by Trusted Certification Authority, Configuration on vcenter Server During installation of VMware vcenter Server, a default certificate is generated and configured. It is recommended that you replace this default certificate with a certificate issued by a trusted Certificate Authority (CA). For the complete procedure for replacing default certificates with valid certificates signed by a trusted CA, refer to the vcenter Server documentation. TECHNICAL WHITE PAPER / 6
7 Revocation Checking VMware View 5.1 supports revocation checking of SSL certificates. This can be configured in the registry or by setting GPO policy. To configure revocation check types, edit the following registry settings or set a GPO policy on the Connection Servers: Add a string type registry key CertificateRevocationCheckType to Software\Policies\VMware, inc.\vmware VDM\Security. The following revocation check types are supported by VMware View 5.1. None Set CertificateRevocationCheckType = 1. No revocation checking is done if this option is set. EndCertificateOnly Set CertificateRevocationCheckType = 2. Revocation checking is done only for the end certificate in the chain. WholeChain Set CertificateRevocationCheckType = 3. A complete path is built for the certificate, and a revocation check is done for all certificates in the path. WholeChainButRoot Set CertificateRevocationCheckType = 4. A complete path is built for the certificate, and a revocation check is done for all certificates in the path except for the Root CA certificate (default value). Note: As per RFC 4158, the options EndCertificateOnly = 2, WholeChain = 3, and WholeChainButRoot = 4 yield the same revocation check results. Other Revocation Check Settings Additional revocation check setting supported by VMware View 5.1 include: Software\Policies\VMware, inc.\vmware VDM\Security\ CertificateRevocationCheckCacheOnly. False (default) Disable caching revocation responses. True Enable caching revocation responses. Software\Policies\VMware, inc.\vmware VDM\Security\ CertificateRevocationCheckTimeOut. Cumulative timeout across all revocation check intervals in milliseconds. If not set, default is set to 0, which means Microsoft defaults are used. Please visit Microsoft-TechNet for detailed information on Certificate Status Checking. TECHNICAL WHITE PAPER / 7
8 Certificate Types and Their Use in VMware View View supports different types of certificates to fulfill the various deployment scenarios at customer sites. The certificates can be classified into single-server name certificates and multiple-server name certificates. A single-server name certificate contains a single URL that identifies the server for which the certificate is issued. This type of certificate is used when a connection broker is accessed only from within the internal network or only from the external network, i.e., the server has a single Fully Qualified Domain Name. Multiple-server name certificates are used in environments where the View Connection Server is accessed from both internal and external networks. Such configuration requires a connection server to have multiple Fully Qualified Domain Names, e.g., one for the internal network and one for the external network. Multiple-server name certificates support more than one SAN (Subject Alternative Name) per single certificate. This type of certificate is also used if SSL offloaders are placed between View clients and the connection server, and when a tunneled connection with the Security server is enabled. A wildcard certificate is a certificate issued to all the servers in an organization s domain. The Fully Qualified Domain Name in a wildcard certificate would typically follow the format *.organization.com. A wildcard certificate is less secure than a SAN certificate since, if one server or subdomain is compromised, the entire environment is exposed. Events and Logs to Troubleshoot This section discusses the View Connection Server logs and events you can examine for troubleshooting. The section also covers scenarios where corrupted certificates have been configured, certificates are missing Friendly Name, and where the private key of the certificate is not marked as Exportable. Note: View Connection server logs can be found under <DriveLetter>:ProgramData\Application Data\VMware\VDM\logs. Common Misconfigurations The following log lines indicate that the private key is not marked as Exportable. KeyVault CryptExportKey get size FAILED, error=<error code in Hex> (Key not valid for use in specified state.) The following log lines could indicate that the External URL does not match the Common Name of the certificate. Server s certificate does not match the URL If the server name part of a secure gateway s External URL does not match any of the subject names in the certificate, then the Certificate Health is reported as invalid. The Log line ATTR_SG_URL, type : STRING, stringvalue : defines the Secure Gateway External URL. TECHNICAL WHITE PAPER / 8
9 Self-Signed Certificate Configured on a Connection Server / Security Server The log line ATTR_SG_CERTDEFAULT, type : STRING, stringvalue : true indicates that this secure gateway instance is configured with a self-signed certificate. The logs also contain the following lines ATTR_SG_CERTVALID, type : STRING, stringvalue : false and ATTR_SG_ CERTINVALID_REASON, type : STRING, stringvalue : NOT_TRUSTED, which indicate that the certificate is not valid, and that the certificate cannot be trusted because it is not issued by a trusted CA. In addition, the event Certificate is invalid for Secure Gateway at address <NetBIOS name> is raised in View Administrator as a warning for View administrators. Trusted CA-Signed Certificate Configured on a Connection Server / Security Server The log line ATTR_SG_CERTDEFAULT, type : STRING, stringvalue : false indicates that this secure gateway instance is not configured with a self-signed certificate. The logs also contain the line ATTR_SG_CERTVALID, type : STRING, stringvalue : true, meaning that the configured certificate is valid. Trusted CA-Signed Certificate Configured on a Connection Server / Security Server Expires The log line ATTR_SG_CERTVALID, type : STRING, stringvalue : false indicates that that the configured certificate is invalid. The log line ATTR_SG_CERTINVALID_REASON, type : STRING, stringvalue : EXPIRED indicates the reason for invalidating the configured certificate. In this case, it states that the certificate has expired. In addition, the event Certificate is invalid for Secure Gateway at address <NetBIOS name> is raised in View Administrator as a warning for View administrators. Trusted CA-Signed Certificate Configured on a Connection Server / Security Server About to Expire The only difference from the above section is that the log line ATTR_SG_CERTABOUTTOEXPIRE, type : STRING, stringvalue : true indicates that the configured certificate is about to expire. All other log lines in this case are similar to the scenario where the configured certificate is valid. VMware View Administrator also raises an event warning that the configured certificate will expire within <Configured Number of Days>. Trusted CA-Signed Certificate Configured on a Connection Server / Security Server Revoked The log line ATTR_SG_CERTVALID, type : STRING, stringvalue : false indicates that that the configured certificate is invalid. The log line ATTR_SG_CERTINVALID_REASON, type : STRING, stringvalue : REVOKED indicates the reason for invalidating the configured certificate. In this case, it states that the certificate has been revoked. In addition, the event Certificate is invalid for Secure Gateway at address <NetBIOS name> is raised in View Administrator as a warning for View administrators. TECHNICAL WHITE PAPER / 9
10 About the Authors Suhas Hariharan is a member of the Technical Staff at VMware. Currently, he is part of the View-Management Quality Engineering team in Bangalore. He has a Master of Technology in Computer Science and Engineering from Manipal University. Noble Peter is a member of Technical Staff at VMware. Currently, he is part of the View-Management Quality Engineering team in Bangalore. He has an MSc in Digital Design and Embedded Systems from Manipal University. Acknowledgements Many thanks to Paul Green, Senior Member of Technical Staff (View Development Team) and Fred Schimscheimer, Senior Technical Marketing Engineering Manager, for their thorough technical review of this white paper. VMware, Inc Hillview Avenue Palo Alto CA USA Tel Fax Copyright 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-WP-SSLCERT-USLET WEB
Certificate Revocation Checking Using OCSP and CRL in VMware View 4.5/4.6 TECHNICAL WHITE PAPER
Certificate Revocation Checking Using OCSP and CRL in VMware View 4.5/4.6 TECHNICAL WHITE PAPER Table of Contents Introduction... 3 About VMware View.... 3 About Smart Card Certificate Authentication....
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
Obtaining SSL Certificates for VMware View Servers
Obtaining SSL Certificates for VMware View Servers View 5.1 View Composer 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Obtaining SSL Certificates for VMware Horizon View Servers
Obtaining SSL Certificates for VMware Horizon View Servers View 5.2 View Composer 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER Contents Introduction... 2 Surface Area... 3 SSL Configuration... 5 Authentication... 6 Adapter... 6 Broker Agent...
Scenarios for Setting Up SSL Certificates for View
Scenarios for Setting Up SSL Certificates for View VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Director and Certificate Authority Issuance
VMware vcloud Director and Certificate Authority Issuance Leveraging QuoVadis Certificate Authority with VMware vcloud Director TECHNICAL WHITE PAPER OCTOBER 2012 Table of Contents Introduction.... 3 Process
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0
Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed
SSL Certificate Verification
SSL Certificate Verification Websense Content Gateway v7.8.x Websense Content Gateway SSL Certificate Verification October, 2013 R221013781 Copyright 1996-2013 Yahoo, Inc., and Websense, Inc. All rights
VMware vrealize Operations for Horizon Security
VMware vrealize Operations for Horizon Security vrealize Operations for Horizon 6.2 This document supports the version of each product listed and supports all subsequent versions until the document is
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
VMware vrealize Operations for Horizon Security
VMware vrealize Operations for Horizon Security vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
ThinPrint GPO Configuration for Location-Based Printing
ThinPrint GPO Configuration for Location-Based Printing I N F O R M AT I O N G U I D E Table of Contents Summary................................................................... 3 Environment................................................................
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
vrealize Automation Load Balancing
vrealize Automation Load Balancing Configuration Guide Version 6.2 T E C H N I C A L W H I T E P A P E R A U G U S T 2 0 1 5 V E R S I O N 1. 0 Table of Contents Introduction... 4 Load Balancing Concepts...
Upgrading Horizon Workspace
Horizon Workspace 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
SSL Certificates and Bomgar
SSL Certificates and Bomgar 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 FTPS Certificates Configuration Table of contents Overview... 2 Server certificate... 2 Configuring a server certificate on an IIS FTPS server... 2 Creating
SSL Manager Certificate Verification Engine
SSL Manager Certificate Verification Engine Websense Content Gateway v7. 6.2 Websense Content Gateway SSL Manager Certificate Verification Engine February, 2012 R033011760 Copyright 1996-2012 Yahoo, Inc.,
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Monitoring Hybrid Cloud Applications in VMware vcloud Air
Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER
Managing Multi-Hypervisor Environments with vcenter Server
Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent
Displaying SSL Certificate and Key Pair Information
CHAPTER6 Displaying SSL Certificate and Key Pair Information This chapter describes how to use the available show commands to display SSL-related information, such as the certificate and key pair files
Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER
Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
End Your Data Center Logging Chaos with VMware vcenter Log Insight
End Your Data Center Logging Chaos with VMware vcenter Log Insight By David Davis, vexpert WHITE PAPER Table of Contents Deploying vcenter Log Insight... 4 vcenter Log Insight Usage Model.... 5 How vcenter
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
What s New in VMware Data Recovery 2.0 TECHNICAL MARKETING DOCUMENTATION
What s New in VMware Data Recovery 2.0 TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated May 2011 Table of Contents Introduction.... 3 Technology Changes And New Features.... 3 Email Reports.... 3 Destination
vcenter Operations Manager for Horizon Supplement
vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon 1.6 This document supports the version of each product listed and supports all subsequent versions until the document
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
CTERA Portal Datacenter Edition
Installing a Security Certificate on the CTERA Portal CTERA Portal Datacenter Edition Aug 2013 Versions 3.2, 4.0 2013, CTERA Networks. All rights reserved. 1 Introduction Certificates are used as part
Two Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
vcenter Support Assistant User's Guide
vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
TS Gateway Step-By-Step Guide
TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft
Secure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
Reconfiguration of VMware vcenter Update Manager
Reconfiguration of VMware vcenter Update Manager Update 1 vcenter Update Manager 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
Enterprise Desktop Solutions: VMware View 4.5
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
Email Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
Configuring TLS Security for Cloudera Manager
Configuring TLS Security for Cloudera Manager Cloudera, Inc. 220 Portage Avenue Palo Alto, CA 94306 [email protected] US: 1-888-789-1488 Intl: 1-650-362-0488 www.cloudera.com Notice 2010-2012 Cloudera,
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE
Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View Mobile Secure Desktop solution is a powerful architecture intended
Configuring Multiple ACE Management Servers VMware ACE 2.0
Technical Note Configuring Multiple ACE Management Servers VMware ACE 2.0 This technical note describes how to configure multiple VMware ACE Management Servers to work together. VMware recommends this
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Deployment and Configuration Guide
vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Junio 2015. SSL WebLogic Oracle. Guía de Instalación. Junio, 2015. SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19
SSL WebLogic Oracle Guía de Instalación Junio, 2015 Página 1 de 19 Setting Up SSL on Oracle WebLogic Server This section describes how to configure SSL on Oracle WebLogic Server for PeopleTools 8.50. 1.
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
What s New in VMware vsphere 5.5 Networking
VMware vsphere 5.5 TECHNICAL MARKETING DOCUMENTATION Table of Contents Introduction.................................................................. 3 VMware vsphere Distributed Switch Enhancements..............................
ISY994 Series Network Security Configuration Guide Requires firmware version 3.3.1+ Requires Java 1.7+
ISY994 Series Network Security Configuration Guide Requires firmware version 3.3.1+ Requires Java 1.7+ Introduction Universal Devices, Inc. takes ISY security extremely seriously. As such, all ISY994 Series
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Using the vcenter Orchestrator Plug-In for vsphere Auto Deploy 1.0
Using the vcenter Orchestrator Plug-In for vsphere Auto Deploy 1.0 vcenter Orchestrator 4.2 This document supports the version of each product listed and supports all subsequent versions until the document
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
AlwaysOn Desktop Implementation with Pivot3 HOW-TO GUIDE
Implementation with Pivot3 HOW-TO GUIDE Solution Overview Highly available servers and storage are critical components of the architecture and must be designed into the VDI clusters at each site. Desktop
