Installing and Configuring Horizon Workspace
|
|
|
- Aubrey Baker
- 9 years ago
- Views:
Transcription
1 Installing and Configuring Horizon Workspace Horizon Workspace 1.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see EN
2 Installing and Configuring Horizon Workspace You can find the most up-to-date technical documentation on the VMware Web site at: The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: Copyright 2014 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc Hillview Ave. Palo Alto, CA VMware, Inc.
3 Contents 1 About Installing and Configuring VMware Horizon Workspace 5 2 Installing Horizon Workspace 7 Horizon Workspace User Authentication 9 System and Network Configuration Requirements 9 Preparing to Deploy Horizon Workspace 14 Download Horizon Workspace 14 Creating DNS Records and IP Addresses with Reverse Lookup 14 Deployment Checklists 15 Configure Basic Horizon Workspace Settings 18 Configure an SMTP Server to Work with Horizon Workspace 19 Setting for vcenter Server Quiesce Timeout Is Too Low 20 Delete Unused Extensions from vcenter 20 Deploying Horizon Workspace 20 Install the OVA File in the vsphere Client 21 Set Up Horizon Workspace 22 Adding Workspace Desktop Clients 31 Change the Password to the Generated Keystore File 32 3 Configuration for Horizon Workspace Virtual Machines 35 Create a datava-template Virtual Machine Manually 36 Adding Storage to the Horizon Files Virtual Appliance 37 Add VMDKs for Storage 37 Add Network Attached Storage for Storage 38 Managing Storage Volumes 39 Configuring Horizon Files Preview 39 Install LibreOffice Preview 39 Install Microsoft Windows Preview 40 Configuring Horizon Workspace in an Active Directory Forest 42 Configuring Horizon Workspace in a Multi-forest Active Directory Environment 42 Configuring a Multidomain Active Directory Single Forest 44 Customizing the Demo User Store 45 Add a User to the Demo User Store 46 Add Groups and Assign Users to Groups in the Demo User Store 48 Integrating VMware ThinApp Packages 49 Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository 50 Create a Network Share for ThinApp Packages That Horizon Workspace Manages 54 Configuring Horizon Workspace Access to ThinApp Packages 54 Change the ThinApp Packages Share Folder 57 Integrating Horizon Workspace with Citrix-based Applications 57 Preparing and Installing Integration Broker 60 VMware, Inc. 3
4 Installing and Configuring Horizon Workspace Deploying Integration Broker 62 Enabling Citrix PowerShell Remoting on Citrix Server Farm 65 Synchronizing Horizon Workspace Connector with Integration Broker 66 Integrating VMware View 68 Join an Active Directory Domain 68 Sync View Pools 70 Configure SAML Authentication 70 Set Proxy Server Settings for Manager 73 4 Advanced Configuration for Horizon Workspace Virtual Machines 75 Enabling External Access to Horizon Workspace 76 Establish SSL Trust between Horizon Workspace vapp and Load Balancer 78 Enable AUDIT Events via Proxy Server 78 Configuring an External Database 79 Configuring Redundancy/Failover for Horizon Workspace Virtual Machines 84 Create Multiple gateway-va Virtual Machines 84 Create Multiple service-va Virtual Machines 85 Create Multiple connector-va Virtual Machines 87 Create Multiple data-va Virtual Machines 91 Update Horizon Workspace Settings with Configurator 97 Configuring SecurID for Horizon Workspace 98 Prepare the RSA SecurID Server for the Connector 98 Configure SecurID with the Connector Web Interface 99 Configuring Kerberos for Horizon Workspace 100 Configure Internet Explorer to Access the Web Interface 101 Configure Firefox to Access the Web Interface 102 Configure the Chrome Browser to Access the Web Interface 103 Using SSL Certificates in Horizon Workspace 104 Apply an SSL Certificate from a Major or Private Certificate Authority 104 Adjusting Java Heap Size for Improved Performance 105 Index 107 Update Java Heap Size on the data-va Virtual Machine 105 Update Java Heap Size on the connector-va Virtual Machine VMware, Inc.
5 About Installing and Configuring 1 VMware Horizon Workspace The VMware Horizon Workspace Installation and Configuration Guide leads you through the installation and configuration process for the Horizon Workspace server. When the installation is finished, you can use VMware Horizon Workspace to entitle users for managed, multi-device access to your organization's data and applications, including Windows applications, software as a service (SaaS) applications, files, View desktops, and mobile applications. Horizon Workspace includes a multiple virtual machine vapp, distributed as an Open Virtualization Archive (OVA) file. You deploy the vapp to vcenter. Horizon Workspace includes the following virtual appliances. Table 1 1. Horizon Workspace Server Components Horizon Workspace Server Component VMware Horizon Workspace Configurator Virtual Appliance (configurator-va) VMware Horizon Workspace Manager Virtual Appliance (service-va) VMware Horizon Workspace Connector Virtual Appliance (connector-va) VMware Horizon Workspace Files Virtual Appliance (datava) VMware Horizon Workspace Gateway Virtual Appliance (gateway-va) VMware Horizon Workspace Data Template Virtual Appliance (datatemplate-va) Description You start configuring Horizon Workspace with this virtual appliance, using both its console interface and the Configurator Web interface. The configurations you make with the Configurator are distributed to the other virtual appliances in the vapp. This virtual appliance handles ThinApp package synchronization and gives you access to the Administrator Web interface, from which you can manage users, groups, and resources. The Horizon Workspace Connector provides the following services: user authentication (identity provider), directory synchronization, ThinApp-catalog loading, and View pool synchronization. This virtual appliance controls the file storage and sharing service, stores users' files and folders, and synchronizes them across multiple devices. The Horizon Workspace Gateway is the single endpoint for all end user communication. User requests come to the gateway-va virtual machine, which then routes the request to the appropriate virtual appliance. This virtual appliance is generated by the Configurator the first time the Horizon Workspace vapp is installed and powered on. It is used for clustering when you create a new data-va virtual machine using the hznadmintool addvm command. VMware, Inc. 5
6 Installing and Configuring Horizon Workspace Intended Audience This information is intended for system and functional administrators of VMware Horizon Workspace. The information is written for experienced Windows and Linux system administrators who are familiar with VMware technologies, particularly vcenter, ESX, vsphere, and View, networking concepts, Active Directory servers, Simple Mail Transfer Protocol (SMTP), and NTP servers. SUSE Linux 11 is the underlying operating system for the virtual appliances in the vapp. Knowledge of other technologies, such as VMware ThinApp, RSA SecurID, Active Directory, and ios application distribution is helpful if you plan to implement those features. 6 VMware, Inc.
7 Installing Horizon Workspace 2 Each deployment of Horizon Workspace has different requirements. You can select the appropriate installation tasks for your deployment. VMware, Inc. 7
8 Installing and Configuring Horizon Workspace Figure 2 1. VMware Horizon Workspace Architecture Diagram for Typical Deployments DMZ Load Balancer HA Pair Horizon Workspace FQDN VIP: hzapps.customer.com (Horizon Workspace Portal) HTTPS (443) Internet ios/android Mac Client Laptop PC Note: Load-balanced connectors use corporate network load balancers. Internal Gateway VIP: hzapps.customer.com View Conn. Server HTTPS (443) HTTPS PCoIP Corporate Zone VDI (HTML) VDI (PCoIP/RDP) Corporate LAN users ios/android PC Mac Client Laptop HTTPS (443) Gateway -va Load-balanced external connector Data-va Service -va Load-balanced internal connector Configurator -va DNS/NTP services RSA SecurID AD/direct services Data-va storage External database ThinApp repository vcenter Server Horizon Workspace User Authentication on page 9 Horizon Workspace user authentication requires the use of one or more identity provider instances, which can be Connector instances, third-party identity provider instances, or a combination of both. The identity provider instances authenticate users with Active Directory within the enterprise network. System and Network Configuration Requirements on page 9 When you install and configure Horizon Workspace in its basic configuration, you install the Configurator (configurator-va), Manager (service-va), Connector (connector-va), Horizon Files (datava), and Gateway (gateway-va) virtual appliances and use the interface of the Configurator virtual appliance and the Web interface for configuration purposes. Preparing to Deploy Horizon Workspace on page 14 Before you deploy Horizon Workspace, you must prepare your environment. This preparation includes downloading Horizon Workspace and creating DNS records and IP addresses with reverse lookup. 8 VMware, Inc.
9 Chapter 2 Installing Horizon Workspace Configure Basic Horizon Workspace Settings on page 18 Before you deploy Horizon Workspace, you configure the network, SSL, and vcenter extension. Deploying Horizon Workspace on page 20 To install Horizon Workspace, you must install the OVA file and run the Configurator's virtual appliance interface on vcenter Server. Otherwise, the installation fails. After Horizon Workspace is installed, you can configure the virtual machines in your environment. Change the Password to the Generated Keystore File on page 32 After you deploy the vapp and before you run the addvm command, you can change the generated keystore (horizon.uber) file password. It is also important to update the password in the encrypted runtime-config.properties file. Horizon Workspace User Authentication Horizon Workspace user authentication requires the use of one or more identity provider instances, which can be Connector instances, third-party identity provider instances, or a combination of both. The identity provider instances authenticate users with Active Directory within the enterprise network. Horizon Workspace authenticates users based on how you configure authentication methods, default access policy set, network ranges, and identity provider instances. The identity provider instances that you use with Horizon Workspace create an in-network federation authority that communicates with Horizon Workspace using SAML 2.0 assertions. The identity provider instances authenticate the user with Active Directory within the enterprise network (using existing network security). By default, Horizon Workspace supports the following authentication methods with the Connector: Active Directory password Kerberos RSA SecurID System and Network Configuration Requirements When you install and configure Horizon Workspace in its basic configuration, you install the Configurator (configurator-va), Manager (service-va), Connector (connector-va), Horizon Files (data-va), and Gateway (gateway-va) virtual appliances and use the interface of the Configurator virtual appliance and the Web interface for configuration purposes. Prerequisites VMware vcenter and one or more ESX servers to deploy Horizon Workspace vapp. NOTE For information about supported vsphere and ESX server versions, see the VMware Product Interoperability Matrixes at The VMware vsphere client provides access to the virtual appliance interface. The vsphere client is required to deploy the Open Virtual Appliance (OVA) file to vsphere and to access the deployed virtual appliance remotely to configure networking. The appropriate VMware licenses. Consider your entire Horizon Workspace deployment, including how you integrate Horizon Workspace when you make decisions about hardware, resources, and network requirements. For example, you need more hardware for larger deployments. Review Chapter 4, Advanced Configuration for Horizon Workspace Virtual Machines, on page 75. VMware, Inc. 9
10 Installing and Configuring Horizon Workspace Virtual Appliance Requirements Ensure that the resources allocated to the virtual appliances meet the minimum requirements. IMPORTANT For storage, you can use the internal database for the proof-of-concept phase. Do not use the internal database server in production. For production, install and configure an external database server. Table 2 1. Gateway Virtual Appliance (gateway-va) Requirements Component Minimum Requirement CPU 2 Random-access memory Disk space 2GB 9GB NOTE The gateway-va virtual machine buffers client requests before sending them to the data-va virtual machine. Large files that are waiting to upload are temporarily stored on this disk. Depending on the upload size limit set for your environment, the space on the buffer can easily exceed the maximum limit. An additional disk is automatically added during installation. During an upgrade, the configuration that points to an additional disk for buffering is created, but this additional disk can only be created after the upgrade is complete. Table 2 2. Manager Virtual Appliance (service-va) Requirements Component Minimum Requirement CPU 2 Random-access memory Disk space 4GB 36GB Additional notes A PostgreSQL database is included in the virtual appliance to make testing easier. For production, you must use an external database server (vpostgresql or Oracle). For information about specific database versions and service pack configurations supported with Horizon Workspace, see the VMware Product Interoperability Matrixes at NOTE You can convert (and scale) an internal PostgreSQL database to an external database at a later time. External database sizing information: 64GB for first 100,000 users. Add 20GB for each additional 10,000 users. Storage: 32GB Table 2 3. Configurator Virtual Appliance (configurator-va) Requirements Component Minimum Requirement CPU 1 Random-access memory Disk space 1GB 5GB 10 VMware, Inc.
11 Chapter 2 Installing Horizon Workspace Table 2 4. Connector Virtual Appliance (connector-va) Requirements Component Minimum Requirement CPU 2 Random-access memory Disk space 4GB 12GB NOTE The service-va virtual machine automatically adjusts the Java heap size when you add memory. You must adjust the Java heap size manually for the gateway-va, connector-va, and configurator-va virtual machines. See Adjusting Java Heap Size for Improved Performance, on page 105. Table 2 5. Horizon Files Virtual Appliance (data-va) Requirements Component Minimum Requirement CPU 2 Random-access memory Disk space Additional notes 4GB 175GB The data-va virtual machine performs the following tasks: Stores all the files uploaded by users. See Adding Storage to the Horizon Files Virtual Appliance, on page 37 for information on storage best practices. It is recommended that each data-va virtual machine serve no more than 1,000 users. If your deployment includes multiple data-va virtual machines with 1,000 users each, you must configure all the other virtual machines using the requirements shown in the Recommended Virtual Machine Requirements table below. Table 2 6. Recommended Virtual Machine Requirements Virtual Machine CPU RAM configurator-va 1 vcpu 1GB RAM connector-va 2 vcpu 4GB RAM manager-va 6 vcpu 8GB RAM gateway-va 6 vcpu 32GB RAM data-va 6 vcpu 32GB RAM Network Configuration Requirements All the virtual appliances refer to each other by their hostnames. As a result, each IP address must map to a hostname that you can search for from each machine. Ensure that each machine can search for the Horizon Workspace FQDN. The Connector virtual appliance might need to join the Windows domain if Kerberos, View, or ThinApp functions are enabled. In that case, the Connector hostname must be in the same domain as the Active Directory. VMware, Inc. 11
12 Installing and Configuring Horizon Workspace Table 2 7. Network Configuration Requirements Component Minimum Requirement IP pool Must be configured in vcenter and contain the appropriate number of free static IP addresses. Must have a DNS server specified, even though the interface allows you to specify multiple DNS servers, only one must be defined. Must specify the DNS domain. IP pool network configuration is required. Horizon Workspace does not support transient addresses. DNS records and IP addresses Firewall port Add DNS records and IP addresses with reverse lookup for each virtual appliance. Ensure that the inbound firewall port 443 is open for users outside the enterprise network to Horizon Workspace. Port Requirements The following diagram depicts Horizon Workspace port requirements and represents the possible scenarios for connecting with the connector-va virtual machine. Your deployment will include only a subset of these. Here are two potential scenarios: To sync users and groups, the responsible connector-va virtual machine must connect to Active Directory. To sync with ThinApp, the responsible connector-va virtual machine must join the Active Directory domain and connect to the ThinApp Repository share. 12 VMware, Inc.
13 Chapter 2 Installing Horizon Workspace Figure 2 2. Horizon Workspace Ports Load Balancer DMZ Firewall 443 Configurator uses ssh to connect to all VMs in the vapp on port 22 Virtual Appliance 443 Virtual Appliance gateway-va-1** configurator-va** vcenter 80, 443, 7071, , 443, 7071, Virtual Appliance Audit needs TCP: UDP: Virtual Appliance Virtual Appliance Virtual Appliance Virtual Appliance service-va-1** service-va-2** connector-va-1** data-va-1** data-va-2** 5432* 88, 464,135 (TCP/UDP) 389*, 636*, 3268*, 3269* 53 (TCP/UDP) 25* 25* 5432* 389, * Active Directory Database VMware View Server 445 RSA SecurID Domain controller SMTP server ThinApp Repository (Windows CIFS Share) DNS server * Default values are shown. These ports are configurable. ** Every virtual appliance must have access to the DNS server on port 53 and allow incoming SSH traffic on port 22. Hardware Requirements for ESX Server Ensure that the environment for the host and the vsphere instance that runs Horizon Workspace virtual appliance meets the minimum hardware requirements. Storage requirements vary per deployment based on the number of users. See Adding Storage to the Horizon Files Virtual Appliance, on page 37. NOTE You must turn on time sync at the ESX host level using an NTP server. Otherwise, a time drift will occur between the virtual machines. VMware, Inc. 13
14 Installing and Configuring Horizon Workspace Table 2 8. Minimum Horizon Workspace Hardware Requirements Component Processor RAM On-board LAN Storage Minimum Requirement 2 Intel Quad Cores, 3.0GHz, 4MB Cache 16GB DDR MHz, ECC and registered One 10/100/1000Base-TX port 500GB Preparing to Deploy Horizon Workspace Before you deploy Horizon Workspace, you must prepare your environment. This preparation includes downloading Horizon Workspace and creating DNS records and IP addresses with reverse lookup. Prerequisites Before you proceed with your deployment, review Chapter 4, Advanced Configuration for Horizon Workspace Virtual Machines, on page 75. If you configure any of these options, the way you deploy might change. SMTP server is required. Download Horizon Workspace on page 14 Download the Horizon Workspace OVA package file from the VMware Web site. Creating DNS Records and IP Addresses with Reverse Lookup on page 14 A DNS entry and a static IP address that uses reverse lookup must be available for each virtual appliance in the vapp. Because each company administers their IP addresses and DNS records differently, before you begin your installation, consult your network administrator and request five DNS records and five IP addresses that use reverse lookup. You must have one IP address for each virtual appliance: Configurator (configurator-va), Manager (service-va), Connector (connector-va), Horizon Files (data-va), and Gateway (gateway-va). Deployment Checklists on page 15 You can use Horizon Workspace deployment checklists to gather the necessary information to install Horizon Workspace. Depending on your deployment, you might only need a portion of the network information for your virtual machines when you create the static IP addresses in the DNS before the installation and during a Horizon Workspace installation. Download Horizon Workspace Download the Horizon Workspace OVA package file from the VMware Web site. Creating DNS Records and IP Addresses with Reverse Lookup A DNS entry and a static IP address that uses reverse lookup must be available for each virtual appliance in the vapp. Because each company administers their IP addresses and DNS records differently, before you begin your installation, consult your network administrator and request five DNS records and five IP addresses that use reverse lookup. You must have one IP address for each virtual appliance: Configurator (configurator-va), Manager (service-va), Connector (connector-va), Horizon Files (data-va), and Gateway (gateway-va). Reverse Lookup and IP Addresses Horizon Workspace requires reverse lookup. You must define a PTR record on the DNS server so each virtual appliance uses the correct network configuration. If reverse lookup is not properly configured, Horizon Workspace installation fails. 14 VMware, Inc.
15 Chapter 2 Installing Horizon Workspace You can use the following sample list of DNS records when you talk to your network administrator. Replace the sample information with information from your environment. This example shows forward DNS records and IP addresses. Table 2 9. Examples of Forward DNS Records and IP Addresses Domain Name Resource Type IP Address my-gateway-va.company.com A my-configurator-va.company.com A my-service-va.company.com A my-connector-va.company.com A my-data-va.company.com A This example shows reverse DNS records and IP addresses. Table Examples of Reverse DNS Records and IP Addresses IP Address Resource Type Domain Name in-addr.arpa. IN PTR my-gateway-va.company.com in-addr.arpa. IN PTR my-configurator-va.company.com in-addr.arpa. IN PTR my-service-va.company.com in-addr.arpa. IN PTR my-connector-va.company.com in-addr.arpa. IN PTR my-data-va.company.com NOTE After you complete the DNS configuration, verify that the reverse DNS lookup is properly configured. For example, the virtual appliance command host IP_address must resolve to the DNS name lookup. Using a Unix/Linux-based DNS Server If you are using a Unix/Linux-based DNS server and plan to join Horizon Workspace to the Active Directory domain, make sure that the appropriate service (SRV) resource records are created for each Active Directory domain controller. Deployment Checklists You can use Horizon Workspace deployment checklists to gather the necessary information to install Horizon Workspace. Depending on your deployment, you might only need a portion of the network information for your virtual machines when you create the static IP addresses in the DNS before the installation and during a Horizon Workspace installation. Information for Horizon Workspace Fully Qualified Domain Name See Enabling External Access to Horizon Workspace, on page 76 for information. Table Horizon Workspace Fully Qualified Domain Name (FQDN) Information Checklist Information to Gather List the Information Horizon Workspace FQDN VMware, Inc. 15
16 Installing and Configuring Horizon Workspace Network Information for Configurator (configurator-va) Table Configurator Network Information Checklist Information to Gather List the Information IP address DNS name Network Information for Manager (service-va) Table Manager (service-va) Network Information Checklist Information to Gather List the Information IP address DNS name Network Information for Connector (connector-va) If the Connector must join the Active Directory domain, verify that its hostname is valid in that domain. Table Connector Network Information Checklist Information to Gather List the Information IP address DNS name Network Information for Horizon Files (data-va) Table Horizon Files Network Information Checklist Information to Gather List the Information IP address DNS name Network Information for Gateway (gateway-va) Table Gateway Network Information Checklist Information to Gather List the Information IP address DNS name Network Information for IP Pools Table IP Pools Network Information Checklist Information to Gather List the Information Subnet mask Gateway DNS server (Only one DNS server is supported.) DNS domain name 16 VMware, Inc.
17 Chapter 2 Installing Horizon Workspace Active Directory Domain Controller Table Active Directory Domain Controller Information Checklist Information to Gather List the Information Active Directory server name Active Directory domain name Bind DN username and password Base DN Active Directory username and password (Must have privileges to join computers to the domain.) SMTP Server Table SMTP Server Information Checklist Information to Gather List the Information SMTP server hostname SMTP server port number vcenter Credentials Table vcenter Credentials Information Checklist Information to Gather List the Information vcenter hostname vcenter port number vcenter administrator username vcenter administrator password SSL Certificate (Optional) Table SSL Certificate Information Checklist Information to Gather List the Information SSL certificate Private key NOTE The SSL certificate is optional. You can add an SSL certificate after you deploy Horizon Workspace. Horizon Workspace License Key Table Horizon Workspace License Key Information Checklist Information to Gather List the Information Horizon Workspace license key VMware, Inc. 17
18 Installing and Configuring Horizon Workspace Microsoft Windows Preview Table Microsoft Windows Preview Information Checklist Information to Gather List the Information Windows server IP address External Database Table External Database Information Checklist Information to Gather List the Information Database hostname Port Username Password Configure Basic Horizon Workspace Settings Before you deploy Horizon Workspace, you configure the network, SSL, and vcenter extension. The Configurator virtual appliance interface guides you through the basic configuration. After the basic configuration is finished, you must perform more advanced configurations. You can return to the Configurator's virtual appliance interface at any time to update these settings or to perform other configurations. For information about setting the advanced configurations, see Chapter 4, Advanced Configuration for Horizon Workspace Virtual Machines, on page 75. IMPORTANT During deployment, leave the virtual appliances powered off. After deployment, the deployment process powers on the virtual appliances. If the virtual appliances are already on, an error occurs. Prerequisites Log in to vsphere Client. Verify that the vcenter administrator has privileges to the Horizon Workspace vapp or the resource pool that contains the Horizon Workspace vapp. See the vcenter Server 5.1 Documentation Center. Verify that you know the SMTP server name. To change your SMTP settings after you install Horizon Workspace, see the Horizon Workspace Files Command Line Interface Guide. 1 Select the vapp you deployed and expand it. 2 Select the configurator-va virtual machine and click the Console tab. 3 Press Enter to start the configuration. If an error occurs, you might have a problem with your IP Pools. 4 If an error occurs, when prompted, select no. This option shuts down the virtual machine. After you resolve the IP pool errors, you can return to the Configurator's virtual appliance interface. When you select yes on the Summary page, the configuration resumes from the point where you stopped. 18 VMware, Inc.
19 Chapter 2 Installing Horizon Workspace 5 Respond to the prompts with information specific to your deployment. Option Global root password SMTP server name SMTP port number vcenter IP address vcenter port number vcenter admin username vcenter admin password Is this correct? Action Type and confirm the global root password to use for all five virtual appliances in Horizon Workspace. Type the SMTP server name. Type the SMTP port number. Type the vcenter IP address. NOTE The Configurator virtual appliance registers a vcenter extension and queries the vcenter server periodically to check the status of the other virtual machines in the vapp. Type the vcenter port number. Type the vcenter administrator's username. The vcenter administrator needs privileges only to the Horizon Workspace vapp or the resource pool that contains the Horizon Workspace vapp. Type and confirm the vcenter administrator's password. Type y if all of the information is correct. The Configurator virtual appliance processes your information. Depending on your network speed, this process can take 30 minutes or more. If a networking error occurs and the hostname cannot be uniquely resolved using reverse DNS, the Configurator process stops. You must fix the networking problems and reboot the configurator-va virtual machine. Then, you can continue with the deployment process. The new network settings are not available to the Configurator until after you reboot the configurator-va virtual machine. What to do next Configure the Horizon Workspace setup. Configure an SMTP Server to Work with Horizon Workspace You must configure the SMTP server to allow the data-va virtual machine to send s and alerts. If the data-va node is not on the same subnet as the SMTP server, your mail transfer agent (MTA) cannot relay . When you configure your SMTP server to use the IP address or the subnet of the data-va node, your MTA can relay mail. If you use a Microsoft Exchange Server as your SMTP server, go to the Microsoft Technet Library for information about how to configure the Exchange Management Console to allow anonymous relay on a Receive Connector. Prerequisites In your DNS server, verify that the SMTP server hostname has a reverse DNS lookup. 1 If you use a Zimbra server as your SMTP server, configure the Zimbra server using the Zimbra Admin Console. Depending on the version of Zimbra you are using, the names for buttons, fields, and so on might be different. 2 Click Configure Servers > MTA > MTA Trusted Networks. 3 Type the IP address or subnet address of the data-va node. VMware, Inc. 19
20 Installing and Configuring Horizon Workspace What to do next Your SMTP server is configured to allow the data-va virtual machine to send s and alerts. Setting for vcenter Server Quiesce Timeout Is Too Low In an environment with heavy traffic, a vcenter Server quiesce timeout problem can occur that might cause your deployment to fail. Problem When an error message appears, vcenter Server records the error message, Failed to quiesce the virtual machine, to the vcenter Server log. Cause This problem occurs when the virtual machines stop responding during heavy traffic. Solution 1 Search for an entry of the following error message in the vcenter Server log to verify the cause of the problem. Failed to quiesce virtual machine 2 Increase the timeout values. The default values range from 30 to 120 seconds. See the KB article Increasing vcenter Server Timeout Settings at language=en_us&cmd=displaykc&externalid= Redeploy Horizon Workspace. Delete Unused Extensions from vcenter If you deploy Horizon Workspace multiple times after failures or upgrades, Horizon Workspace creates multiple extensions in vcenter. If you do not remove the unused extensions, errors can occur. 1 Log in as a vcenter administrator at 2 Use the UnregisterExtension command to remove the unused extension. 3 Look at the most recent heartbeat to determine the extension in use. What to do next Remove unused extensions to minimize potential errors and improve performance. Deploying Horizon Workspace To install Horizon Workspace, you must install the OVA file and run the Configurator's virtual appliance interface on vcenter Server. Otherwise, the installation fails. After Horizon Workspace is installed, you can configure the virtual machines in your environment. You can use the information in the deployment checklists that you completed to complete the installation. See Deployment Checklists, on page VMware, Inc.
21 Chapter 2 Installing Horizon Workspace Install the OVA File in the vsphere Client To start the Horizon Workspace installation, you must deploy the OVA file using vsphere Client. Prerequisites Log in to the vsphere Client. If the ESX host is part of a cluster, enable DRS in the cluster. If an ESX host belongs to a non-drs cluster, all resource pool functionality is disabled. Deploying a vapp composed of multiple virtual machines automatically creates a resource pool. Because no reservation settings are added to the resource pool, it does not affect the other hosts and virtual machines in the cluster. Use Firefox or Chrome instead of Internet Explorer, or deploy the OVF file by using the VMware vsphere Client. IMPORTANT Do not use the vsphere Web Client (also known as the vsphere Next Generation Client) with Internet Explorer to deploy the Horizon Workspace OVF file. If you use the vsphere Web Client with Internet Explorer to deploy the OVF file, the wizard displays junk characters. 1 Select File > Deploy OVF Template. Respond to the prompts with information specific to your deployment. Table Deploy OVF Template Information Option Source OVF template details End user license agreement Name and location Storage Provisioning Network mapping IP address allocation Description Type a URL or navigate to the OVA package location. Verify that you point to the correct OVA template for this installation. Accept the end user license agreement. Name the vapp. Select the location to store the virtual machine files. Select the provisioning type. Select the network for each virtual machine to use. Ensure you select the virtual machine network associated with the IP pool you created. Select Fixed and type a static IP address. NOTE DHCP and transient IP addresses are not supported in Horizon Workspace. Only static IP addresses with reverse lookup are enabled. Properties 1 Select the correct time zone. 2 Type the static IP address for each virtual appliance. The configurator-va, service-va, connector-va, data-va, and gateway-va virtual machines each use a static IP address. 2 Click Power On After Deployment and click Finish. Depending on your network speed, this deployment can take 30 minutes or more. 3 Verify that the configurator-va virtual machine is powered on. What to do next Run the Configurator's virtual appliance interface to start the initial Horizon Workspace configurations, such as the network, SSL, and vcenter extension configuration. VMware, Inc. 21
22 Installing and Configuring Horizon Workspace Set Up Horizon Workspace You start installing Horizon Workspace by configuring certain basic settings. Prerequisites Deploy the OVA File. Configure the basic Horizon Workspace settings. Configure Basic Horizon Workspace Settings, on page 18. Additional information is available about connecting to Active Directory, filtering users, and Horizon Workspace modules. Establishing a Connection to Active Directory on page 24 Horizon Workspace includes the directory types, Active Directory and Demo User Store (for evaluation only). This configuration information establishes a connection between Horizon Workspace and Active Directory. Filter Types on page 25 You create queries to select the users to synchronize with Horizon Workspace. Depending on the type of query, you filter users by attribute and either include or exclude their attributes from the query to limit the users in the results. Processing time varies based on the type of query you run. Horizon Workspace Modules on page 26 You use different modules to perform different types of tasks in Horizon Workspace, such as entitlement, adding, or importing SAML-based Web applications. You enable the modules during set up or afterward in the Configurator. Horizon Workspace FQDN and SSL Certificates on page 26 Horizon Workspace includes a self-signed certificate. You can upload a trusted certificate later. Log File Information on page 27 During testing or troubleshooting, you will need feedback about the activity and performance of the virtual appliances as well as information about any problems that occur. Horizon Workspace includes these log files. Update Horizon Workspace Settings with Configurator on page 28 After you configure Horizon Workspace, you can use the Configurator to update the current configuration and monitor system information for each virtual appliance. For some settings, you must use the Connector to perform specialized Connector configurations. Horizon Workspace URLs on page 30 You use different URLs to access different Horizon Workspace Web interfaces. 1 Go to to start the Horizon Workspace Setup wizard. You must set a security exception when you see the message, This Connection is Untrusted. See the instructions for your browser on setting security exceptions. 2 Type the license key that VMware provides and create an administrator password. This administrator account is a special account outside of your enterprise directory. If your connection to Active Directory is unavailable, you can use this account. You also use this username and password to access the Horizon Workspace Administrator, Configurator, and Connector Web interfaces directly. 22 VMware, Inc.
23 Chapter 2 Installing Horizon Workspace 3 Select an internal or external database. You can use the internal database for the proof-of-concept phase. Do not use the internal database server in production. For production, install and configure an external database server. 4 Select the directory type and enter the directory information used in your environment. 5 Map the user attributes for Horizon Workspace to push from your directory to Horizon Workspace. IMPORTANT If you plan to integrate with Horizon View, select the Required check box for UPN. 6 Start with the Base DNs to filter the users to synchronize with Horizon Workspace. You can also include or exclude users to narrow the results. 7 Add group information from your directory type to import to Horizon Workspace during the synchronization. You can assign a new name to your Directory group in Horizon Workspace. When you select a group, all members of the group are synced to Horizon Workspace. You can sync users from multiple DNs. Only users identified in the Base DN can be authenticated. 8 Schedule a sync. You can schedule a sync to run as frequently as every hour or as infrequently as once a week. If you select Manually as the frequency, your directory and Horizon Workspace only sync when you trigger a push. 9 Verify the number of directory users and groups to add to Horizon Workspace. 10 Click Enable this module to enable modules, such as Horizon Files, Web Applications, and Mobile Management. 11 Paste an SSL certificate and a private key to the Horizon Workspace FQDN and SSL Certificate page. You must create the complete certificate chain and private key to gain external access service. 12 Add the IP addresses for any load balancers or gateways between the Horizon Workspace gateway and the end user. These are the IP addresses that the gateway uses for client identification on the X-Forwarded-For page. The Horizon Workspace gateway uses the X-Forwarded-For header to identify source IP addresses from the browser client and determines which Connector to log in to based on this IP address. The IP addresses you add here are populated to all of the gateways in your environment. 13 When the setup is finished, click the Go to Horizon Workspace button and log in to the Horizon Workspace Web interface. The log in requires the Bind DN username and password that you entered when you set up a connection between Active Directory and Horizon Workspace. If you can log in to the Horizon Workspace Administrator Web interface, your Horizon Workspace deployment was successful. What to do next Install the executable files for the client installers on each data-va virtual machine. If you do not perform this initial installation of the Windows and Mac client installers into your data-va virtual machines, the client download links in the Web client interface point to the home page by default. VMware, Inc. 23
24 Installing and Configuring Horizon Workspace Establishing a Connection to Active Directory Horizon Workspace includes the directory types, Active Directory and Demo User Store (for evaluation only). This configuration information establishes a connection between Horizon Workspace and Active Directory. Directory Information During the initial set up of Horizon Workspace 1.8, you establish a connection between Horizon Workspace and an Active Directory instance that is a single or multiple domain environment in a single forest. If your environment uses multiple forests and you plan to connect to Active Directory in a multi-forest environment, you must create a new connector-va virtual machine to connect with each forest. You configure your multi-forest environment after the initial set up, or later, after testing is complete. See the list below for more information: To establish a connection between a multi-forest Active Directory and Horizon Workspace, see Configuring Horizon Workspace in a Multi-forest Active Directory Environment, on page 42. For information about the global catalog and multiple domains in a single Active Directory forest, see Configuring a Multidomain Active Directory Single Forest, on page 44. To create multiple connector-va virtual machines, of the same type, in your single or multiple domain environment in a single forest for load balancing or failover, see Create Multiple connector-va Virtual Machines, on page 87. Horizon Workspace uses this information to verify your end user's credentials when they log in. See the table for details about the directory information you need to provide for your deployment. Server host Use SSL Server port Search attribute Base distinguished name (DN) The text box for the Active Directory host address. Do not use non-ascii characters when you enter your hostname. You can select the Use SSL check box if you use SSL for your directory connection. The text box for the port number for the Active Directory host. For a single domain Active Directory Domain Service, the default port for LDAP is 389 while the default port for LDAP over SSL is 636. For a multidomain Active Directory Domain Service (AD DS) forest, the default ports for the global catalog are 3268 without SSL and 3269 with SSL. The drop-down menu for the Active Directory attribute that contains the username. For a single domain Active Directory Domain Service, the appropriate selection is samaccountname. For a multidomain AD DS forest, the appropriate selection is userprincipalname. The text box for the Base DN, which is the starting point for directory server searches. You can use either Active Directory or Demo User Store (for evaluation only) directory types. The following example queries are best practices when selecting the Base DN and Bind DN: For a single domain Active Directory Domain Service, this is the text box for the DN of the starting point for directory server searches. For example: DC=mycompany, DC=com. The Connector starts from this DN to create master lists from which you can later filter out individual users and groups. For a multidomain AD DS forest, the appropriate action is to leave this text box blank. 24 VMware, Inc.
25 Chapter 2 Installing Horizon Workspace Bind DN The text box for the Bind DN, including common name (CN), of an Active Directory user account that has privileges to search for users. You can use either Active Directory or Demo User Store (for evaluation only) directory types. The Bind DN account becomes the first administrative account for Horizon Workspace that supports Active Directory. The Bind DN account user record in Active Directory must include a username, first name, last name, address, any required extended attributes, and a DN attribute defined in Active Directory. The following examples are best practices when selecting the Base DN and Bind DN: Base DN: dc=example, dc=com. Use the topmost level for Base DN so you include all users and groups. Bind DN: cn=admin user, ou=users, dc=example, dc=com. Ensure that Bind DN is included in the Base DN you select. You can promote other Active Directory users to the administrator role using the Horizon Workspace Administrator Web interface. For a single domain Active Directory Domain Service, the Bind DN entry must be located in the same branch and below the Base DN. For a multidomain AD DS forest, because you leave the Base DN text box empty, the restrictions that apply for a single domain do not apply for a multidomain forest. Bind password The text box for the Active Directory password for the Bind DN account. Filter Types You create queries to select the users to synchronize with Horizon Workspace. Depending on the type of query, you filter users by attribute and either include or exclude their attributes from the query to limit the users in the results. Processing time varies based on the type of query you run. Include and Exclude Filters If you include additional user attributes to the basic query you create when you enter your base DN, you can restrict users without having to create multiple exclusion filters. For example, by using the include method, you can include 100 users and exclude 900 users without having to determine the correct filter to create to exclude the 900 users. When you add user attributes to your query, processing occurs at the LDAP level rather than in Horizon Workspace. Processing an inclusion query optimizes the memory and resources of Horizon Workspace. You can synchronize users from multiple DNs. However, you can authenticate only users under the Base DN that you defined in your directory. Using an exclude filter is best when you want to exclude a small number of users. This method extracts all the users defined by DN first, and based on the filters you create, excludes the users you do not want to synchronize with Horizon Workspace. If you want to exclude hundreds of users, it is best to add additional user attributes to your query to include them rather than trying to exclude large numbers individually. In some case, you might need to use include and exclude filters together. Create Queries to Filter Users You create queries to filter users from a large group. The results of the query make it easier to select only the users to synchronize to Horizon Workspace. 1 Create an exclude filter with the base DN. a Type the DN where the users are located. For example, to include all the users in the base DN for Company A's Active Directory, use the following query. ou=users,dc=testdc,dc=acme,dc=com b Create filters to exclude users you do not want to sync to Horizon Workspace using this syntax. name contains John Smith VMware, Inc. 25
26 Installing and Configuring Horizon Workspace 2 Create an include filter with base DN user attributes. a b Enter the DN that contains the users and append a semicolon (;) after the user base DN. After the semicolon, add attribute information to narrow your query and include only the users to sync with Horizon Workspace. For example, to include only the sales team in Company A, use the following query. ou=users,dc=testdc,dc=acme,dc=com;(&(objectclass=user)(objectcategory=person) (department=sales)) If you do not want to include additional user attributes in your query, do not use the default filter, (&(objectclass=user)(objectcategory=person)). What to do next After you create and run your query, you synchronize the users you selected with Horizon Workspace. Horizon Workspace Modules You use different modules to perform different types of tasks in Horizon Workspace, such as entitlement, adding, or importing SAML-based Web applications. You enable the modules during set up or afterward in the Configurator. Table Horizon Workspace Modules Module Horizon Files Web Applications Mobile Management ThinApp Packages View Description When this module is enabled, the administrator can entitle users or groups to upload and share files with enterprise and nonenterprise users. The administrator uses the Administrator Web interface to configure file-related settings in the Services area of the catalog. When this module is enabled, the administrator can add or import SAML-based Web applications for installation from a published global catalog hosted by VMware. After adding the Web applications to the Catalog, the administrator can grant users and groups access to these applications. Users can use single sign-on to access the SAML-based Web applications. When this module is enabled, the administrator can provide managed mobile workspaces for use on VMware Ready Android devices. On such devices, the managed mobile workspace is a secure Android container that contains the user's entitled resources. The administrator can upload Android mobile apps to the catalog, set policies to control behavior of the managed mobile workspace, and grant users and groups access to provision the managed mobile workspace to their VMware Ready Android devices. When this module is enabled, access to ThinApp packages from a Windows network share is enabled. You must log in to the Connector and load the ThinApp packages. The administrator can entitle ThinApp packages to users and groups from the Manager Administrator Web interface, and end users can start these applications using the Horizon Workspace Client for Windows. When this module is enabled, the administrator can sync information about the available View pools and entitlements from the View Connection Server. After it is enabled, end users can launch the View desktops they have access to from the Horizon Workspace Web interface. To enable the View module, you must join the Active Directory domain, sync the View Connection Server with it, and enable SAML authentication. See Integrating VMware View, on page 68. Horizon Workspace FQDN and SSL Certificates Horizon Workspace includes a self-signed certificate. You can upload a trusted certificate later. The SSL certificate works with Horizon Workspace only if you include the entire certificate chain when you configure the SSL certificate setting. You must copy the certificate chain order exactly. You use the option to generate certificates only when you install Horizon Workspace for evaluation. You must use the appropriate third-party signed certificates in your production environment. The architecture used in a production environment often includes a load balancer in front of Horizon Workspace. 26 VMware, Inc.
27 Chapter 2 Installing Horizon Workspace Certificate Chain Example -----BEGIN CERTIFICATE----- SSL Cert - Workspace SSL Cert -----END CERTIFICATE BEGIN CERTIFICATE----- Intermediate/Issuing CA Cert -----END CERTIFICATE BEGIN CERTIFICATE----- Root CA Cert -----END CERTIFICATE----- Log File Information During testing or troubleshooting, you will need feedback about the activity and performance of the virtual appliances as well as information about any problems that occur. Horizon Workspace includes these log files. Table Log File Information Component Log File Name Location of Log File Description Service horizon.log /opt/vmware/horizon/horiz oninstance/logs/horizon.l og Information about activity on the Horizon Workspace manager appliance, such as entitlements, users, groups, and so on. Configurator configuratorconsole.log /opt/vmware/var/log/confi gurator-console.log Configuration details from the vapp deployment and installation. configurator.log /opt/vmware/horizon/confi guratorinstance/logs/conf igurator.log Requests that the Configurator receives from the REST client and the Web interface. catalina.log /opt/vmware/horizon/confi guratorinstance/logs/cata lina.out Apache Tomcat records messages that are not recorded by the configurator.log files. Upgrade update.log /opt/vmware/var/log/updat e.log Connector connector.log /opt/vmware/c2/c2instance /logs/connector.log Horizon Files mailbox.log /opt/zimbra/log/mailbox.l og A record of output messages related to update requests during an upgrade from Horizon Workspace 1.5 to Horizon Workspace 1.8. A record of each request received from the Web client. Each log entry also includes the request URL, timestamp, and exceptions. No sync actions are recorded. A record of output messages related to requests received by the mail server. audit.log /opt/zimbra/log/audit.log A record of output messages related to security events. access_log.yyyy-mmdd /opt/zimbra/log/access_lo g.yyyy-mm-dd A record of output messages related to requests received by the data-va virtual machine. VMware, Inc. 27
28 Installing and Configuring Horizon Workspace Table Log File Information (Continued) Component Log File Name Location of Log File Description Gateway access.log /opt/vmware/nginx/logs/ac cess.log URLs that were requested and the status of each request. error.log /opt/vmware/nginx/logs/er ror.log Errors reported from the Web server running on the gateway. CAUTION Upgrading from Horizon Workspace 1.0 to Horizon Workspace 1.8 is not supported. You must upgrade from Horizon Workspace 1.0 to Horizon Workspace 1.5 to Horizon Workspace 1.8. Update Horizon Workspace Settings with Configurator After you configure Horizon Workspace, you can use the Configurator to update the current configuration and monitor system information for each virtual appliance. For some settings, you must use the Connector to perform specialized Connector configurations. You can switch the configurator-va, service-va, connector-va, data-va, gateway-va, and datatemplate-va virtual machine to maintenance mode to monitor information about each virtual machine, and view the IP address, status, or relative drift of a virtual appliance. You can also update or change settings for your database, modules, FQDN and SSL certificates, and more on the following pages. System Information System Diagnostics Database Connection Setup Module Configuration Horizon Workspace FQDN and SSL Certificates X-Forwarded-For Header License Key Password Log File Locations Additional information is available about connecting to Active Directory, filtering users, and Horizon Workspace modules. Change vcenter Administrator Password on page 29 When you change your vcenter password, you must update your password on the configurator-va virtual machine. Otherwise, when you log in to the Horizon Workspace Configurator Web interface, you can only see the System Information page. Enable the Syslog Server on page 29 Horizon Workspace exports application-level events to the external syslog server. Operating system events are not exported. Use System Diagnostics Tool on page 30 You can use the System Diagnostics tool to identify application-specific issues and connectivity with integrated components. The information the tool provides includes the results of different diagnoses performed on each virtual machine in your deployment, as well as basic data points that enable you to troubleshoot your Horizon Workspace environment. 1 Go to 28 VMware, Inc.
29 Chapter 2 Installing Horizon Workspace 2 Log in to the Configurator with the administrator password. 3 Use the left navigation pane to select the page to view. What to do next Verify that the settings or updates you made are in effect. Change vcenter Administrator Password When you change your vcenter password, you must update your password on the configurator-va virtual machine. Otherwise, when you log in to the Horizon Workspace Configurator Web interface, you can only see the System Information page. If you change your vcenter administrator password, you must use the hznadmintool utility to change it on the configurator-va virtual machine as well. 1 Log in to the configurator-va virtual machine. 2 Run the hznadmintool command. hznadmintool editproperty --set=vim_password:yournewpassword 3 Run the configurator-tc restart command to restart the configurator-va virtual machine. What to do next Log in to the Horizon Workspace Configurator Web interface and verify that you can access all the pages. Enable the Syslog Server Horizon Workspace exports application-level events to the external syslog server. Operating system events are not exported. Since most companies do not have unlimited disk space, Horizon Workspace does not save the complete logging history for each virtual machine. If you want to save more history, or create a centralized location for your logging history, you can set up an external syslog server. If you do not configure a syslog server during the initial configuration, you can configure it later from the Syslog Configuration page in the Configurator Web interface. Prerequisites Set up an external syslog server. You can use any of the standard syslog servers available. Several syslog servers include advanced search capabilities. 1 Log in to the configurator-va virtual machine. 2 Click Syslog in the left navigation. This opens the Syslog Configuration page. 3 Click the Enable radio button. 4 Type in the IP or the FQDN of the server where you want to store the logs. 5 Click Save. Horizon Workspace sends a copy of your logs to the syslog server. VMware, Inc. 29
30 Installing and Configuring Horizon Workspace Use System Diagnostics Tool You can use the System Diagnostics tool to identify application-specific issues and connectivity with integrated components. The information the tool provides includes the results of different diagnoses performed on each virtual machine in your deployment, as well as basic data points that enable you to troubleshoot your Horizon Workspace environment. This tool can be used during initial Horizon Workspace configuration. When you run the wizard, if you see an error, you can navigate to the diagnostic page, identify and fix problematic issues, and return to the wizard. The tool is also useful after initial configuration and during regular use of Horizon Workspace. The System Diagnostics page is on-demand. The information it displays represents the status at the time when the page was loaded. The page should be refreshed to view more recent information. Error notifications are not provided. The diagnostic page provides a drill down approach. The top element shows the overall health of the system. You can drill down further to review specific information about a problematic component. Review the status information for each virtual machine in the vapp and troubleshoot problems by locating the appliance where the error occurred. The System Diagnostics page displays status icons for critical, informational, and cautionary states for each virtual appliance. You can drill down and read a detailed description of a message by clicking the link of the appliance with a status icon. You can identify problems in your environment. For example, when a user cannot log in to Horizon Workspace, you can drill down to see that the connector-va virtual machine is not connected to the Active Directory server. Or you can review the information and find out why your service-va virtual machine cannot connect to the database. If you need to forward this report, you can use the Printer Friendly View link to print or save the report to a PDF file. 1 Log in to the configurator-va virtual machine. 2 Open the System Diagnostics page. From the Horizon Workspace setup wizard, click Horizon Workspace. From the Configurator, click Horizon Workspace in the left navigation. 3 Use the links to view the status information, message details, or raw output. What to do next You can use the System Diagnostics page during the Horizon Workspace installation, and afterward, to view status information. Horizon Workspace URLs You use different URLs to access different Horizon Workspace Web interfaces. Each interface gives you access to different functions. Each Web interface URL listed uses a placeholder, such as HorizonWorkspaceFQDN, ConnectorHostname, and ConfiguratorHostname for the hostname. Replace the placeholder names with the actual values. 30 VMware, Inc.
31 Chapter 2 Installing Horizon Workspace Table Horizon Workspace URLs URL User Interface Administr ator Web interface (Active Directory user) Administr ator Web interface (non- Active Directory user) What you can do here Manage your catalog, users and groups, entitlements, reports, etc. (Log in as the Active Directory user with administrator role.) Use this URL if you cannot login as the Active Directory user with the administrator role. (Log in as an administrator using the username admin and the password you set during configuration.) Web Client This URL brings you to the Active Directory user login page. Active Directory Users. From the Active Directory user login page, log in to Horizon Workspace to manage the resources available to you, such as applications, View pools, and the file-sharing service. Guest Users. Use the guest user log in page to log in to Horizon Workspace. If you go to the Active Directory user login page first, click Sign in as a guest user to go to the guest user login page where you can log in Web Client (guest user) Connector Web interface Configurat or Web interface This URL brings you to the guest user log in page. As a guest user, log in to to Horizon Workspace to view and edit shared folders depending on the privileges provided to you by a Horizon Workspace user. Configure additional ThinApp settings, View pool settings, Citrix published application settings, check directory sync status, or alerts. (Log in as an administrator using the password you set during configuration.) See system information, check modules, set license key, or set admin password. (Log in as an administrator using the password you set during configuration.) Adding Workspace Desktop Clients Users can access their Horizon Workspace accounts from the Workspace user portal on the Web. To enable users to download the Desktop clients and to automatically update the Desktop clients with a new version, you must add the Desktop clients installer files to the downloads directory and to the autoupdate directory on the data-va virtual machines. VMware, Inc. 31
32 Installing and Configuring Horizon Workspace Users download the Horizon Workspace for Windows or Horizon Workspace for Mac Desktop clients from their Workspace user portal and install it on their computers. The Horizon Workspace Desktop clients poll the Workspace server every two hours for a new version. When a new version is found, the Desktop client is automatically updated. Users can get the latest Horizon Workspace clients for their Android and ios devices from the app stores, GooglePlay, and itunes respectively. Add Desktop Client Installer Files to data-va Virtual Machines When new versions of the Desktop clients are released, you copy and install a zip file that includes the Desktop client files for Windows and Mac computers from the VMware Downloads page to each data-va virtual machine that is configured. You run the check-client-updates command on each data-va virtual machine to deploy the installer files and restart the data-va virtual machines. Prerequisites Users must have administrator privileges on their computers to install and automatically update the Desktop client. If users do not have administrator privileges, you can use software distribution tools to distribute and update the Horizon Workspace desktop applications to your users. See Command-Line Installer Options for the Windows Desktop client in the Horizon Workspace Administrator's Guide. Schedule adding these installer files to the data-va servers to run during a maintenance window since the data-va virtual machine is restarted and this might interrupt user access. 1 Download the Horizon Workspace Desktop client zip file from the VMware Web site to a computer that can access the data-va virtual machines. 2 Copy the zip file to a temporary location on the data-va virtual machine. scp clients-n.n.n-nnnnnnn.zip [email protected]:/tmp/ 3 Log in to the data-va machine as the root user. 4 Unzip and install the new clients to the Downloads directory. /opt/vmware-hdva-installer/bin/check-client-updates.pl --install --clientfile /tmp/clients.x.x.x- XXXXX.zip This script automatically unzips the file and copies the Desktop clients installer files for Windows and for Mac computers to the /opt/zimbra/jetty/webapps/zimbra/downloads directory, automatic updates to the /opt/zimbra/jetty/webapps/zimbra//public/cds directory, updates the URL parameter value for the downloads link, and restarts the data-va virtual machine. 5 Repeat these steps on each data-va virtual machine in your environment. Users can download the Desktop clients from their Horizon Workspace accounts. Each user's Desktop clients are automatically updated. Change the Password to the Generated Keystore File After you deploy the vapp and before you run the addvm command, you can change the generated keystore (horizon.uber) file password. It is also important to update the password in the encrypted runtimeconfig.properties file. To change the keystore password, you must change the keystore password and all keystore entry passwords. 32 VMware, Inc.
33 Chapter 2 Installing Horizon Workspace 1 Run this command to list all keys in the keystore. /usr/java/jre-vmware/bin/keytool -list -keystore /usr/local/horizon/bin/masterkeys.uber - provider org.bouncycastle.jce.provider.bouncycastleprovider -storetype uber -storepass H0rizon! 2 Run this command to change the keystore password from the default password to a new password. /usr/java/jre-vmware/bin/keytool -storepasswd - keystore /usr/local/horizon/bin/masterkeys.uber -provider org.bouncycastle.jce.provider.bouncycastleprovider -storetype uber -storepass H0rizon! - NewPassword 3 Run this command to change the individual entry keys. /usr/java/jre-vmware/bin/keytool -keypasswd - keystore /usr/local/horizon/bin/masterkeys.uber -provider org.bouncycastle.jce.provider.bouncycastleprovider -storetype uber -storepass Ssn alias "horizon,1" -keypass H0rizon! -NewPassword 4 Repeat these steps for each keystore file, such as hzntoken,hs256 and hzntoken,rs Encrypt and update the new password. a Run the hznencrypt command on the service-va virtual machine to encrypt the new password. /usr/local/horizon/bin/hznencrypt b Update the password in the encrypted runtime-config.properties file. What to do next Continue with the Horizon Workspace configuration. VMware, Inc. 33
34 Installing and Configuring Horizon Workspace 34 VMware, Inc.
35 Configuration for Horizon Workspace Virtual Machines 3 After you finish setting up Horizon Workspace, you might need to configure View and ThinApp integration, or clone virtual machines. You use the Configurator to perform these tasks. Create a datava-template Virtual Machine Manually on page 36 The addvm command for data requires a data-va template to create a virtual machine for clustering. When you install Horizon Workspace, the data-va template is created. When you upgrade Horizon Workspace, the data-va template is not created. Adding Storage to the Horizon Files Virtual Appliance on page 37 When the data-va virtual machine is configured, several default virtual machine disks (VMDK) are configured. The combined size of all configured VMDK storage is 175GB. One of the VMDKs is configured to store Horizon Files blobs and by default is only allotted 10GB of disk space. Configuring Horizon Files Preview on page 39 You must install preview software to use with the Web client. Configuring Horizon Workspace in an Active Directory Forest on page 42 You can connect to Horizon Workspace from an Active Directory that uses single or multiple domains in a single or multiple forest environment. For each environment, you perform different configuration tasks when you establish a connection to Active Directory. Customizing the Demo User Store on page 45 The embedded OpenLDAP service is typically used for demonstration or test configurations. When you use the embedded OpenLDAP service, you might want to perform common LDAP operations, such as adding new users, deleting existing users, and changing user passwords. Integrating VMware ThinApp Packages on page 49 To use Horizon Workspace to distribute and manage applications packaged with VMware ThinApp, you must have a ThinApp repository that contains the ThinApp packages, point your Horizon Workspace system to that repository, and sync the packages. After the sync process is finished, the ThinApp packages are available in your Horizon Workspace catalog and you can entitle them to your Horizon Workspace users and groups. Integrating Horizon Workspace with Citrix-based Applications on page 57 Horizon Workspace supports Citrix-based applications. You can use Horizon Workspace to seamlessly integrate with existing Citrix deployments. Horizon Workspace also supports applications, such as View, ThinApp, SAAS, and so on. Integrating VMware View on page 68 To use View with Horizon Workspace, you must join the Active Directory domain and sync with the View Connection Server. VMware, Inc. 35
36 Installing and Configuring Horizon Workspace (Optional) Set Proxy Server Settings for Manager on page 73 Horizon Workspace Manager virtual machines access the global catalog and other Web services on the Internet. If your network configuration provides Internet access through an HTTP proxy, you must adjust your proxy settings on the Manager (service-va) virtual machine. Create a datava-template Virtual Machine Manually The addvm command for data requires a data-va template to create a virtual machine for clustering. When you install Horizon Workspace, the data-va template is created. When you upgrade Horizon Workspace, the data-va template is not created. 1 Clone an existing data-va virtual machine. 2 Name the virtual machine datava-template. 3 Select the vapp and click the Edit vapp Settings link. 4 Click the Start Order tab. 5 Select the datava-template virtual machine in the left navigation. 6 In the Startup Action and Shutdown Action panes, select None from the Operation drop-down menu. 7 Click OK to start the virtual machine. Because the virtual machine is cloned from an existing data-va virtual machine, the newly cloned virtual machine uses the same IP address and hostname as the original data-va virtual machine, which can cause a conflict. You might need to change the IP address and hostname for the new data-va virtual machine. 8 (Optional) This step is required if you might create new data-va virtual machines in the future. If the data-va virtual machine you are cloning has an NFS location configured, using standard Linux commands, unmount the NFS location, and remove the NFS entry from /etc/fstab. 9 Run the datavatemplate.hzn command to remove installed software from the newly-cloned virtual machine. The executable file is located at /usr/local/horizon/scripts/datavatemplate.hzn. 10 Shut down the datava-template virtual machine. You can use the datava-template virtual machine to add data-va virtual machines. 36 VMware, Inc.
37 Chapter 3 Configuration for Horizon Workspace Virtual Machines Adding Storage to the Horizon Files Virtual Appliance When the data-va virtual machine is configured, several default virtual machine disks (VMDK) are configured. The combined size of all configured VMDK storage is 175GB. One of the VMDKs is configured to store Horizon Files blobs and by default is only allotted 10GB of disk space. You must add additional disk storage to manage your Horizon Files storage resources. You can either add additional VMDKs for Horizon Files blob storage or you can use shared Network-attached storage (NAS) configured with the Network File System (NFS) protocol. The storage option you choose depends on your storage requirements. For example, small deployments that require less than six terabytes for storage can be configured using VMDKs. For large deployments, use NFS protocol to manage your Horizon Files blob storage. NOTE The gateway-va virtual machine buffers client requests before sending them to the data-va virtual machine. Large files that are waiting to upload are temporarily stored on this disk. Depending on the upload size limit set for your environment, the space on the buffer can easily exceed the maximum limit. An additional disk is automatically added during installation. During an upgrade, the configuration that points to an additional disk for buffering is created, but this additional disk can only be created after the upgrade is complete. Add VMDKs for Storage on page 37 You use vsphere to add VMDKs to increase storage. Add Network Attached Storage for Storage on page 38 When you add an NFS mount, it becomes the working data volume. The VMDK disk that is configured during installation becomes a secondary data volume and no new data files are added to the VMDK disk. Managing Storage Volumes on page 39 When files are added to the My Files folder, the files are saved to the current volume. You can create additional volumes, but only one volume is configured as the current volume where new files are stored. When the current volume is full, you can configure a new volume to replace it. as the current volume The current volume receives all new files. New files are never stored in a previous volume. Add VMDKs for Storage You use vsphere to add VMDKs to increase storage. If you want to retire or upgrade disks underlying the data volume, the Linux Documentation Project provides a detailed description about how to remove physical volumes from an LVM by first migrating their file systems (extent). Prerequisites Verify that the data-va virtual machine is running. Recommended storage requirement is 2.5 times the user s quota per account, which provides sufficient space for multiple file revisions. Use vsphere to add VMDKs for storage. After you add a VMDK in vsphere, reboot the data-va server. Verify that you are using NFS version 3 or later. NOTE See the VMware Product Interoperability Matrixes at VMware, Inc. 37
38 Installing and Configuring Horizon Workspace 1 Log in to the vsphere Client and select the data-va server. 2 Click the Console tab. 3 Press the Alt key and click with the left mouse button. 4 Log in as the root user. 5 Enter the root password you created for all virtual appliances during Horizon Workspace installation. 6 Run the zca-expand-lv command. /opt/vmware-hdva-installer/bin/zca-expand-lv The newly added disk is detected and added to the store logical volume by default. 7 Exit the server. What to do next You can use network storage to store your files. See Add Network Attached Storage for Storage, on page 38. Add Network Attached Storage for Storage When you add an NFS mount, it becomes the working data volume. The VMDK disk that is configured during installation becomes a secondary data volume and no new data files are added to the VMDK disk. Prerequisites Create a directory on the NFS server that the data-va virtual machine can access. Identify the hostname or IP address and the directory when you mount the NFS volume. If you add NFS volumes to multiple data-va virtual machines that are exported from the same NFS server, you must use a dedicated export target for each data-va virtual machine to avoid data losses and unpredictable effects. The full export qualifier must be unique, NFSserver.example.com:nfs_serverhostname:/directory_to_use. If you use the hostname as the folder name that you want to export, it guarantees the name s uniqueness and ensures that the folder can be easily identified. For example, nfsserver.example.com:/export/data-va1, nfsserver.example.com:/export/datava2, and so on. 1 Log in to the vsphere Client and select the data-va virtual machine. 2 Click the Console tab. 3 Press the Alt key and click with the left mouse button. 4 Log in as the root user. 5 Type the administrator password you created for all virtual appliances during Horizon Workspace installation. 6 Change the directory and mount the NFS volume. /opt/vmware-hdva-installer/bin #./mount-nfs-store.pl -- nfsnfs_serverhostname:/directory_to_use 38 VMware, Inc.
39 Chapter 3 Configuration for Horizon Workspace Virtual Machines 7 Verify the newly mounted NFS volume ID. a Change to the Zimbra user. su - zimbra b Type zmvolume -l to see the volume ID. What to do next You can also manage your data storage volumes. See Managing Storage Volumes, on page 39. Managing Storage Volumes When files are added to the My Files folder, the files are saved to the current volume. You can create additional volumes, but only one volume is configured as the current volume where new files are stored. When the current volume is full, you can configure a new volume to replace it. as the current volume The current volume receives all new files. New files are never stored in a previous volume. You cannot delete a current volume, and volumes that reference that volume cannot be deleted. Use the zmvolume CLI to manage storage volumes on your data-va virtual machine. See the Horizon Workspace Command Line Interface Guide. Configuring Horizon Files Preview You must install preview software to use with the Web client. When the contents of a file contain Simplified Chinese, Traditional Chinese, Korean, or Japanese characters, the file might not preview correctly. You must install the CJK fonts on the server to preview these languages. IMPORTANT You cannot preview password protected Microsoft Office documents. Install LibreOffice Preview You can install LibreOffice Preview to view Horizon Workspace documents. 1 Log in to the vsphere Client and select the data-va virtual machine. 2 Click OK. 3 Click the Console tab and click Enter. 4 Log in as the root user to the data-va virtual machine. 5 Type the administrator password that you created for all the virtual appliances during the Horizon Workspace installation. 6 If you use a proxy to reach the Internet, type export http_proxy= 7 Type /opt/zimbra/libexec/libreoffice-installer.sh. 8 (Optional) You can run the tail -f /tmp/libreoffice.download.txt command to monitor the progress of the installation. 9 Change to the Zimbra user after LibreOffice installation is finished. su - zimbra 10 Run the restart command to apply the changes to the data-va virtual machine. zmmailboxdctl restart VMware, Inc. 39
40 Installing and Configuring Horizon Workspace What to do next If your company is licensed to use Microsoft Windows products, you can install Microsoft Windows Preview for additional preview functions. Install Microsoft Windows Preview You can configure the Horizon Workspace Preview server to preview Microsoft Office documents when you use the Horizon Workspace Web interface. IMPORTANT You can install Microsoft Windows Preview if your company is licensed to use Microsoft Windows products. Prerequisites Verify that the following software is installed. Verify that LibreOffice is installed, even if Microsoft Windows Preview is installed. Install LibreOffice Preview, on page 39. Microsoft Windows 7 Enterprise or Windows Server 2008 R2 Standard Microsoft Office 2010 Professional, 64 bit, or later. Verify that Word, Excel, PowerPoint, and Publisher are installed. Verify that you have an administrative account with permission to create local accounts. Turn off UAC. NOTE See the VMware Product Interoperability Matrixes at to verify version information. Point the data-va Virtual Machine to the Microsoft Windows Preview Server on page 41 Configure the Preview feature on the data-va virtual machine to point to the Windows Preview Server. Modifying the Preview Server Localconfig File on page 41 You can change the configuration settings for the Preview Server to suit your environment. 1 Download the msi file from the Horizon Workspace downloads directory at /opt/zimbra/jetty/webapps/zimbra/downloads/vmware-horizon-data-preview-serverbuildnumber.msi. 2 Open the msi file and click Next. 3 Accept the end user license agreement and click Next. 4 Configure the Controller/Worker accounts. The default values are prepopulated. a (Optional) Change the Number of Worker Accounts. The default value is five. You can change the default value using the standard, 2 x (number of CPUs) x (number of cores per CPU). b (Optional) Change the Controller/Worker Account Password. The default password is preset to VMwarePv123!. You can change the password to meet your requirements. 5 If you are prompted to reboot, click Yes. 40 VMware, Inc.
41 Chapter 3 Configuration for Horizon Workspace Virtual Machines The controller account is logged in after the reboot. This account must be logged in for the server to run. The preview server starts each time the controller account is logged in. What to do next To complete the Microsoft Windows Preview setup, see Point the data-va Virtual Machine to the Microsoft Windows Preview Server, on page 41. Point the data-va Virtual Machine to the Microsoft Windows Preview Server Configure the Preview feature on the data-va virtual machine to point to the Windows Preview Server. 1 Log in to the vsphere Client and select the data-va virtual machine. 2 Click the Console tab and click Enter. 3 Log in as a root user. 4 Type the administrator password that you created for all the virtual appliances during the Horizon Workspace installation. 5 Change to the Zimbra user. su - zimbra 6 Run the zmlocalconfig command to configure the data-va virtual machine to use the Microsoft Windows Preview Server. zmlocalconfig -e ms_converter_url= 7 Type zmmailboxdctl restart to restart mailboxd. 8 Run the zmprov command to modify each class of service, including the externaldefault class. zmprov mc {cosname} hzndataconverterhints UseMsPDFConverter What to do next You can change the configuration settings for the Preview Server, such as change conversion timeout, delete account behavior, and so on. See Modifying the Preview Server Localconfig File, on page 41. Modifying the Preview Server Localconfig File You can change the configuration settings for the Preview Server to suit your environment. Change Conversion timeout Delete accounts on uninstall Customize the Temp directory Customize the Log directory Determines how long the server waits for Microsoft Office to export a file to PDF. Specifies whether the controller and worker accounts are deleted during uninstall. This directory is created under C:\ProgramData\Vmware\Octopus Preview Server by default. You can move the directory, but the Users group must have full access to custom directories. This directory is created under C:\ProgramData\Vmware\Octopus Preview Server by default. You can move the directory, but the Users group must have full access to custom directories. IMPORTANT Changes you make to the localconfig file are overwritten when you upgrade. If you make changes to this file, make a copy of your changes before you upgrade. VMware, Inc. 41
42 Installing and Configuring Horizon Workspace Configuring Horizon Workspace in an Active Directory Forest You can connect to Horizon Workspace from an Active Directory that uses single or multiple domains in a single or multiple forest environment. For each environment, you perform different configuration tasks when you establish a connection to Active Directory. During the initial set up of Horizon Workspace 1.8, you establish a connection between Horizon Workspace and an Active Directory instance that is a single or multiple domain environment in a single forest. If your environment uses multiple forests and you plan to connect to Active Directory in a multi-forest environment, you must create a new connector-va virtual machine to connect with each forest. You configure your multi-forest environment after the initial set up, or later, after testing is complete. See the list below for more information: To establish a connection between a multi-forest Active Directory and Horizon Workspace, see Configuring Horizon Workspace in a Multi-forest Active Directory Environment, on page 42. For information about the global catalog and multiple domains in a single Active Directory forest, see Configuring a Multidomain Active Directory Single Forest, on page 44. To create multiple connector-va virtual machines, of the same type, in your single or multiple domain environment in a single forest for load balancing or failover, see Create Multiple connector-va Virtual Machines, on page 87. Configuring Horizon Workspace in a Multi-forest Active Directory Environment To configure Horizon Workspace in a multi-forest Active Directory environment, you make configurations for the first forest and each additional forest as necessary, either as a single-domain forest or as a multidomain forest. ATTENTION In a multi-forest Active Directory environment, Horizon Workspace does not support VMware View resources or Citrix-based applications. To enable Horizon Workspace users to access these resource types, you must integrate Horizon Workspace with a single Active Directory domain environment or a multidomain, single forest Active Directory environment. The following steps describe the planning and tasks you need to perform to configure Horizon Workspace in a multi-forest Active Directory deployment. 1 Plan how to integrate Horizon Workspace with your multi-forest Active Directory environment. Decide, according to your organization's needs, the number of user stores required and the best way to associate user stores to your Active Directory deployment per forest. Determine the authentication types required to meet the needs of your organization. For example, you can configure Horizon Workspace to use Kerberos authentication for users internal to your organization and RSA SecurID authentication for users external to your organization. Determine the mixture of Connector instances and third-party identity provider instances required in your deployment. Determine how to configure high availability for the identity provider instances. 2 Install and configure Horizon Workspace to integrate with one of your Active Directory forests. For a forest that consists of a single domain, see Establishing a Connection to Active Directory, on page 24 and follow the instructions for a single-domain Active Directory forest. For a forest that consists of multiple domains, see Configuring a Multidomain Active Directory Single Forest, on page VMware, Inc.
43 Chapter 3 Configuration for Horizon Workspace Virtual Machines 3 Add identity provider instances as required for each new forest you plan to integrate with Horizon Workspace, each additional authentication method you plan to add, and high availability purposes. You can associate an identity provider with a forest. Decide which option best suits your deployment. For third-party identity providers, verify that Horizon Workspace can reach each identity provider instance. For the Connector, use the hznadmintool addvm command with the --activateonly=y option to add Connector instances to a multi-forest Active Directory environment. See Manually Create a New connector-va Virtual Machine for Each Forest, on page 43. Use the Connector Web interface to manually configure the Connector instances. A result of using the setting --activateonly=y is that Horizon Workspace does not automatically configure the Connector instances, which requires you to manually configure them. See Configure the New connector-va Virtual Machine, on page For each identity provider instance, either the Connector or a third-party identity provider, use the Administrator Web interface to complete the configuration of user stores, network ranges, and authentication methods. For information about adding and configuring identity provider instances, see the Horizon Workspace Administrator's Guide. Manually Create a New connector-va Virtual Machine for Each Forest You must integrate your multi-forest Active Directory environment with Horizon Workspace 1.8 after installation. Each forest must connect with a dedicated connector-va virtual machine. To set up a path between the new connector-va virtual machine and each forest in your environment, you create an unconfigured connector-va virtual machine. Prerequisites Deploy Horizon Workspace with one Active Directory. Create a connector-va virtual machine to point to a single forest by running the addvm command. 1 Log in to the configurator-va virtual machine as the administrator. 2 From the command line, run the addvm command using the following parameters and values. hznadmintool addvm--type=connector--ip=xx.xxx.xxx.xxx--usegatewayasidp=n--activateonly=y Set the activateonly parameter to y to create a connector-va virtual machine. If the activateonly parameter is set to n, the addvm command copies an old or existing Active Directory instead of creating a new connector-va virtual machine. What to do next After the addvm command runs, configure the connector-va virtual machine Web user interface. Configure the New connector-va Virtual Machine After you create a connector-va virtual machine for each forest in your environment, you must configure the connector-va virtual machine in the Connector Web interface to establish a connection between the forest and Horizon Workspace. If you want the new connector-va virtual machine to synchronize users and groups, define the new connector-va virtual machine as the sync client in the Web interface. If the sync client is not defined, when you attempt to sync users and groups with Horizon Workspace, Active Directory rejects the request and synchronization fails. For more information about filtering Active Directory users and groups, see Filter Types, on page 25. VMware, Inc. 43
44 Installing and Configuring Horizon Workspace Prerequisites Log in to each Connector Web interface as the administrator. 1 Configure the connector-va virtual machine by entering the information for your environment on the Directory, Join Domain, Windows Authentication, Kerberos, SecurID pages, and so on. 2 Select the Enable Directory Sync check box. You can configure backup synchronization clients by selecting the manual schedule option and setting the connector-va virtual machine as the default synchronization client. 3 Click Edit Directory Sync Rules. 4 Type the DN to include the users to synchronize. 5 (Optional) Add filters to restrict users from the synchronization. 6 Select the groups to include in the synchronization and click Next. The synchronization starts. After the synchronization finishes, a message displays that reports the number of users and groups added to Horizon Workspace. What to do next The connection between your multi-forest Active Directory environment is established. You can synchronize Active Directory with Horizon Workspace. Configuring a Multidomain Active Directory Single Forest If your deployment uses a multidomain Active Directory single forest, you must base the Horizon Workspace general configuration and individual Connector configuration on the Active Directory global catalog instead of LDAP. Active Directory Global Catalog The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory forest. The global catalog is stored on domain controllers that are designated as global catalog servers. The global catalog is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers. A global catalog server is a domain controller that stores a full, writable domain directory partition replica and a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server. The Active Directory replication system builds and updates the global catalog. The attributes that are replicated to the global catalog are identified in the schema as the partial attribute set (PAS) and are predefined by Microsoft. To optimize or extend searching, you can edit the schema by adding or removing attributes that are stored in the global catalog. Access to a global catalog server is required for successful user authentication. If a global catalog server is not available, the user login fails. The global catalog stores the membership, the member attribute, of only universal groups. You can change the scope of a group from a local domain or global to universal. Active Directory uses ports 389 and 636 for standard LDAP queries, instead of ports 3268 and 3269 for global catalog queries. This configuration separates forest-wide queries that require a global catalog server from local, domain-wide queries that the domain controller in the user's domain can service. 44 VMware, Inc.
45 Chapter 3 Configuration for Horizon Workspace Virtual Machines Users must log in to Horizon Workspace with a user principal name (UPN). When a user account is created, the UPN suffix is generated by default as username@dnsdomainname, but an administrator can change this default setting. For example, in a forest that has four domains, the UPN suffix might be configured to map to the external DNS name for the organization. The userprincipalname attribute of the user account in Active Directory identifies the UPN and is replicated to the global catalog. Horizon Workspace General Configuration and Individual Connector Configuration The installation and configuration of Horizon Workspace and the Connector for an Active Directory forest scenario is similar to that for a single domain scenario. You must configure a few of the Active Directory pages differently when your deployment uses an Active Directory forest. Table 3 1. Connector Web Interface Configurations Specific to an Active Directory Forest Connector Web Interface Page Location of Connector Web Interface Page Configurations Specific to an Active Directory Forest Directory 1 Go to the Connector Web interface. 2 Click the Advanced tab. 3 Click Directory in the left navigation. User Attributes 1 Go to the Connector Web interface. 2 Click the Advanced tab. 3 Click User Attributes in the left navigation. Select Users 1 Go to the Connector Web interface. 2 Click the Advanced tab. 3 Click Directory Sync in the left navigation. 4 Click the Edit Directory Sync Rules button. Server Port: You enter the global catalog port number. The default ports for the global catalog are 3268 without SSL and 3269 with SSL. Search Attribute: Select userprincipalname from the drop-down menu. Base DN: You leave the Base DN text box empty. On the Map User Attributes page, map the Horizon Workspace username attribute to the Directory userprincipalname attribute. This mapping occurs because the userprincipalname value is carried forward from the Directory page. Do not change this value from userprincipalname. On the Map User Attributes page, add only attributes that are stored in the global catalog. To synchronize a special user attribute, such as employeeid, with Horizon Workspace, first add the attribute to the global catalog. On the Select Users page, you can add users from multiple domains of the same Active Directory forest by clicking Add another in the DN section and providing another DN. On the Selected Groups page, multiple group DNs can exist. They are prepopulated with values from the Select Users page. You can use only universal groups. To synchronize special local or global group membership information with Horizon Workspace, you must change the scope of the group to universal. Customizing the Demo User Store The embedded OpenLDAP service is typically used for demonstration or test configurations. When you use the embedded OpenLDAP service, you might want to perform common LDAP operations, such as adding new users, deleting existing users, and changing user passwords. This information is intended for experienced system administrators who are familiar with standard LDAP operations and commands. The embedded OpenLDAP server runs on TCP port 389. The OpenLDAP server is accessible locally only from the Linux console on the connector-va virtual machine. You can use standard LDAP commands to perform operations in the embedded OpenLDAP server. The required binaries (ldapadd, ldapsearch, ldapdelete, and ldapmodify) are installed on the virtual appliance. VMware, Inc. 45
46 Installing and Configuring Horizon Workspace You must use certain parameters when you configure OpenLDAP in the Configurator and Connector Web interfaces. Table 3 2. OpenLDAP Configuration Information Attribute Hostname Search attribute Value ConnectorFullyQualifiedDomainName or localhost samaccountname Server port 389 Base DN Bind DN Bind password ou=users, dc=test, dc=example, dc=com cn=test user1, ou=users, dc=test, dc=example, dc=com password The Demo User Store includes ten sample users and one group for demonstration purposes. Horizon Workspace stores the sample information on the connector-va virtual machine. Specific sample data is included with the Demo User Store. During deployment, this data is loaded into the sample database. To add users or groups, create files and name them ldapusers.ldif and ldapgroups.ldif. Use the original files, users.ldif and groups.ldif, as templates. See Add a User to the Demo User Store, on page 46 and Add Groups and Assign Users to Groups in the Demo User Store, on page 48. Table 3 3. Sample Information included in the Demo User Store Sample Name Sample files Directory path Sample usernames Password for all users Sample group The sample group, testgroup1, contains ten sample users. Value users.ldif groups.ldif /etc/openldap testuser1 testuser10 password testgroup1 Add a User to the Demo User Store on page 46 When you set up your Demo User Store, you determine the number of users you want to add based on your production environment. You need to add enough users so that your tests produce results that are relevant to your production environment. Add Groups and Assign Users to Groups in the Demo User Store on page 48 When you set up your Demo User Store, determine the number of groups and users to add based on the size of your production environment. Add enough groups and users to create an environment that closely resembles your production environment. Add a User to the Demo User Store When you set up your Demo User Store, you determine the number of users you want to add based on your production environment. You need to add enough users so that your tests produce results that are relevant to your production environment. You add a user to the Demo User Store by modifying the ldapusers.ldif file and running the ldapadd command on the Connector virtual machine. 46 VMware, Inc.
47 Chapter 3 Configuration for Horizon Workspace Virtual Machines To generate an encrypted password for each new user, see Generate an SSHA Encrypted Password, on page 47. Prerequisites You must use samaccountname as your Search Attribute in the Demo User Store. Horizon Workspace does not support userprincipalname when using a Demo User Store. 1 Replace the value tag in the ldapusers.ldif file with your information. See the Sample ldapusers.ldif table. 2 Copy the ldif file to the Connector virtual machine. 3 Run the ldapadd command to add a new user to the Demo User Store. /usr/bin/ldapadd -h D cn=manager,dc=test,dc=example,dc=com -w H0rizon! -x -f ldif file path You can add multiple users by using different values in a single ldif file. 4 Restart the LDAP service. /sbin/service ldap restart Table 3 4. Sample ldapusers.ldif File Sample ldapusers.ldif Use a unique value for each parameter. dn: cn=value,ou=users,dc=test,dc=example,dc=com objectclass: user objectcategory: person cn: value sn: value samaccountname: value canonicalname: value mail: value givenname: value distinguishedname: cn=value,ou=users,dc=test,dc=example,dc=com objectguid: value (For example, cd0ff02b-f9d6-4fac-a5bc-6380d ) userpassword: value (For example, {SSHA}WbipwJh13Jdy2tItppdkFMzzNVSfkqsZ.) What to do next Generate an encrypted password for use by your Demo User Store users. Generate an SSHA Encrypted Password The salted secure hash algorithm (SSHA) is an improved version of the SHA algorithm that randomizes the hash and decreases the likelihood that the hash can be unencrypted. You must generate an SSHA encrypted password. You can use the same password for all demo user accounts. If you need a different password for each user, encrypt each password one at a time. Prerequisites Add a User to the Demo User Store, on page Open the Connector virtual machine. VMware, Inc. 47
48 Installing and Configuring Horizon Workspace 2 Run the slappasswd command. 3 Type and verify a new password. The SSHA encrypted value appears. 4 Add this value to the ldif file to set the user password. What to do next Add groups and assign users to the Demo User Store. Add Groups and Assign Users to Groups in the Demo User Store When you set up your Demo User Store, determine the number of groups and users to add based on the size of your production environment. Add enough groups and users to create an environment that closely resembles your production environment. You add a group to the Demo User Store by modifying the ldapgroups.ldif file and running the ldapadd command on the Connector virtual machine. 1 Replace the value and User DN tags in the ldapgroups.ldif file. The user DN must be the distinguished name of an existing user in LDAP. Replacing the value tag creates a group, and replacing the User DN tag assigns a user to the new group you are creating. 2 Copy the ldif file to the Connector virtual machine. 3 Run the ldapadd command to add a group to the Demo User Store. /usr/bin/ldapadd -h Dcn=Manager,dc=test,dc=example,dc=com -w Horizon! -x -fldif file path You can add multiple groups by using different values in a single ldif file. 4 Restart the LDAP service. /sbin/service ldap restart Table 3 5. Example of the ldapgroups.ldif File Sample Parameters Use a unique value for each parameter. dn: cn=value,ou=users,dc=test,dc=example,dc=com objectclass: group objectcategory: group samaccountname: value canonicalname: value mail: value distinguishedname: cn=value,ou=users,dc=test,dc=example,dc=com objectguid: value (e.g. cd0ff02b-f9d6-4fac-a5bc-6380d ) member: User DN1 (e.g. cn=user1,ou=users,dc=test,dc=example,dc=com) member: User DN2 member: User DN3 member: User DN4 What to do next Use the Demo User Store for testing until you are ready to move Horizon Workspace in production. 48 VMware, Inc.
49 Chapter 3 Configuration for Horizon Workspace Virtual Machines Integrating VMware ThinApp Packages To use Horizon Workspace to distribute and manage applications packaged with VMware ThinApp, you must have a ThinApp repository that contains the ThinApp packages, point your Horizon Workspace system to that repository, and sync the packages. After the sync process is finished, the ThinApp packages are available in your Horizon Workspace catalog and you can entitle them to your Horizon Workspace users and groups. ThinApp provides application virtualization by decoupling an application from the underlying operating system and its libraries and framework and bundling the application into a single executable file called an application package. To be managed by Horizon Workspace, these packages must be enabled with the appropriate options. For example, in the ThinApp Setup Capture wizard, you select the Manage with Horizon Workspace check box. For more information about ThinApp features and how to enable your applications for management by Horizon Workspace, see the VMware ThinApp documentation. Typically, you perform the steps to connect your Horizon Workspace system to the repository and sync the packages as part of the overall setup and configuration of your Horizon Workspace environment. The ThinApp repository must be a network share that is accessible to your Horizon Workspace Connector using a Uniform Naming Convention (UNC) path. The Connector synchronizes with this network share regularly to obtain the ThinApp package metadata that the Horizon Workspace system needs to be able to distribute and manage the packages. See Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository, on page 50 The network share can be a Common Internet File System (CIFS) or a Distributed File System (DFS) share. The DFS share can be a single Server Message Block (SMB) file share or multiple SMB file shares organized as a distributed file system. CIFS and DFS shares running on NetApp storage systems are supported. Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository on page 50 When you capture and store ThinApp applications to distribute from Horizon Workspace, you must meet certain requirements. Create a Network Share for ThinApp Packages That Horizon Workspace Manages on page 54 If you want to enable the VMware ThinApp management capabilities of Horizon Workspace and allow users to access ThinApp packages from the user application catalog, you must create a network share and store the ThinApp packages in that network share folder. Configuring Horizon Workspace Access to ThinApp Packages on page 54 To configure Horizon Workspace to provide users access to ThinApp packages, you must enable your Horizon Workspace system to locate the stored ThinApp packages and sync the packages with your system. Change the ThinApp Packages Share Folder on page 57 After you configure Horizon Workspace access to your ThinApp packages, your IT environment might change such that your ThinApp packages are in a new location. When this situation occurs, use the ThinApp Packages page in the Connector Web interface to update the path to the new location. VMware, Inc. 49
50 Installing and Configuring Horizon Workspace Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository When you capture and store ThinApp applications to distribute from Horizon Workspace, you must meet certain requirements. Requirements on the ThinApp Packages To create or repackage ThinApp packages that Horizon Workspace can manage, you must use a version of ThinApp that Horizon Workspace supports. For information about specific ThinApp versions that are supported by Horizon Workspace, see the VMware Product Interoperability Matrixes at You must have ThinApp packages that Horizon Workspace can manage. In the ThinApp capture-and-build process, you can create packages that Horizon Workspace can manage or ones that it cannot manage. For example, when you use the ThinApp Setup Capture wizard to capture an application, you can make a package that Horizon Workspace can manage by selecting the Manage with Horizon Workspace check box. See the VMware ThinApp documentation for detailed information on ThinApp features and the appropriate parameters to use to create a package compatible with Horizon Workspace. For existing ThinApp packages, you can use the relink - h command to enable the packages for Horizon Workspace. For information about how to convert existing ThinApp packages to packages that Horizon Workspace can manage, see the Horizon Workspace Administrator's Guide. You must store the ThinApp packages on a network share that meets the requirements for the combination of network share type, repository access, and desired ThinApp package deployment mode for your organization's needs. Requirements on the Network Share Repository The ThinApp packages must reside on a network share, also known as the ThinApp package repository. The network share must be accessible using a Uniform Naming Convention (UNC) path from each system running the Horizon Workspace client used to access the ThinApp packages. For example, a network share named appshare on a host named server is accessible using the UNC path \\server\appshare. The fully qualified hostname of the network share folder must be resolvable from your Horizon Workspace Connector. The network share can be a Common Internet File System (CIFS) or a Distributed File System (DFS) share. The DFS share can be a single Server Message Block (SMB) file share or multiple SMB file shares organized as a distributed file system. CIFS and DFS shares running on NetApp storage systems are supported. The network share must meet the criteria appropriate for the type of access you configure your Horizon Workspace Connector to use for accessing the ThinApp package repository: domain-based access or account-based access. The type of access determines the allowable combinations for the following items: Whether you use a CIFS network share or a DFS network share for the ThinApp package repository. Whether you must join your system's Connector and the network share's host to the same Active Directory domain. Whether the user's Windows system must join the Active Directory domain to use the ThinApp packages. The ThinApp package installation mode that the installed Windows client program is set to use for obtaining and running the virtualized applications on the Windows system on which the client is installed. The package installation mode that is used on the user's Windows system is set during the installation process when the Windows client is installed on that Windows system. This package installation mode determines the mode of ThinApp deployment used by that Windows system, download mode or streaming mode. 50 VMware, Inc.
51 Chapter 3 Configuration for Horizon Workspace Virtual Machines Access Type Network Share Type Requirements on the Horizon Workspace Connector Requirements for the User's Windows System Domainbased access You can use a CIFS share for your ThinApp package repository when you use domain-based access. You cannot use a DFS share for domain-based access. If you have a DFS share, you must use accountbased access. You must join your Horizon Workspace Connector to the Active Directory domain so that your Connector instance can join the Windows network share and access the packages. For more information about how to configure your Horizon Workspace Connector to join the domain, see Configuring Kerberos for Horizon Workspace, on page 100. NOTE Windows authentication is not required. The network share must support authentication and file permissions that are based on computer accounts. The Horizon Workspace Connector accesses the network share with the Connector's computer account in the domain. The network share's folder and file permissions must be configured such that the combination of permissions allows read access for the Connector's computer account in the domain. The user's Windows system must join the Active Directory domain before that user can use their entitled ThinApp packages. The following systems must all be joined to the same domain: The user's Windows system Your Horizon Workspace system's Connector The host of the network share with the ThinApp packages When you use domain-based access, the following installation modes for the ThinApp packages are allowed. COPY_TO_LOCAL. With this installation mode, packages are downloaded to the client Windows system. This installation mode corresponds to using the ThinApp download mode for the virtualized application. The account that is used to log in to the client Windows system is the user account that is used to copy the packages from the network share to the client Windows system, and that account must have permissions to read the packages and copy the files from that network share. After the package is downloaded to the client Windows system and the user launches the package, the virtualized application runs locally on the client Windows system. RUN_FROM_SHARE. With this installation mode, packages are not downloaded to the client Windows system. A user launches the packages using shortcuts on the local desktop and the virtualized applications run from the network share using ThinApp streaming mode. The account that is used to log in to the client VMware, Inc. 51
52 Installing and Configuring Horizon Workspace Access Type Network Share Type Requirements on the Horizon Workspace Connector Requirements for the User's Windows System Windows system is the user account that is used to run the packages from the network share, and that account must have permissions to read and execute files from that network share. NOTE RUN_FROM_SHARE is best suited for Windows systems that will always have connectivity to the ThinApp packages' network share. Windows systems that best fit that description are Horizon View desktops, because they are always connected to their domain. Floating, or stateless, Horizon View desktops best use RUN_FROM_SHARE to avoid the resource usage inherent in downloading the packages to the Windows system. By default, the COPY_TO_LOCAL installation mode is set as the default installation mode when you install the Horizon Workspace for Windows client application on a Windows system by running the graphical version of the client's installer program. To set a different installation mode as the default installation mode for the packages, you must run the command-line version of the client's installer program. See the Horizon Workspace Administrator's Guide. Accountbased access You can use either a CIFS share or a DFS share for your ThinApp package repository when you use account-based access. You must configure your Horizon Workspace system to use a share user account and password to access the network share and the packages. The share user account and password is any combination that has read access to the UNC path to the network share folder. You do not have to join your Horizon Workspace Connector to the Active Directory domain to access the network share. NOTE The Connector Web interface requires the completion of the Join Domain page before you can use the ThinApp Packages page in the Connector Web interface. The user's Windows system does not have to join the Active Directory domain before that user can use their entitled ThinApp packages. Windows authentication is not required. The user's Windows system, your Horizon Workspace system's Connector, and the host of the network share with the ThinApp packages do not have to be joined to the same Active Directory domain. When your Horizon Workspace system is configured to use account-based access, the following installation modes for the ThinApp packages are allowed. If the user's Windows system is not joined to the domain, the client must use the HTTP_DOWNLOAD installation mode to obtain the virtualized application. This installation mode corresponds to using the ThinApp download mode for the virtualized application. The Connector uses the share user account to retrieve the packages from the repository. If the user joins the Windows system to the domain, the client can use either the COPY_TO_LOCAL installation mode or the RUN_FROM_SHARE installation mode to run the user's entitled ThinApp packages. The account that is used to log in to the client 52 VMware, Inc.
53 Chapter 3 Configuration for Horizon Workspace Virtual Machines Access Type Network Share Type Requirements on the Horizon Workspace Connector Requirements for the User's Windows System Windows system is the user account that is used to obtain the packages from the network share, and that account must have the appropriate permissions on the network share. If the user's Windows system might be joined to the domain at some times and not joined to the domain at other times, you can install the client with the COPY_TO_LOCAL mode and the AUTO_TRY_HTTP option enabled, as long as the Connector is configured for account-based access. With this configuration, the client first tries to use the COPY_TO_LOCAL mode to download the packages. If the Windows system is not joined to the domain at that time, that attempt to copy the packages fails. However, with the AUTO_TRY_HTTP option enabled, the client immediately makes an attempt to use HTTP to download the packages. This combination of COPY_TO_LOCAL and AUTO_TRY_HTTP is the default when you install the Horizon Workspace for Windows client application on a Windows system by running the graphical version of the client's installer program. The Connector must be configured for account-based access for the attempt to download the packages using HTTP to succeed. In addition, the ThinApp packages repository must meet the following criteria according to the described situation. When your settings involve systems joining the Active Directory domain, make sure that a disjoint namespace does not prevent domain member computers from accessing the network share that hosts the ThinApp packages. A disjoint namespace occurs when an Active Directory domain name is different from the DNS namespace that machines in that domain use. The network share's file and sharing permissions must be configured to provide read access and the ability to run applications to those users that you want to run the ThinApp applications using the COPY_TO_LOCAL or RUN_FROM_SHARE option. For example, for the Active Directory user accounts of those users that you want to run the ThinApp applications in streaming mode, setting the Shared Folder permission to Read and the NTFS permission to Read & Execute provides read access and the ability to run the applications to those users. The NTFS permission setting of Read & Execute is required to run a ThinApp application using the ThinApp streaming mode, which corresponds to the Horizon Workspace for Windows client's RUN_FROM_SHARE installation mode. If your organization requires the NTFS permission set to Read, your users can use the ThinApp download mode for the virtualized application. ThinApp download mode corresponds to installing the Windows client with either the COPY_TO_LOCAL installation mode or HTTP_DOWNLOAD installation mode. With either of those installation modes, the applications are downloaded to the Windows systems and launched locally. Both CIFS and DFS network shares must have the ThinApp packages organized in individual subdirectories in a directory under the namespace, not subdirectories in the namespace itself, such as \\server\appshare\thinapp1, \\server\appshare\thinapp2, and so on. See Create a Network Share for ThinApp Packages That Horizon Workspace Manages, on page 54. VMware, Inc. 53
54 Installing and Configuring Horizon Workspace Create a Network Share for ThinApp Packages That Horizon Workspace Manages If you want to enable the VMware ThinApp management capabilities of Horizon Workspace and allow users to access ThinApp packages from the user application catalog, you must create a network share and store the ThinApp packages in that network share folder. Your Horizon Workspace Connector obtains the metadata it needs about the ThinApp packages from the network file share. Prerequisites Verify that the ThinApp packages meet Horizon Workspace requirements. Verify that you have the appropriate access and permissions to create a network file share in your IT environment that meets Horizon Workspace requirements for ThinApp packages. 1 Create a network share that meets the Horizon Workspace requirements for ThinApp packages. 2 In the network share, create a network share subfolder for each ThinApp package. Typically, you name the subfolder to match the name of the ThinApp application, or indicate what application is in the folder. For example, if the network share is named appshare on a host named server, and the application is called abceditor, the subfolder for the ThinApp package is \\server\appshare\abceditor. NOTE Do not use non-ascii characters when you create your network share subfolder names for ThinApp packages to distribute by using Horizon Workspace. Non-ASCII characters are not supported. 3 For each ThinApp package, copy its files, such as its EXE and DAT files, to the subfolder that is named for that package's virtualized application. After copying the files, you have a set of subfolders and files that are similar to these files: \\server\appshare\abceditor\abceditor.exe \\server\appshare\abceditor\abceditor.dat What to do next Configure your Horizon Workspace system's access to the ThinApp packages. Configuring Horizon Workspace Access to ThinApp Packages To configure Horizon Workspace to provide users access to ThinApp packages, you must enable your Horizon Workspace system to locate the stored ThinApp packages and sync the packages with your system. Prerequisites Create a network share with the appropriate configuration and store the ThinApp packages in the appropriate location in that network share. See Create a Network Share for ThinApp Packages That Horizon Workspace Manages, on page 54. Verify that you have the UNC path to the network share folder where the ThinApp packages are located. Verify that you have an Active Directory domain name and the username and password of an account in that Active Directory that has the rights to join the domain. Even if you are using account-based access, the Connector Web interface requires the completion of the Join Domain page before you can use the ThinApp Packages page in the Connector Web interface. 54 VMware, Inc.
55 Chapter 3 Configuration for Horizon Workspace Virtual Machines To enable domain-based access, you must also join the Connector to the same Active Directory domain to which the ThinApp package repository is joined. Verify that you have the Active Directory domain name for the domain that the network share uses and the username and password of an account in that Active Directory that has the rights to join the domain. The Active Directory account is used to join your Horizon Workspace Connector to the domain. See Horizon Workspace URLs, on page 30. When enabling account-based access, verify that you have a username and password that has permission to read the network share. See Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository, on page 50. NOTE Unless you want to restrict use of the ThinApp packages to domain-joined Windows systems for all runtime situations, you should enable account-based access in addition to domain-based access. This combination provides the most flexibility for supporting runtime situations where users need to use their entitled ThinApp packages without joining their Windows systems to the domain. 1 Join your Horizon Workspace Connector instance to an Active Directory domain. a b c Log in to the Connector Web interface. Select the Join Domain tab. On the Join Domain page, type the information for the Active Directory domain and click Join Domain. IMPORTANT Do not use non-ascii characters when you enter the Active Directory (AD) domain name, AD username, or AD password. Non-ASCII characters are not supported in these entry fields in the Connector Web interface. Option Active Directory AD Username AD Password Description Type the fully qualified domain name of the Active Directory. An example is HS.TRDOT.COM. Type the username of an account in the Active Directory that has permissions to join systems to that Active Directory domain. Type the password associated with the AD Username. This password is not stored by Horizon Workspace. IMPORTANT Each time you import the Connector's configuration you must rejoin the Connector to the domain. The Join Domain page refreshes and displays a message that you are currently joined to the domain. VMware, Inc. 55
56 Installing and Configuring Horizon Workspace 2 Enable your Horizon Workspace system to access the stored ThinApp packages. a b c Select the Packaged Apps - ThinApp tab. Select the Enable packaged applications check box. Complete the information and click Save. IMPORTANT Do not use non-ascii characters for entries in the fields on this page. Non-ASCII characters are not supported in these entry fields in the Connector Web interface. Option Path Choose Frequency Enable account based access Share User Share Password Description Type the path to the shared folder where the ThinApp packages' folders are located, in the UNC path format \\server\share\subfolder. For example: \\DirectoryHost\ThinAppFileShare. For DirectoryHost, provide the hostname, not the IP address. For both CIFS and DFS network shares, this path must be a directory under the namespace, and not the namespace itself. Select the interval at which you want the Connector to synchronize the information about the ThinApp packages located at the network share location with Horizon Workspace. For a weekly interval, set the day and time of day at which the syncing occurs. For a daily interval, set the time. Select this option if you want to use account-based access. NOTE If your ThinApp package repository is a DFS network share, you must select this option. If you want the ability for users to use their entitled ThinApp packages on non-domain-joined Windows systems, you must enable account-based access. Type the username for a user account that has read access to the network share. This information is used when Enable account based access is selected. Type the password associated with the Share User user account. A message appears stating that the values are saved, and a summary of the last sync status is displayed. 3 Sync the ThinApp packages with your Horizon Workspace system by clicking Sync Now. The time it takes to complete the sync process depends on the number of ThinApp packages. When the sync process is done, a list of the ThinApp packages that were synced appears. Your Horizon Workspace system is configured so that you can entitle groups and users to ThinApp packages, and those users can run their entitled ThinApp packages using the Horizon Workspace client installed on their Windows systems. You can use the Dashboard page in the Administrator Web interface to verify that the ThinApp Packages module is enabled and displays the number of ThinApp packages in your catalog. What to do next Entitle groups and users to ThinApp packages. See the Horizon Workspace Administrator's Guide. 56 VMware, Inc.
57 Chapter 3 Configuration for Horizon Workspace Virtual Machines Change the ThinApp Packages Share Folder After you configure Horizon Workspace access to your ThinApp packages, your IT environment might change such that your ThinApp packages are in a new location. When this situation occurs, use the ThinApp Packages page in the Connector Web interface to update the path to the new location. Prerequisites Verify that the new network share location adheres to the network share requirements as described in Horizon Workspace Requirements for ThinApp Packages and the Network Share Repository, on page Log in to the Connector Web interface. 2 Select the Packaged Apps - ThinApp tab. 3 Change the value in the Path text box to the new shared folder where the ThinApp packages are located, in the UNC path format. 4 (Optional) If the previous network share was a CIFS share and the new share is a DFS share, select the Enable account based access check box and enter the name and password of a user who has read access to that network share. 5 Click Save. Integrating Horizon Workspace with Citrix-based Applications Horizon Workspace supports Citrix-based applications. You can use Horizon Workspace to seamlessly integrate with existing Citrix deployments. Horizon Workspace also supports applications, such as View, ThinApp, SAAS, and so on. You can see more details about Horizon Workspace and Citrix farm synchronization in the Horizon Workspace and Citrix Farm Synchronization diagram. Horizon Workspace does not overwrite the settings in Citrix-based applications. Instead, it copies the information from the Citrix farm and reuses it in Horizon Workspace. VMware, Inc. 57
58 Installing and Configuring Horizon Workspace Figure 3 1. Horizon Workspace and Citrix Farm Synchronization Horizon Workspace Connector (connector-va) REST call GetResources()/GetEntitlements() based on scheduled sync frequency Horizon Workspace Integration Broker (REST svc) REST call ManageResources()/ ManageEntitlements() based on scheduled sync frequency Citrix Powershell SDK API makes calls to Citrix farm Horizon Workspace Manager (service-va) Citrix farm or load balancer DMZ ICA file Citrix Receiver Application delivery Horizon Workspace provides support for the following functions: Synchronize applications from a Citrix farm to Horizon Workspace. Synchronize entitlements from a Citrix farm to Horizon Workspace entitlement store. Launch Citrix-based applications using SSO. Horizon Workspace uses the Integration Broker to deliver Citrix-based applications to the end user, including the following functions: Connector pushes Citrix farm information and publishes application information from the Citrix farm to the catalog based on configured synchronization. A Horizon Workspace tenant administrator can set the generic user settings template and the ICA launch template for all the resources in an organization. This template is saved as an organization artifact in the Horizon Workspace data store. Horizon Workspace tenant administrator can set the ICA launch template by resource in the Horizon Workspace catalog. This template is saved as part of the resource definition in the Horizon Workspace catalog. The Connector synchronizes the Citrix-based applications and entitlements from the Citrix farm to the Horizon Workspace entitlement store. Synchronization occurs based on the frequency set in the schedule. The Citrix farm is the single source of truth for all supported operations in Horizon Workspace. 58 VMware, Inc.
59 Chapter 3 Configuration for Horizon Workspace Virtual Machines Horizon Workspace uses the Citrix Receiver to launch Citrix-based applications. The end user must install the Citrix Receiver on their device. The Citrix ICA file launch mechanism determines the entitlements for Citrix-based applications. The Citrix Receiver delivers the Citrix-based applications to the end user. The administrator can create specialized template files for each Citrix-based application in the Administrator Web interface. Horizon Workspace also provides multi-device support. End users can launch a Citrix-based application, such as Textpad, from Horizon Workspace on a heterogeneous device, such as a laptop, mobile device, domain-joined desktop, or non-domain-joined desktop. The following table describes the administrator's task on the Citrix farm and the corresponding operation that results after a synchronization with Horizon Workspace. Table 3 6. Horizon Workspace and Citrix Farm Synchronization Action in the Citrix farm Publish a new application to the Citrix farm. Edit an application in the Citrix farm. Delete an application in the Citrix farm. Add an end user entitlement for an application in the Citrix farm. Remove an end user entitlement for an application in the Citrix farm. Result after sync with Horizon Workspace Connector creates the Citrix-based application in the Horizon Workspace catalog. Connector updates the Citrix-based application in the Horizon Workspace catalog. Connector deletes the entitlements associated with the Citrix-based application, and then Connector deletes the Citrix-based application from the catalog. Connector creates an entitlement in the Horizon Workspace entitlement store to associate with the Citrix-based application and domain identities. Connector creates an entitlement in the Horizon Workspace entitlement store to associate with the Citrix-based application and domain identities. Horizon Workspace does not require additional setup after an Horizon Workspace upgrade or a Citrix product upgrade to maintain the integration between Horizon Workspace and Citrix-based application support. To reinstall Citrix Receiver, see the Citrix documentation. Horizon Workspace uses the existing single sign-on (SSO) support from Citrix policies and Citrix Receiver. Whether from a Windows or a non-windows machine, end users can log in to a Citrix-based application using SSO from Horizon Workspace. Horizon Workspace uses its own Integration Broker component and a Citrix SDK to handle SSO from Horizon Workspace to Citrix-based applications. VMware, Inc. 59
60 Installing and Configuring Horizon Workspace Figure 3 2. SSO Between Horizon Workspace and Citrix Farm 2 3 HTTPS REST Call getloginsession (UserPrincipal) Integration Broker Web application XenApp Web Interface SDK 5.4 Web Interface SDK calls Citrix farm to generate login session IIS Horizon Workspace Manager (service-va) Windows 2008 hosting Integration Broker 5 Citrix farm or load balancer DMZ 1 Launch Citrix-based applications 4 ICA file Citrix Receiver 5 Application delivery Preparing and Installing Integration Broker Before you install Integration Broker, you must prepare your Horizon Workspace environment. You must verify that your software is installed and configured correctly. While you prepare your environment, consider the effect of the following functions on your environment: Citrix-based applications resource and entitlement synchronization automation happens asynchronously. Based on the scheduled synchronization frequency, the load on the Horizon Workspace server can increase. Resource and entitlement changes can also increase the load on the server. Launching a Citrix-based application resource on an end-user device is faster when Citrix Receiver is running. ICA file preparation does not affect performance because it is not computational or memory intensive. All other operations affect performance in a way that is similar to existing resource types. IMPORTANT Horizon Workspace 1.8 does not install or require installation of any VMware software on Citrix servers. 60 VMware, Inc.
61 Chapter 3 Configuration for Horizon Workspace Virtual Machines Prepare Integration Broker Server for Windows Server 2008 or Windows Server 2012 Before you install Integration Broker, you must prepare your Horizon Workspace environment and verify that your software is installed and configured correctly. Prerequisites Verify that Windows Server 2008 R2 or Windows Server 2012 are installed with the latest updates. To check for updates, select Control Panel > Windows Update. Install.NET Framework 3.5. When you install.net, it installs version 3.5 as a feature. Verify that you include WCF activation. From the Add Role Service pane, install IIS 7 with 6.0 Management Compatibility Mode. You must also install the Management Tools if this is your only IIS 7 instance. Configure IIS 7 for Windows Server 2008 or IIS 8 for Windows Server Configure an application pool. You can use the default application pool or create an application pool that is dedicated to Integration Broker. NOTE See the VMware Product Interoperability Matrixes at to verify version information. 1 Configure the Integration Broker using the default application pool. a b Click the default application pool. Verify these requirements..net framework version 2.0 Set 32-bit applications to true. 2 Configure Identity to use the same account as the Citrix published applications administrator. Integration Broker uses this account to authenticate. a b c d Right-click the application pool. Click Identity in the Advanced Settings dialog. Click Custom Account and click Set. Type the credentials for the Citrix published applications administrator username and password, Domain Name username and Domain Name password. 3 Download and install Microsoft Visual J# 2.0 Redistributable Package - Second Edition. NOTE Depending on your operating system, you might need to download either the 32-bit or 64-bit version of Microsoft Visual J#. 4 Download and install Citrix PowerShell SDK 6.5 from the Citrix Web site. a Check the Update the execution policy (to All Signed) check box to change the script execution policy. 5 If the Citrix XenApp Farm's execution policy is configured to use remote sign on, you must add your root certificate to the Trusted Root Certification Authorities store. See the Microsoft Web site about adding root certificates to the store. VMware, Inc. 61
62 Installing and Configuring Horizon Workspace 6 If the Citrix XenApp Farm's execution policy is configured to unrestricted, you do not need to add root CAs to the Trusted Root Certification Authorities store. 7 Verify that PowerShell SDK is successfully installed. a b Launch PowerShell SDK as administrator. Run the Get command. Get-XAApplication -ComputerName CITRIX SERVER NAME c Verify that the list includes all the applications hosted by Citrix. What to do next Deploy and configure Integration Broker. Deploying Integration Broker To deploy Integration Broker, you must run the Integration Broker installation and set up a secure channel between Integration Broker and the Citirx server farm. ATTENTION It is recommended that you install only one instance of Integration Broker per Windows Server instance. Install Integration Broker Horizon Workspace uses the Horizon Workspace Integration Broker component and the Citrix SDK to handle single sign-on between Horizon Workspace, Citrix server farms, and Citrix-based applications. Prerequisites Install Citrix PowerShell remoting. See the Citrix documentation for more information. 1 Log in as a Windows administrator. 2 Open the IB.msi file to run the Integration Broker installation. 3 Type the Web location where you want to install the Integration Broker. 4 (Optional) If you created a separate pool for the Integration Broker, select your application pool. CAUTION Do not change the Virtual Directory name. 5 Click Next to finish installing Integration Broker. What to do next Enable communication between Horizon Workspace and your Citrix server farm. Set Up Integration Broker for HTTP and HTTPS Bindings Citrix PowerShell Remoting requires a secure HTTPS channel to make remote calls. Without a secure HTTPS channel, you cannot enable remote invocations between Integration Broker and Citrix server farm. A self-signed certificate is required to use the IIS Server. You can purchase a certificate from a third-party root CA. You can also use an Apple Mac to generate a self-signed certificate. OpenSSL is installed by default. OpenSSL is an open source implementation of the SSL and TLS protocols. 62 VMware, Inc.
63 Chapter 3 Configuration for Horizon Workspace Virtual Machines When you set up Integration Broker, use the settings appropriate for your environment. IMPORTANT This procedure shows sample instructions for creating a self-signed certificate. Prerequisites Mark the certificate key exportable. See the Microsoft documentation for more information on certificate keys. 1 Create a self-signed certificate for the IIS server. 2 Create the ibcerts folder to use as the working directory. 3 Create a configuration file using the vi openssl_ext.conf command. a Copy and paste the following OpenSSL commands into the configuration file. # openssl x509 extfile params extensions = extend [req] # openssl req params prompt = no distinguished_name = dn-param [dn-param] # DN fields C = US ST = CA O = VMware (Dummy Cert) OU = Horizon Workspace (Dummy Cert) CN = hostname (Virtual machine hostname where the Integration Broker is installed. ) address = PROTECTED [extend] # openssl extensions subjectkeyidentifier = hash authoritykeyidentifier = keyid:always keyusage = digitalsignature,keyencipherment extendedkeyusage=serverauth,clientauth [policy] # certificate policy extension data NOTE Type the CN value before you save the file. b Run this command to generate a private key. openssl genrsa -des3 -out server.key 1024 c d Type the passphrase for server.key, for example, vmware. Type the passphrase for server.key.orig, for example, vmware. mv server.key server.key.orig e Remove the password associated with the key. openssl rsa -in server.key.orig -out server.key 4 Create a CSR (certificate signing request) with the generate key. The server.csr is stored in your working directory. openssl req -new -key server.key -out server.csr -config./openssl_ext.conf 5 Sign the CSR. openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt -extfile openssl_ext.conf VMware, Inc. 63
64 Installing and Configuring Horizon Workspace The expected output displays. Signature ok subject=/c=us/st=ca/o=vmware (Dummy Cert)/OU=Horizon Workspace (Dummy Cert)/CN=w2-hwdog-xa.vmware.com/ Address= PROTECTED Getting Private key 6 Create P12 format. openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12 a Press Enter at the prompt for an export password. IMPORTANT Do not enter a password. The expected output is server.p12 file. b c d e f Move the server.p12 file to the Windows machine where Integration Broker is installed. From the Command Prompt, type mmc. Click File > Add or Remove Snap-ins. In the Snap-in window, click Certificates and click Add. Select the Computer account radio button. 7 Import the certificate into the root and personal store certificates. a b c d e Choose All Files in the dialog. Select the server.p12 file. Click the Exportable check box. Leave the password blank. Accept the defaults for the subsequent steps. 8 Copy the certificate into the Trusted Root CAs in the same mmc console. 9 Verify that the content of the certificate includes these elements. Private key CN in the subject attribute that matches the Integration Broker Host Name Extended key usage attribute with both client and server authentication enabled 10 Add HTTPS binding to the Integration Broker Web site. a b c d Click Start > Run. Open inetmgr and right-click on the default Web site. Click Edit Bindings. Add the HTTPS binding using the newly created self-signed certificate in the drop-down menu. 11 Download the Citrix Web Interface SDK 5.4 (WISDK zip file) from the Citrix Web site. 12 After the installation is finished, unzip the wisdk.zip file. 13 Copy the contents from the WI5_4_0_SDK/zipfiles/sdkdemo/wisdk directory to the default bin directory at c:\inetpub\wwwroot\ib\bin. 14 Restart IIS. 64 VMware, Inc.
65 Chapter 3 Configuration for Horizon Workspace Virtual Machines 15 Type /IB/API/RestServiceImpl.svc/ibhealthcheck to verify that the Integration Broker Web application is running. The expected output displays. All ok Enabling Citrix PowerShell Remoting on Citrix Server Farm You must enable remote invocations between the Integration Broker and the Citrix farm. Citrix PowerShell Remoting requires a secure HTTPS channel to make remote calls. To enable this function, you must install a valid certificate from a certification authority. Set Up Citrix PowerShell Remoting on Citrix Server Farm 6.5 You must enable Citrix PowerShell remoting on every machine where you want to receive connections. Citrix PowerShell remoting enables connections between Integration Broker and the Citrix server farm. Prerequisites Verify that the instructions you use to set up Citrix PowerShell Remoting match the version of the Citrix server farm you use. Configure the Citrix server farm host on the Horizon Workspace Connector. 1 Install an SSL server certificate on each Citrix server farm host. For information about how to install an SSL server certificate, see the Microsoft documentation. 2 Click Properties and verify that Server Authentication is enabled for the certificate. 3 Enable Citrix PowerShell Remoting. a b c Open Citrix PowerShell Module > Program Files. Type the set-executionpolicy remotesigned command. Type the Import-Module command. Import-Module C:\Program Files\Citrix\PowerShell Modules\Citrix.XenApp.Commands.Remoting\Enable-XAPSRemoting.ps1 If the Citrix PowerShell modules are not installed in the default location, replace the default path with the path that is used in your environment. d Type the Enable-XAPSRemoting command. What to do next After you configure Citrix PowerShell Remoting, continue installing Integration Broker, Integration Broker Server, and Citrix-based application support. Set Up Citrix PowerShell Remoting on Citrix Server Farm 5.0 or 6.0 You must enable Citrix PowerShell remoting on every Citrix server farm where you want to receive connections. Citrix PowerShell remoting enables connections between Integration Broker and the Citrix server farm. Prerequisites Verify that the instructions you use to set up Citrix PowerShell Remoting match the version of the Citrix server farm that you use. Configure the Citrix server farm host on the Horizon Workspace Connector. VMware, Inc. 65
66 Installing and Configuring Horizon Workspace Download and install Winrm from the Microsoft Web site. 1 Install an SSL server certificate on each Citrix server farm host. 2 Open the PowerShell console in the administrator mode. 3 Type the Get-Service command to verify that Winrm is installed on the server. Winrm is installed with Windows 7, Windows 2008 R2, and later. NOTE See the VMware Product Interoperability Matrixes at to verify version information. 4 Type the Enable-PSRemoting command. This command enables PowerShell Remoting on the server. 5 Install the Citrix PowerShell SDK 5.0 or 6.0 depending on the Citrix server version. 6 Enable winrm HTTPS listener from the command prompt. a b c Create a certificate on the server. Record the certificate's thumb print. Verify that the certificate's thumb print is configured. winrm quickconfig -transport:https 7 Create the listener. winrm create FQDN";CertificateThumbprint="certificate thumbprint"} 8 Verify that the listener was created. winrm e winrm/config/listener This server is ready to use. What to do next After you configure Citrix PowerShell remoting, configure Citrix-based application support. Synchronizing Horizon Workspace Connector with Integration Broker When you enable Citrix-based application support, you establish communication and schedule the synchronization frequency between Horizon Workspace and the Citrix server farm. Prerequisites Configure the network, SSL, and vcenter extension. See Configure Basic Horizon Workspace Settings, on page 18. Review Citrix documentation for Citrix server 5.0, 6.0, and 6.5 at the Citrix Web site. Set up dedicated Sync and SSO Integration Brokers to distribute the load in a large-scale enterprise deployment. 1 Log in to the Connector Administrator Web Interface at 2 Click Published Apps - Citrix in the left navigation pane. 66 VMware, Inc.
67 Chapter 3 Configuration for Horizon Workspace Virtual Machines 3 Select the Enable Citrix-based Applications check box. 4 Type the Sync Integration Broker host name and port number. 5 Click Use same as Sync Integration Broker button if you do not need to distribute heavy traffic. 6 Select the Use SSL check box. NOTE Do not select Use SSL for both the Sync Integration Broker and the SSO Integration Broker. 7 (Optional) Set up the SSO Integration Broker. a b Type the SSO Integration Broker host name and port number. Select the Use SSL check box. Do not select Use SSL for both the Sync Integration Broker and the SSO Integration Broker. c Add a server farm. Option Description Version 5.0, 6.0, or 6.5 Server name Servers (failover order) Transport type Port numbers Choose frequency Server name assigned in your environment. Organize the servers in failover order. Horizon Workspace respects this order during SSO and under failover conditions. HTTP, HTTPS, and SSL RELAY Port SSL, Relay Port Manually, Once per week, Once per day, or Every hour 8 Click Sync now. At times, when you synchronize Integration Broker with SSL, the synchronization can be slow depending on factors in your environment, such as network speed and traffic. NOTE The anonymous user group feature in the Citrix product is not supported with Horizon Workspace. The Sync now operation forces a synchronization between Horizon Workspace and Citrix-based applications. After the synchronization is complete, Citrix-based applications and corresponding entitlements are synchronized with Horizon Workspace. You can enable the Citrix-based application module during the basic configuration or on the Module Configuration page in the Configurator user interface. What to do next End users can now add Citrix-based applications to the Horizon Workspace launcher and launch Citrixbased applications. VMware, Inc. 67
68 Installing and Configuring Horizon Workspace Integrating VMware View To use View with Horizon Workspace, you must join the Active Directory domain and sync with the View Connection Server. Prerequisites Verify that VMware View is installed. For information about specific View versions that are supported by Horizon Workspace, see the VMware Product Interoperability Matrixes at Deploy and configure View to use the default port, 443. You can also use custom port numbers. Deploy and configure View pools and desktops with entitlements set for Active Directory users and groups. Ensure that you create the View pools as a user with administrator permissions on the root folder in View. If you give the user administrator permissions on a folder other than the root folder, Horizon Workspace will not recognize the SAML you configure in View or be able to query the View pools and entitlements. You cannot configure the pool in Horizon Workspace. Deploy and configure Horizon Workspace. Enable the UPN attribute on Horizon Workspace on the User Attributes page. Configure SAML authenticator on the View Connection Server. You must always use the Horizon Workspace FQDN on the Authenticator configuration page. Verify that you have a DNS entry and an IP address that uses reverse lookup for each View Connection Server in your View setup. Horizon Workspace requires reverse lookup for View Connection Servers, View Security server, and load balancer. If reverse lookup is not properly configured, the Horizon Workspace integration with View fails. Sync Active Directory users and groups with View Pool entitlements to Horizon Workspace. You can use the Horizon Workspace Setup wizard to sync users and groups, or go to the Directory tab in the configurator-va virtual machine. NOTE If you are using a third-party IdP and a Smart card or non-horizon Workspace authentication module, you must disable Enable SSO on the View Pools tab to enable authentication. Join an Active Directory Domain on page 68 To use View with Horizon Workspace, you must join the same Active Directory domain where the View Connection Server is joined. Sync View Pools on page 70 Each time you change information in View, such as add an entitlement, add a user, and so on, you must force a sync to propagate the changes to Horizon Workspace. Configure SAML Authentication on page 70 Ensure that you select the Enable SSO function on Horizon Workspace Connector Administrator Web interface. Join an Active Directory Domain To use View with Horizon Workspace, you must join the same Active Directory domain where the View Connection Server is joined. During the setup process, you will be prompted to enter information for Horizon Workspace to join the Active Directory domain. 68 VMware, Inc.
69 Chapter 3 Configuration for Horizon Workspace Virtual Machines Prerequisites Verify that UPN is enabled on the User Attribute Mapping tab. Verify that users and groups with View Pool entitlements assigned are synced using Directory sync. 1 In the Select Modules pane of the Horizon Workspace Setup wizard, click Enable this Module for View. 2 Type the domain information for Horizon Workspace and click Join Domain. Do not use non-ascii characters when you enter your domain name. Table 3 7. Active Directory Domain Information Join Domain AD FQDN AD User AD Password Description Type the fully qualified domain name of the Active Directory to join. IMPORTANT The Active Directory FQDN must be in the same domain as the View Connection Server. Otherwise, your deployment will fail. Type the username of the user in Active Directory that has the right to join the computer to the domain. Type the password associated with the username. This password is not stored by Horizon Workspace. IMPORTANT Each time you import the Connector's configuration you must rejoin the domain. 3 Type the domain information for View and click Sync to propagate your View information to Horizon Workspace. Table 3 8. View Information View Initial Connection Server Username Password Description Type the fully qualified domain name of the View Connection Server instance you want to sync with. Choose an account that has the Administrators or Administrators (Read only) role in View Administrator. Type the password associated with the Active Directory username. Follow these steps to set up View integration in a multidomain environment. a b c Verify that Horizon Workspace and the View servers are joined to the same domain. Verify that the Directory Server Host and the View servers are joined to the same domain. The Directory Server Host (defined on the Horizon Workspace Directory configuration page) must be an Active Directory host. Do not specify parent or sibling domain controller information. On the Horizon Workspace Directory configuration page, you must provide global catalog information to allow users in sub-domains and sibling domains to access Horizon Workspace and View desktops. What to do next Sync View with Horizon Workspace to propagate changes you make in View. VMware, Inc. 69
70 Installing and Configuring Horizon Workspace Sync View Pools Each time you change information in View, such as add an entitlement, add a user, and so on, you must force a sync to propagate the changes to Horizon Workspace. After you enable View in the Configurator Web interface, you must sync the View pools on the Connector Web interface. 1 Go to to open the Connector Web interface. 2 Enter the administrator password. 3 Click View Pools and click Sync Now. 4 Verify that you can synchronize View Pools and their entitlements from View Connection Server to Horizon Workspace. a Log in to Horizon Workspace Administrator Web interface. b c Click the Catalog tab. Select a View pool and check the Details and Entitlements tabs. If you make changes in View, you must sync with Horizon Workspace to propagate your changes. What to do next If you want to launch a View desktop from Horizon Workspace and use SSO, you must configure SAML authentication in the View server. Configure SAML Authentication Ensure that you select the Enable SSO function on Horizon Workspace Connector Administrator Web interface. Establish or Update SSL Trust between the Connector and the View Connection Server on page 71 Initially, you must accept an SSL certificate on the View Connection server to establish trust between the Connector and the View Connection server. If you change an SSL certificate on the View Connection server after the integration, you must return to the Connector and reestablish that trust. Enable Multiple View Client URLs Access to Custom Network Ranges on page 71 If your company uses multiple client access URLs for different network ranges, the administrator must edit the default network range so the end user connects to the correct View Client Access URL and port number. If these settings are not updated, the View client will not launch. Launch a View Pool on page 72 Users can launch a View pool from Horizon Workspace. Configure View Client to Use a Custom Port Number on page 72 On the Connector View Pools page, enter the port number of the View Connection server in the text boxes provided for the View Connection server in the broker list. Modify the View Integration Configuration on page 73 You can modify the View integration configuration in the Connector virtual machine. 70 VMware, Inc.
71 Chapter 3 Configuration for Horizon Workspace Virtual Machines 1 Log in to the View Administrator Web interface as a user with the Administrator role assigned. 2 Configure SAML authentication for each replicated server in your View infrastructure. IMPORTANT View and Horizon Workspace must be in time sync. If View and Horizon Workspace are not in time sync, when you try to launch View desktop, an invalid SAML message occurs. What to do next You must establish and maintain SSL Trust between the Connector and the View Connection Server. Establish or Update SSL Trust between the Connector and the View Connection Server Initially, you must accept an SSL certificate on the View Connection server to establish trust between the Connector and the View Connection server. If you change an SSL certificate on the View Connection server after the integration, you must return to the Connector and reestablish that trust. Prerequisites Verify that View has an SSL certificate installed. By default, View has a self-signed certificate. In View, change the certificate of the View Connection Server to a root-signed certificate. See the VMware View documentation for information about configuring a View Connection server instance or Security Server to use a new certificate. Configure SAML authentication on the View Connection server. You must always use the Horizon Workspace FQDN on the authenticator configuration page. NOTE If you use a third-party identity provider to access View desktops from Horizon Workspace, SAML authentication, on the View Connection server, must be set to required. 1 Log in to the Connector Administrator Web interface. 2 Open the View Pools page. 3 Click the Update SSL Cert link next to the Replicated Server Group. 4 Click Accept on the Certificate Information page. If the Horizon Workspace certificate changes after the initial configuration, you must accept the SAML Authenticator from View again. If the View certificate changes, you must accept the SSL certificate in Horizon Workspace. Enable Multiple View Client URLs Access to Custom Network Ranges If your company uses multiple client access URLs for different network ranges, the administrator must edit the default network range so the end user connects to the correct View Client Access URL and port number. If these settings are not updated, the View client will not launch. Prerequisites Install Horizon Workspace Log in to the Administrator Web interface. 2 Click the Settings tab. VMware, Inc. 71
72 Installing and Configuring Horizon Workspace 3 Click Network Ranges in the left navigation. 4 Click the Edit link by each network range. 5 Type in the View Client Access URL using your company's configuration. 6 Verify that each network range in your environment contains a View Client Access URL. IMPORTANT If you miss a network range, end users who launch through that network range might have problems. What to do next If necessary, you can modify the View integration configuration. Launch a View Pool Users can launch a View pool from Horizon Workspace. You can switch the display protocol between Open with View Client or Open with Browser by clicking Preferences from the drop-down. Prerequisites Install View Client. You must install View Client on the machine that launches Horizon Workspace. NOTE For information about specific View Client versions, see the VMware Product Interoperability Matrixes at 1 Log in to your Horizon Workspace instance. 2 Click the View Desktops icon. 3 Select your View pool. 4 Right-click the selected View pool and choose a protocol to launch the View desktop. What to do next If necessary, you can configure View on a custom port number. Configure View Client to Use a Custom Port Number On the Connector View Pools page, enter the port number of the View Connection server in the text boxes provided for the View Connection server in the broker list. Prerequisites Install Horizon Workspace Log on to the Horizon Workspace Administrator Web interface. 2 Click the View Pools tab 3 Update the port number for each network range in Connection Server. 4 Click Save. What to do next If necessary, modify the View integration configuration. 72 VMware, Inc.
73 Chapter 3 Configuration for Horizon Workspace Virtual Machines Modify the View Integration Configuration You can modify the View integration configuration in the Connector virtual machine. The following View integration configuration settings can be changed on the Connector virtual machine. Disable the association between Horizon Workspace and the View environment. Adjust the sync schedule and monitor your sync status. You can schedule automatic syncing for times that suit your environment, such as during off-peak hours. Re-accept an SSL certificate. You use the View Connection Server to entitle Horizon Workspace users to View Pools. 1 Log in to the Connector as the administrator user. 2 Click View Pools. 3 Update the View integration configuration settings and click Save. (Optional) Set Proxy Server Settings for Manager Horizon Workspace Manager virtual machines access the global catalog and other Web services on the Internet. If your network configuration provides Internet access through an HTTP proxy, you must adjust your proxy settings on the Manager (service-va) virtual machine. Enable your proxy to handle only Internet traffic. To ensure the proxy is set up correctly, set the parameter for internal traffic to no-proxy within the domain. 1 Log in as the root user to the Manager (service-va) virtual machine. See Configure Basic Horizon Workspace Settings, on page 18 for more information about the global root password. 2 Run the YaST utility from the service-va virtual machine's command line. 3 Select the Network Services tab and select the Proxy page. 4 Enter the correct proxy URL in the HTTP field. 5 Enter the correct proxy URL in the HTTPS field. 6 Restart tcserver on the service-va virtual machine to use the new proxy settings. /etc/init.d/horizon-frontend restart IMPORTANT Repeat these steps on each service-va virtual machine in your vapp to configure the proxy. The global catalog and other Web services are now available to Horizon Workspace. VMware, Inc. 73
74 Installing and Configuring Horizon Workspace 74 VMware, Inc.
75 Advanced Configuration for 4 Horizon Workspace Virtual Machines After you complete the basic Horizon Workspace installation, you might need to complete other configuration tasks in the Configurator, such as configuring View, integrating ThinApp, or cloning virtual machines. Each component has multiple instances and custom functionality. Additionally, each virtual machine offers different features. The Horizon Workspace architecture diagram demonstrates what you can build using the various Horizon Workspace components. See Chapter 2, Installing Horizon Workspace, on page 7 for a typical deployment. Enabling External Access to Horizon Workspace on page 76 During deployment, the Horizon Workspace Setup wizard installs the Horizon Workspace vapp inside the internal network. If you want to provide access to Horizon Workspace for users connecting from outside networks, you must install a load balancer, such as Apache, nginx, F5, and so on. Configuring Redundancy/Failover for Horizon Workspace Virtual Machines on page 84 Horizon Workspace lets enterprises achieve failover and redundancy by adding multiple virtual machines of the same type in the Horizon Workspace vapp. For instance, you can add a second gateway-va virtual machine and enable the load balancer to redirect requests to both gateways. If one of the gateway-va virtual machines shuts down for any reason, Horizon Workspace will still be available. Update Horizon Workspace Settings with Configurator on page 97 After you configure Horizon Workspace, you can use the Configurator to update the current configuration and monitor system information for each virtual appliance. For some settings, you must use the Connector to perform specialized Connector configurations. Configuring SecurID for Horizon Workspace on page 98 When you configure RSA SecurID server, you must prepare the RSA SecurID server for the Connector and configure SecurID with the Connector Web interface. Configuring Kerberos for Horizon Workspace on page 100 When you configure Kerberos for Horizon Workspace, you must consider many different components. Configuring Kerberos for the Connector involves installation, and possibly configuration tasks. Using SSL Certificates in Horizon Workspace on page 104 SSL protects communications to Horizon Workspace and within it. During the Horizon Workspace Web interface initialization, the Configurator randomly generates a self-signed Horizon Workspace root CA certificate. VMware, Inc. 75
76 Installing and Configuring Horizon Workspace Adjusting Java Heap Size for Improved Performance on page 105 The Java heap size settings must be changed manually on the data-va and connector-va virtual machines if you add or remove memory. The service-va virtual machine automatically adjusts the settings. Enabling External Access to Horizon Workspace During deployment, the Horizon Workspace Setup wizard installs the Horizon Workspace vapp inside the internal network. If you want to provide access to Horizon Workspace for users connecting from outside networks, you must install a load balancer, such as Apache, nginx, F5, and so on. If you do not use a load balancer, you cannot expand the number of gateway-va virtual machines in the future. You might need to add more gateway-va virtual machines to provide redundancy and load balancing. Typically, if you have more than 2,000 users, you may need to add an additional gateway-va virtual machine. Additionally, if your deployment exceeds 2,000 users, you must also deploy the public service hostname and IP address with a load balancer. The following diagram shows the basic deployment architecture you can use to enable external access. Figure 4 1. External Gateway Proxy with Virtual Machine External users External Load Balancer Hostname: Horizon Workspace FQDN Example IP address: 64.x.y.z Port: Horizon Workspace port Must enable X-Forwarded-For headers. DMZ Firewall Internal users Port 443 Port 443 Internal Load Balancer Hostname: Horizon Workspace FQDN Example IP address: 10..x.y.z Port: Horizon Workspace port Must enable X-Forwarded-For headers. Horizon Workspace vapp Virtual Appliance Virtual Appliance Virtual Appliance Virtual Appliance Virtual Appliance gateway-va service-va connector-va configurator-va data-va gateway-va Hostname: gateway-va.company.com IP address: 10.a.b.c Port: VMware, Inc.
77 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines Specify Horizon Workspace FQDN during Deployment During deployment for the configurator-va virtual machine, you must enter the Horizon Workspace FQDN and Horizon Workspace port number. These values must point to the hostname that you want end users to access. The gateway-va virtual machine in the Horizon Workspace vapp always runs on port 443. You can use a different port number for the load balancer. If you use a different port number, you must specify it during deployment time. All the virtual machines in the Horizon Workspace vapp must be able to ping the Horizon Workspace FQDN. If one of the virtual machines cannot ping Horizon Workspace FQDN, the deployment process fails. Additionally, if the Horizon Workspace FQDN does not resolve to the gateway-va virtual machine, the configuration process in the Web interface fails. You can run the following commands to check your installation after the command line setup process is complete. curl kv curl kv See Establish SSL Trust between Horizon Workspace vapp and Load Balancer, on page 78. Using Configurator Web Interface to Complete Deployment You can complete the Horizon Workspace configuration process using the Configurator Web interface. X-Forwarded-For Headers You must enable X-Forwarded-For headers on your load balancer. Horizon Workspace identifies the source IP address in the X-Forwarded-For headers. Horizon Workspace determines which Connector to log in to based on this IP address. This determines the authentication method. See the documentation provided by your load balancer vendor for more information. Load Balancer Timeout For Horizon Workspace to function correctly, you must increase the load balancer request timeout from the default. The value is set in minutes. For Horizon Workspace, the recommended value is 30 minutes. If the timeout setting is too low, you might see this error, 502 error: The service is currently unavailable. Enabling Sticky Session on the Load Balancer to the Gateway Ensure that you enable sticky session on the load balancer to the gateway servers if your deployment uses multiple gateway servers. Sticky session improves Web interface performance. If sticky session is not enabled, some functions might fail. Establish SSL Trust between Horizon Workspace vapp and Load Balancer on page 78 By default, the Horizon Workspace Setup wizard configures the Horizon Workspace vapp with a selfsigned certificate. The Horizon Workspace Setup wizard enables HTTPS communication between the virtual machines and the vapp. Enable AUDIT Events via Proxy Server on page 78 Horizon Workspace audits various user events, such as login, logout, entitlement, and provisioning. The service-va virtual machine uses a Web application to audit the events. The Web application runs on /AUDIT endpoint. Horizon Workspace does not authenticate the /AUDIT endpoint application to maintain performance. For security purposes, the gateway-va virtual machine only permits virtual machines in the Horizon Workspace vapp to use the /AUDIT endpoint. VMware, Inc. 77
78 Installing and Configuring Horizon Workspace Configuring an External Database on page 79 The service-va virtual machine provides an internal PostgreSQL database for trial purposes only. It is recommended that you use an external database for production. If your production environment requires more than one service-va virtual machine for high availability and load balancing, you must use an external database. Establish SSL Trust between Horizon Workspace vapp and Load Balancer By default, the Horizon Workspace Setup wizard configures the Horizon Workspace vapp with a selfsigned certificate. The Horizon Workspace Setup wizard enables HTTPS communication between the virtual machines and the vapp. You must establish SSL trust between the load balancer and gateway-va virtual machine before you go to the Configurator Web interface for additional configuration. 1 Copy the root certificate from the gateway-va virtual machine at hostname/horizon_workspace_rootca.pem. 2 Paste the root certificate to the correct location on your load balancer. See the documentation provided by your load balancer vendor. 3 Run the following commands to check your installation. curl v Workspace FQDN:Horizon Workspace port/saas curl v Workspace FQDN:Horizon Workspace port/web What to do next Now, you can proceed to the Configurator to continue configuring your deployment Enable AUDIT Events via Proxy Server Horizon Workspace audits various user events, such as login, logout, entitlement, and provisioning. The service-va virtual machine uses a Web application to audit the events. The Web application runs on /AUDIT endpoint. Horizon Workspace does not authenticate the /AUDIT endpoint application to maintain performance. For security purposes, the gateway-va virtual machine only permits virtual machines in the Horizon Workspace vapp to use the /AUDIT endpoint. If there are network proxy servers between the load balancer and gateway, these restrictions might prevent /AUDIT from working correctly. 1 Verify that you can access the /AUDIT endpoint from the service-va virtual machine. a b Log in to the Horizon Workspace Administrator Web interface at Workspace FQDN:Horizon Workspace port/admin. Click Reports and click Audit Events. If no Audit Events appear in the table or you see an error, Audit Events are not working. 78 VMware, Inc.
79 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 2 Modify the gateway-va virtual machine to update the Real_IP to resolve the issue. a b Edit /opt/vmware/nginx/conf/nginx.conf. Add the set_real_ip_from IP of Load Balancer; line after the include gen/real_ip.conf; statement. The new line is the last in the sample. real_ip_header X-Forwarded-For; real_ip_recursive off; include gen/real_ip.conf; set_real_ip_from IP of Load Balancer; c Type /etc/rc.d/nginx restart to restart nginx. 3 (Optional) If the audits still do not work, you can turn off the IP-based checks. a b c d Edit /opt/vmware/nginx/conf/location-443.conf. Search for /AUDIT. Comment out # allow ;, # include gen/all.allow;, and # deny all;. Type /etc/rc.d/nginx restart to restart nginx. With the Audit function configured, you can use the audit information for tracking or troubleshooting. Configuring an External Database The service-va virtual machine provides an internal PostgreSQL database for trial purposes only. It is recommended that you use an external database for production. If your production environment requires more than one service-va virtual machine for high availability and load balancing, you must use an external database. You can configure an external database connection when you run the Horizon Workspace Setup wizard, or after you run the wizard, you can go to the Database Connections page in the Configurator. Your database administrator must prepare an empty, external, Oracle, or PostgreSQL database and schema before connecting to the database in Configurator. NOTE If you were using the internal trial database, Configurator automatically disables the internal database server when you connect to your external database server. Configure an Oracle Database on page 80 During the Oracle installation, you must specify certain Oracle configurations for optimum performance with Horizon Workspace. Configure a PostgreSQL Database on page 81 During the PostgreSQL installation, you must specify certain PostgreSQL configurations for optimum performance with Horizon Workspace. Use the Configurator to Configure Horizon Workspace to Use an External Database on page 83 After you run the Horizon Workspace Setup wizard, you can configure Horizon Workspace to use a different database. VMware, Inc. 79
80 Installing and Configuring Horizon Workspace Configure an Oracle Database During the Oracle installation, you must specify certain Oracle configurations for optimum performance with Horizon Workspace. Prerequisites Horizon Workspace requires Oracle quoted identifiers for the username and schema. Therefore, you must use double quotes when you create the Oracle saas username and schema. 1 Specify the following settings. a b c Select the General Purpose/Transaction Processing Database configuration option. Click Use Unicode > UTF8. Use National Character Set. 2 Connect to the Oracle database after the installation is finished. 3 Log in to the Oracle database as the sys user. 4 Increase the process connections. Each additional service-va virtual machine requires a minimum of 300 process connections to function with Horizon Workspace. For example, if your environment has two service-va virtual machines, run the alter command as sys or system user. a Increase the process connections using the alter command. alter system set processes=600 scope=spfile b Restart the database. 5 Create a database trigger that all vapp users can use. Table 4 1. Create Database Trigger SQL Sample SQL to Create a Database Trigger CREATE OR REPLACE TRIGGER CASE_INSENSITIVE_ONLOGON AFTER LOGON ON DATABASE DECLARE username VARCHAR2(30); BEGIN username:=sys_context('userenv','session_user'); IF username = 'saas' THEN execute immediate 'alter session set NLS_SORT=BINARY_CI'; execute immediate 'alter session set NLS_COMP=LINGUISTIC'; END IF; EXCEPTION WHEN OTHERS THEN NULL; END; 80 VMware, Inc.
81 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 6 Modify the tablespace definitions and run the Oracle commands to create a new user. Table 4 2. Create a New Oracle User Schema Sample SQL to Create a New User CREATE USER "saas" IDENTIFIED BY <password> DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP PROFILE DEFAULT ACCOUNT UNLOCK; GRANT RESOURCE TO "saas" ; GRANT CONNECT TO "saas" ; ALTER USER "saas" DEFAULT ROLE ALL; GRANT UNLIMITED TABLESPACE TO "saas"; If you use a clustered Oracle database, see the VMware documentation regarding RAC set up. Configure a PostgreSQL Database During the PostgreSQL installation, you must specify certain PostgreSQL configurations for optimum performance with Horizon Workspace. NOTE Horizon Workspace does not currently support generic PostgreSQL. Prerequisites Install and configure a supported version of VMware vfabric PostgreSQL as the external database server from one of the installation packages, such as OVA, OVF, or RPM, with the citext module installed. The citext module supports the CITEXT data type, a case insensitive text type. Verify that the VMware vfabric PostgreSQL version that you use is compatible with your version of Horizon Workspace. For information about supported VMware vfabric PostgreSQL versions, see the VMware Product Interoperability Matrixes at Install and configure the load balancing implementation. Verify that your environment meets these requirements: The database server you use is PostgreSQL. The database administrator username and password are available. You must enter a username and password to create a user with authorization to the saas schema. This user is required when you connect a service-va virtual machine instance to the database. NOTE The service-va virtual machine uses the database name saas. During the initialization process, it drops and recreates any existing database named saas. 1 Log in as the root user. 2 Edit the postgresql.conf.auto file. For example, the VMWare vfabric PostgreSQL database location is /var/vmware/vpostgres/current/pgdata/. 3 Increase the max_connections parameter. Each additional service-va virtual machine requires at least 300 connections to function properly with Horizon Workspace. VMware, Inc. 81
82 Installing and Configuring Horizon Workspace 4 Set the max_connections parameter value to 600 for the two service-va virtual machines. 5 Restart the database. 6 Add a new line to the postgresql.conf.auto file that includes the search_path='saas' parameter. 7 Modify the tablespace definitions to create a new PostgreSQL database schema. Table 4 3. Create a New Database Schema SQL Sample SQL to Create a New Database Schema CREATE ROLE horizon LOGIN PASSWORD yourpassword NOSUPERUSER INHERIT NOCREATEDB NOCREATEROLE NOREPLICATION; ALTER ROLE horizon SET search_path = saas; CREATE DATABASE saas WITH OWNER = postgres ENCODING = 'UTF8' TABLESPACE = pg_default CONNECTION LIMIT = -1; GRANT CONNECT, TEMPORARY ON DATABASE saas TO public; GRANT ALL ON DATABASE saas TO postgres; GRANT ALL ON DATABASE saas TO horizon; \connect saas; CREATE SCHEMA saas AUTHORIZATION horizon; CREATE EXTENSION citext SCHEMA saas; What to do next If you want to migrate data into this new, empty database schema, see Transfer Data from the Internal Database, on page 82. Transfer Data from the Internal Database If your deployment uses an internal database and you plan to switch to an external database, you can extract the existing data from the database and add it to a new external database. Prerequisites Prepare the external database server. See Configure a PostgreSQL Database, on page Log in as the root user. 2 Go to the /opt/vmware/vpostgres/current/bin directory. 3 Run the./pg_dump -U postgres -w --clean -f /tmp/db_dump.data saas command. 4 Copy the db_dump.data file to the newly prepared external database server. scp /tmp/db_dump.data 5 Log in as the root user on the external database server. 6 Go to the /opt/vmware/vpostgres/current/bin directory. 7 Run the db_dump.data command../psql -U postgres -w -d saas -f /tmp/db_dump.data You might see DROP and ALTER commands while the db_dump.data command runs. 82 VMware, Inc.
83 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines Use the Configurator to Configure Horizon Workspace to Use an External Database After you run the Horizon Workspace Setup wizard, you can configure Horizon Workspace to use a different database. You must point Horizon Workspace to an initialized, populated database. For example, you can use a database configured as the result of a successful run of the Horizon Workspace Setup wizard, a database from a backup, or an existing database from a recovered snapshot. Prerequisites Install and configure VMware vfabric PostgreSQL or Oracle Enterprise Edition as the external database server. For information on configuring a PostgreSQL database for Horizon Workspace, see Configure a PostgreSQL Database, on page 81. For information about specific Oracle versions that are supported by Horizon Workspace, see the VMware Product Interoperability Matrixes at Run the Configurator's virtual appliance interface to start the initial Horizon Workspace configuration. 1 Log in to Configurator. 2 Select External Database as the Database Type. 3 Enter information about the database connection. a Type the JDBC URL of the database server. PostgreSQL Oracle jdbc:postgresql://ip_address/saas?stringtype=unspecified jdbc:oracle:thin:@//ip_address:port/sid b Type the name of the user with read and write privileges to the database. PostgreSQL Oracle horizon saas c Type the password for the user you created when you configured your Oracle or PostgreSQL database. 4 Click Test Connection to verify and save the information. What to do next Finish changing the configuration settings in Horizon Workspace. VMware, Inc. 83
84 Installing and Configuring Horizon Workspace Configuring Redundancy/Failover for Horizon Workspace Virtual Machines Horizon Workspace lets enterprises achieve failover and redundancy by adding multiple virtual machines of the same type in the Horizon Workspace vapp. For instance, you can add a second gateway-va virtual machine and enable the load balancer to redirect requests to both gateways. If one of the gateway-va virtual machines shuts down for any reason, Horizon Workspace will still be available. In order to add a new virtual machine of any type, you must log in to the configurator-va virtual machine as root user and run the hznadmintool addvm --type=vmtype --ip=new VM IP address command. IMPORTANT The hznadmintool addvm --type= command must be executed only after both the command-line and Web interface configuration of Horizon Workspace vapp is completed successfully. The new virtual machine IP address must follow the same guidelines as the IP addresses for the base virtual machines. It must resolve to a valid hostname using forward and reverse DNS. This IP address must be set up using the same netmask, network gateway, and DNS server name used in the original IP pool to deploy the vapp. For data-va virtual machines, this command clones the data-va virtual machine from the datava-template virtual machine. For all other virtual machines, this command creates the new virtual machine by cloning a base snapshot of the original virtual machine of the same type. The base snapshot is captured for all virtual machines during the initial deployment. The command fails if the base snapshot does not exist. The Configurator virtual machine is a singleton. You cannot create multiple Configurator virtual machines. Create Multiple gateway-va Virtual Machines on page 84 Your enterprise can create multiple gateways of the same type to distribute traffic and eliminate potential downtime. Create Multiple service-va Virtual Machines on page 85 Your enterprise can create multiple service-va virtual machines of the same type to distribute traffic and eliminate potential downtime. Create Multiple connector-va Virtual Machines on page 87 Your enterprise can create multiple connector-va virtual machines of the same type to reduce traffic and eliminate potential downtime. Create Multiple data-va Virtual Machines on page 91 When a large number of users store and read files at the same time, the intense input/output processing can affect performance on the data-va virtual machine. You can add additional data-va virtual machines to balance the load. Create Multiple gateway-va Virtual Machines Your enterprise can create multiple gateways of the same type to distribute traffic and eliminate potential downtime. Adding multiple gateway virtual machines helps your enterprise: Improve availability to Horizon Workspace. Load balance requests to Horizon Workspace and decrease response time to the end user. Response time is especially important if multiple end users frequently upload and download files using the data functionality. 84 VMware, Inc.
85 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 1 Obtain an IP address that is resolvable using reverse DNS. This IP address must be set up using the same netmask, network gateway, and DNS server name that was used in the original IP pool to deploy the vapp. 2 Go to the configurator-va virtual machine and run the hznadmintool addvm --type=gateway --ip=new VM IP address command. 3 Add the new gateway to your load balancer so the requests are sent to both gateway virtual machines. What to do next You can configure your load balancer to route traffic to the new gateway-va virtual machine and add additional Connector, Service, or Data virtual machines. Add or Resize a Disk for Buffering Files The gateway-va virtual machine buffers client requests before sending them to the data-va virtual machine. Large files that are waiting to upload are temporarily stored on this disk. Depending on the upload size limit set for your environment, the space on the buffer disk can easily exceed the maximum limit. During the Horizon Workspace 1.8 installation, an additional disk is created and configured for the gateway-va virtual machine to use to buffer files waiting to upload. The Horizon Workspace 1.8 upgrade creates the configuration that points to an additional buffer disk on the gateway-va virtual machine. However, you can create the buffer disk only after the upgrade is complete. 1 Stop the gateway-va virtual machine. /etc/rc.d/nginx stop 2 (Optional) To increase or decrease the disk size allotted to the buffer, delete the disk. 3 Create a new disk. 4 Remove the existing sub-directories: proxy_temp and client_body_temp. 5 Mount the disk at /opt/vmware/nginx/buffer. 6 Start the gateway-va virtual machine. /etc/rc.d/nginx start What to do next When the gateway-va virtual machine buffers large files, the end user's performance is not usually affected. If large files do affect performance, increase the disk space allotted to the buffer. Create Multiple service-va Virtual Machines Your enterprise can create multiple service-va virtual machines of the same type to distribute traffic and eliminate potential downtime. Using multiple service-va virtual machines improves availability to Horizon Workspace, load balances requests to Horizon Workspace, and decreases response times to the end user. Prerequisites You can only add additional service-va virtual machines if you use an external database. VMware, Inc. 85
86 Installing and Configuring Horizon Workspace 1 Log in to configurator-va virtual machine as the root user. 2 Obtain an IP address that is resolvable using reverse DNS. You must set this IP address using the same netmask, network gateway, and DNS server name used in the original IP pool to deploy the vapp. 3 Go to the configurator-va virtual machine and run the hznadmintool command. hznadmintool addvm --type=application_manager --ip=new VM IP address 4 Go to the Configurator Web interface at and open the System Information page. The new service-va virtual machine is now in maintenance mode. When a virtual machine is in maintenance mode, the gateway-va virtual machine does not see it or route requests to it. Verify that the virtual machine was added correctly by checking the IP address. 5 Configure the IP table rules for multiple service-va virtual machines to enable clustered audit event reports. a Edit the iptables configuration file. vi/usr/local/horizon/conf/iptables.cfg b Change the following configuration parameters. Table 4 4. Configuration Parameters Original Parameter APPLICATION_MANAGER_tcp_vapp=" " APPLICATION_MANAGER_udp_vapp="" New Parameter APPLICATION_MANAGER_tcp_vapp=" :9400" APPLICATION_MANAGER_udp_vapp="54328" c Run the updateiptables.hzn script. /usr/local/horizon/lib/menu/updateiptables.hzn 6 Run the following commands on the new service-va virtual machine, as well as, the existing service-va virtual machines to establish communication and record audit events. Table 4 5. Multiple service-va Virtual Machines Communication Commands Action Run these commands on all existing service-va virtual machines. Run these commands on newly added service-va virtual machines. Restart the elastic server on all existing service-va virtual machines. Commands service elasticsearch stop hznadmintool configureelasticsearch -ES_MULTICAST_ENABLED true service rabbitmq-server stop service elasticsearch stop rm -rf /db/rabbitmq/data/* rm -rf /db/elasticsearch/* service rabbitmq-server start rabbitmqctl stop_app rabbitmqctl force_reset rabbitmqctl start_app hznadmintool configureelasticsearch -ES_MULTICAST_ENABLED true service elasticsearch start 86 VMware, Inc.
87 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines Table 4 5. Multiple service-va Virtual Machines Communication Commands (Continued) Action Verify the status by running the following command on the service-va. Commands curl -XGET ' Find the output. "number_of_nodes" : 2, The number of nodes and the number of service-va virtual machines must match. If the number of nodes equals 1, verify that the parameter value in the /etc/sysconfig/elasticsearch configuration file equals true. 7 Go to the Configurator Web interface at and click Exit Maintenance Mode. The Configurator updates all the gateway-va virtual machines and starts sending requests to the new service-va virtual machine as well. In the future, if you want to stop routing requests to a service-va virtual machine, go to the Configurator Web interface and return the virtual machine to maintenance mode. What to do next You can add additional connector or data virtual machines. Create Multiple connector-va Virtual Machines Your enterprise can create multiple connector-va virtual machines of the same type to reduce traffic and eliminate potential downtime. Using multiple connector-va virtual machines helps your enterprise: Improve load balancing, failover, and availability to the Horizon Workspace authentication functionality. You can authenticate end users to Horizon Workspace using multiple methods of authentication, such as Active Directory username and password, username and RSA SecurID passcode, or Kerberos-based Windows authentication. To enable multiple forms of authentication, you must set up multiple connector-va virtual machines. During the initial set up of Horizon Workspace 1.8, you establish a connection between Horizon Workspace and an Active Directory instance that is a single or multiple domain environment in a single forest. If your environment uses multiple forests and you plan to connect to Active Directory in a multi-forest environment, you must create a new connector-va virtual machine to connect with each forest. You configure your multi-forest environment after the initial set up, or later, after testing is complete. See the list below for more information: To establish a connection between a multi-forest Active Directory and Horizon Workspace, see Configuring Horizon Workspace in a Multi-forest Active Directory Environment, on page 42. For information about the global catalog and multiple domains in a single Active Directory forest, see Configuring a Multidomain Active Directory Single Forest, on page 44. VMware, Inc. 87
88 Installing and Configuring Horizon Workspace Figure 4 2. Multiple Connector Deployment with Various Authentication Types External proxy server load balances the gateway servers Hostname: horizon-workspace.company.com DMZ Firewall Virtual Appliance Virtual Appliance Internal proxy server load balances connector-va-3 gateway-va connector-va Hostname: horizon-conn-vip.company.com Virtual Appliance Virtual Appliance Virtual Appliance Virtual Appliance gateway-va-2 connector-va-2 data-va configurator-va Virtual Appliance Virtual Appliance connector-va-3 Virtual Appliance connector-va: usegatewayasidp=yes IDP Url: horizonworkspace.company.com Authentication: SecurID connector-va-2: usegatewayasidp=yes IDP Url: horizonworkspace.company.com Authentication: SecurID Cluster service-va Virtual Appliance connector-va-4 Virtual Appliance connector-va-3: usegatewayasidp=no IDP Url: horizon-conn-vip.company.com Authentication: Username/Password service-va-2 connector-va-5 connector-va-4: usegatewayasidp=no IDP Url: horizon-conn-vip.company.com Authentication: Username/Password Cluster connector-va-5: usegatewayasidp=no IDP Url: connector-va-5 hostname Authentication: Kerberos Horizon Workspace Authentication Horizon Workspace authentication flow posts SAML authentication requests to the IdP URL. The Horizon Workspace authentication flow follows a specific sequence to post SAML authentication requests to the IDP URL. The IDP URL can be one of the following: Connector hostname Load balancer server that load balances the requests among multiple connectors. When you use a load balancer server this way, the connectors it load balances must use the same type of authentication. Load balancing with Kerberos requires special URL rewriting configuration at the load balancer. Horizon Workspace FQDN redirects to the gateway and can also load balance the requests among multiple Connectors. The Connectors that are load balanced using this option must use the same type of authentication. 88 VMware, Inc.
89 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines Figure 4 3. Horizon Workspace Authentication Sequence browser/native client Horizon Workspace FQDN gateway-va service-va IdP URL connector-va get/web get/web redirect/auth redirect/auth get/auth get/auth get/auth SAML redirect* Forward SAML request** On successful authentication, SAML response. SAML response SAML response *The service-va checks the source IP, evaluates the identity provider list, and posts the SAML authentication request to the matching identity provider URL. ** If the IdP URL points to a load balancer, it forwards the request to one of the connectors in its list. Enable SecurID Authentication In many cases, enterprises enable RSA SecurID-based authentication for their end users who connect from external networks. You can enable RSA SecurID authentication with Horizon Workspace. NOTE If you use the Horizon Workspace FQDN as the IDP URL, you must set the usegatewayasidp flag to y. As a result, maintenance mode is turned on for the new connector-va virtual machine. When a virtual machine is in maintenance mode, the gateway-va virtual machine will not be aware of the virtual machine or route requests to it. 1 Obtain an IP address that is resolvable using reverse DNS and select an IDP URL. This IP address must be set up using the same netmask, network gateway, and DNS server name used in the original IP pool to deploy the vapp. 2 Go to the configurator-va virtual machine and run the hznadmintool addvm command. hznadmintool addvm --type=connector --ip=new VM IP address --usegatewayasidp=y -- directorypassword='ad BindDN password' The new connector is automatically activated and connected to Active Directory. Provide the password for the BindDN user that you used during initial configuration. 3 Go to the Configurator Web interface at a b c Click System Information. Find the new virtual machine you added. Click Exit Maintenance Mode. The Configurator updates all the gateway virtual machines and sends new requests to the new connector virtual machine. NOTE In the future, if you do not want requests routed to that connector-va virtual machine, return to the Configurator Web interface and put the virtual machine in maintenance mode. VMware, Inc. 89
90 Installing and Configuring Horizon Workspace 4 Go to the Connector you just created using the Web interface at a b c Log in using the administrator password. Click on SecurID. Click on Enable SecurID. 5 Go to the Manager Web interface at a b c d Click the Settings tab. Click Identity Providers. Edit the new Identity Provider. Edit the IP address list. What to do next To configure SecurID for end users who connect to the network from external networks, see Configuring SecurID for Horizon Workspace, on page 98. Enable a New Username and Password Enterprises can enable new user names and passwords for their end users who connect from internal Windows machines. 1 Go to the configurator-va virtual machine at hostname. 2 Run the hznadmintool addvm --type=connector --ip=new VM ip address --usegatewayasidp=y or n -- directorypassword='ad BindDN password' command. You must set the usegatewayasidp flag to y or n. If you use the Horizon Workspace FQDN as the IDP URL, set the usegatewayasidp flag to y. This flag turns on maintenance mode for the new connector-va virtual machine. When a virtual machine is in maintenance mode, the gateway-va virtual machine will not be aware of the virtual machine or route requests to it. If you set the usegatewayasidp flag to no, the new connector-va virtual machine starts in normal mode. The new connector-va virtual machine is automatically activated and connected to Active Directory. Provide the password for the BindDN user that you used during initial configuration. Enable Kerberos Authentication Enterprises can enable Kerberos authentication for their end users who connect from internal Windows machines. When you use Kerberos authentication, end users can log in to Horizon Workspace without typing a username and password. You can enable Kerberos authentication with Horizon Workspace. 1 Obtain an IP address that is resolvable using reverse DNS and select the IDP URL. This IP must be set up using the same netmask, network gateway, and DNS server name used in the original IP pool to deploy the vapp. 90 VMware, Inc.
91 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 2 Go to the configurator-va virtual machine at hostname. a Run the hznadmintool addvm command. hznadmintool addvm --type=connector --ip=new VM ip address --usegatewayasidp=n -- directorypassword='ad BindDN password' b Set the flag usegatewayasidp to n. The new connector is automatically activated and connected to Active Directory. Provide the password for the BindDN user that you used during initial configuration. 3 Go to Connector Web interface at connector-va hostname/hc/admin and log in with the administrator password. a b c Join the new connector to the domain. Click Windows Auth. Enable Windows Authentication. 4 Go to Service Web interface at workspace FQDN/admin. a b c d Click Settings tab. Click Identity Providers. Edit the new Identity Provider. Edit the IP address list. If you have View integrated with a multi-connector Horizon Workspace deployment, ensure that you enable and configure View Pools on every connector that supports View desktops. You cannot connect to your desktop from a connector without View Pools enabled. When you schedule a View Pool Sync operation from one of the connectors, this operation syncs the connectors with the View configuration. What to do next To enable Kerberos authentication for end users who connect to the network using internal Windows machines, see Configuring Kerberos for Horizon Workspace, on page 100. Create Multiple data-va Virtual Machines When a large number of users store and read files at the same time, the intense input/output processing can affect performance on the data-va virtual machine. You can add additional data-va virtual machines to balance the load. IMPORTANT It is recommended that each data-va virtual machine serve no more than 1,000 users. User accounts are provisioned to a specific data-va virtual machine that handles their file activity. The account s class of service (COS) determines the data-va virtual machine where the account is provisioned. If the host pool in the COS specifies only one data-va virtual machine, users entitled to that COS are provisioned on that data-va virtual machine. If the host pool in the COS specifies multiple data-va virtual machines, users are randomly provisioned to any of the data-va virtual machines in the list. When you add a new data-va virtual machine, the new data-va virtual machine automatically becomes available from the default COS host pool. The host pool for other classes of service that are created displays the new data-va virtual machine, but it is not enabled in that COS. To use a new data-va virtual machine in the other classes of service, the administrator must modify the COS and enable the data-va virtual machine. VMware, Inc. 91
92 Installing and Configuring Horizon Workspace When you add an additional virtual machine for either the data-va or connector-va virtual machines, you must use a base snapshot. A base snapshot is taken automatically after deployment. IMPORTANT The first data-va virtual machine in the Horizon Workspace configuration is the master node. This node contains the metadata for the data-va virtual machine user accounts. If you create additional datava virtual machines, these data-va virtual machines are file stores only. When the master node is down, users cannot log in to their accounts. You can configure the host pool in the COS to use specific data-va virtual machines. In this way, you can manage where accounts are provisioned. For example, you add a second data-va virtual machine because disk space on the first data-va virtual machine is low. You do not want the first data-va virtual machine to be provisioned with any more new accounts once you have added the second node. From the Horizon Workspace Administrator Web interface, edit each COS to select the new data-va virtual machine in the Host Pool and deselect the other data-va virtual machine. When a user signs into access their Horizon Folder, the gateway-va virtual machine routes the request to the data-va virtual machine where they are provisioned. When a data-va virtual machine is down, users receive a 502 error. The user s authentication request is denied. In addition, when the data-va virtual machine is down, files shared from accounts on that machine cannot be accessed. Create a New data-va Virtual Machine on page 92 To maximize performance for Horizon Files service, you can add a new data-va virtual machine. Distribute External Guest Users on page 93 External guest users are given a COS called guest that is not visible from the Horizon Workspace Administrator Web interface. This COS determines the data-va virtual machine that guest users are provisioned on. Remove a data-va Virtual Machine Temporarily on page 94 To add storage or perform other maintenance on a specific data-va virtual machine, you can shut down the machine temporarily. No new accounts are provisioned on the data-va virtual machine while it is down. Add a data-va Virtual Machine Back into Rotation on page 95 When you finish with the maintenance on the data-va virtual machine, you can add it back to the rotation. Remove a data-va Virtual Machine Permanently on page 95 When a data-va virtual machine is damaged and no longer operational, you can move the users provisioned to that virtual machine to another data-va virtual machine before removing the data-va virtual machine. Set Up VMware High Availability Application Monitoring for the data-va Virtual Machine on page 96 Horizon Files provides a script that allows you to integrate with VMware High Availability (HA) Application Monitoring. This script sets up a heartbeat based on the status of the Horizon Files processes including the store and directory processes. Create a New data-va Virtual Machine To maximize performance for Horizon Files service, you can add a new data-va virtual machine. IMPORTANT It is recommended that each data-va virtual machine serve no more than 1,000 users. If your deployment includes multiple data-va virtual machines with 1,000 users each, you must configure all the other virtual machines using the requirements shown in the Recommended Virtual Machine Requirements table. See System and Network Configuration Requirements, on page 9 for more information. 92 VMware, Inc.
93 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 1 Obtain an IP address that is resolvable using reverse DNS. You must set this IP address using the same netmask, network gateway, and DNS server name used in the IP pool to deploy the vapp. 2 Go to configurator-va and run the addvm command. hznadmintool addvm --type=data --ip=new VM IP address The new data-va virtual machine is now in maintenance mode. 3 Enable Preview functionality for the new data-va virtual machine. a b Log in to the new data-va virtual machine as the root user. Set the proxy information, if you use a proxy, to reach the Internet. export http_proxy=proxy url:port c Download and install LibreOffice by running /opt/zimbra/libexec/libreoffice-installer.sh. If you use Microsoft Windows Preview Server, run the zmlocalconfig command to configure the new data-va virtual machine to point to the Microsoft Windows Preview Server. IMPORTANT LibreOffice must be installed, even when Microsoft Windows Preview is installed. 4 Restart each existing data-va virtual machine after it is added. a Change to the Zimbra user after LibreOffice installation is complete. su - zimbra b Type zmmailboxdctl restart to apply the change to the data-va. 5 Go to each gateway-va and run the memcached restart command. /etc/rc.d/memcached restart 6 Go to the Configurator Web interface at hostname and open the System Information page. 7 Find the virtual machine you added on the System Information page and click Exit maintenance mode. The new data-va virtual machine is ready to use. What to do next Modify the COS host pools from the Administrator Web interface. See Horizon Workspace Administrator's Guide. Distribute External Guest Users External guest users are given a COS called guest that is not visible from the Horizon Workspace Administrator Web interface. This COS determines the data-va virtual machine that guest users are provisioned on. By default, all data-va virtual machines are enabled in the host pool on the guest COS. You must modify this COS to specify the data-va virtual machines to use. If you want guest users to be assigned to a specific data-va virtual machine or you want to change the machines that are enabled, modify the guest COS to enable the machine you want to use. 1 Log in to the new data-va virtual machine as the root user. VMware, Inc. 93
94 Installing and Configuring Horizon Workspace 2 Change to the Zimbra user. su - zimbra 3 Run the zmprov command on the ID of the data-va virtual machine you want to use. zmprov gs data-vahzndataid Horizon Workspace uses this ID format: 45c3e0ce bf7-9c92-334ab36f9f7b. 4 Find the names of the data-va virtual machine nodes that are in the guest COS host pool. If the guest COS has not been modified to add specific data-va virtual machines to the host pool, this command does not return a value. If you use the default value, all data-va virtual machines are enabled in the host pool. a Modify the guest COS host pool to add, remove, or replace a data-va node using one of the following commands. What to do next Add a data-va node to the host pool. zmprov mc guest +hzndatahostpool data-vaname.com ID Remove a data-va node from the host pool. zmprov mc guest -hzndatahostpool data-vaname.com ID Replace all data-va virtual machines in the host pool. zmprov mc guest hzndatahostpool data-vaname.com ID You can permanently remove the data-va virtual machine if there is a problem with it. Remove a data-va Virtual Machine Temporarily To add storage or perform other maintenance on a specific data-va virtual machine, you can shut down the machine temporarily. No new accounts are provisioned on the data-va virtual machine while it is down. While the data-va virtual machine is down, users provisioned to this virtual machine cannot access the Web Client interface. NOTE When a user signs into access their Horizon Folder, the gateway-va virtual machine routes the request to the data-va virtual machine where they are provisioned. When a data-va virtual machine is down, users receive a 502 error. The user s authentication request is denied. In addition, when the data-va virtual machine is down, files shared from accounts on that machine cannot be accessed. 1 Go to the Configurator Web interface at 2 Click the Enter maintenance mode link next to the data-va virtual machine you want to temporarily disable. 94 VMware, Inc.
95 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 3 Log in to the data-va virtual machine as root. a Change to the Zimbra user. su - zimbra b Remove the mailbox service. zmprov -l -hzndataserviceenabled mailbox NOTE The attribute hzndataserviceenabled is a multi-valued LDAP attribute. c Stop the Jetty process. What to do next zmmailboxdctl stop If you need to add a data-va virtual machine back into rotation, see Add a data-va Virtual Machine Back into Rotation, on page 95. Add a data-va Virtual Machine Back into Rotation When you finish with the maintenance on the data-va virtual machine, you can add it back to the rotation. After a data-va virtual machine returns to the rotation, you can provision users to it and users can access the Web Client interface. 1 Go to the Configurator Web interface at a b Log in to the data-va virtual machine as the root user. Change to the Zimbra user. su - zimbra c Add the mailbox service back. zmprov -l +hzndataserviceenabled mailbox d Start the Jetty process. zmmailboxdctl start 2 Return to the Configurator Web interface at 3 Click the Enter maintenance mode link next to the appropriate data-va virtual machine. What to do next If you need to remove a data-va virtual machine permanently, see Remove a data-va Virtual Machine Permanently, on page 95. Remove a data-va Virtual Machine Permanently When a data-va virtual machine is damaged and no longer operational, you can move the users provisioned to that virtual machine to another data-va virtual machine before removing the data-va virtual machine. 1 Log in to a data-va virtual machine as the root user. 2 Change to the Zimbra user. su - zimbra VMware, Inc. 95
96 Installing and Configuring Horizon Workspace 3 List user accounts on the server. zmprov -l gaa -s server 4 Type the following command for each account you want to move to another data-va virtual machine. zmmboxmove -a useraccount --from src--todest [sync] This sample command moves user1 from the data2 data-va virtual machine to data1 data-va virtual machine. When an account move finishes, a success or failure notice appears. zmmboxmove -a [email protected] -f data2.domain.com -t data1.domain.com sync 5 Restart each Horizon Workspace gateway-va virtual machine. a b Log in to the gateway-va virtual machine as the root user. Restart the memcached. /etc/rc.d/memcached restart 6 Log in to the destination data-va virtual machine. 7 Verify that you can access the user accounts before shutting down the old data-va virtual machine. 8 Delete the old data-va virtual machine from the metadata. zmprov ds server 9 Power the data-va virtual machine off. What to do next When you remove the data-va virtual machine permanently, if you want to restore it, you must re-add the server. See Create a New data-va Virtual Machine, on page 92. Set Up VMware High Availability Application Monitoring for the data-va Virtual Machine Horizon Files provides a script that allows you to integrate with VMware High Availability (HA) Application Monitoring. This script sets up a heartbeat based on the status of the Horizon Files processes including the store and directory processes. To configure an HA cluster, you must customize the virtual machine's monitoring status and default cluster settings, and enable the vmware-ha service on each data-va virtual machine. Prerequisites An HA cluster must be set up to include the Horizon Workspace data-va virtual machines in your inventory. 1 Open the cluster that includes the data-va virtual machines in the vsphere Client. 2 Right-click the cluster and click Edit Settings. 3 Select VM Monitoring in the Cluster Settings dialog box. 4 Select VM and Application Monitoring as the VM Monitoring type in the VM Monitoring Status section. 5 Select Custom in the Default Cluster Settings section. 6 Set the default heartbeat timeout to 200 seconds or greater. 96 VMware, Inc.
97 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 7 Enable the vmware-ha service for each data-va virtual machine. a Change to the Zimbra user. su zimbra b Enable HA application monitoring. zmprov ms zmhostname.com +hzndataserviceenabled=vmware-ha c Start HA application monitoring. /opt/zimbra/bin/zmhactl start VMware High Availability (HA) Application Monitoring is configured to work with Horizon Files. Update Horizon Workspace Settings with Configurator After you configure Horizon Workspace, you can use the Configurator to update the current configuration and monitor system information for each virtual appliance. For some settings, you must use the Connector to perform specialized Connector configurations. You can switch the configurator-va, service-va, connector-va, data-va, gateway-va, and datatemplate-va virtual machine to maintenance mode to monitor information about each virtual machine, and view the IP address, status, or relative drift of a virtual appliance. You can also update or change settings for your database, modules, FQDN and SSL certificates, and more on the following pages. System Information System Diagnostics Database Connection Setup Module Configuration Horizon Workspace FQDN and SSL Certificates X-Forwarded-For Header License Key Password Log File Locations Additional information is available about connecting to Active Directory, filtering users, and Horizon Workspace modules. 1 Go to 2 Log in to the Configurator with the administrator password. 3 Use the left navigation pane to select the page to view. What to do next Verify that the settings or updates you made are in effect. VMware, Inc. 97
98 Installing and Configuring Horizon Workspace Configuring SecurID for Horizon Workspace When you configure RSA SecurID server, you must prepare the RSA SecurID server for the Connector and configure SecurID with the Connector Web interface. After you deploy Horizon Workspace, you can configure SecurID to provide additional security. You must ensure your network is properly configured for your Horizon Workspace deployment. For SecurID specifically, you must ensure that the appropriate port is open to enable SecurID to authenticate users outside the enterprise network. After you run the Horizon Workspace Setup wizard, you have the information necessary to prepare the RSA SecurID server. After you prepare the RSA SecurID server for the Connector, you use the Connector Web interface to configure the SecurID page. Prepare the RSA SecurID Server for the Connector on page 98 If you want to provide RSA SecurID security, prepare the RSA SecurID server for the Connector. Configure SecurID with the Connector Web Interface on page 99 After you run the Horizon Workspace Setup wizard, you can configure the SecurID page. Prepare the RSA SecurID Server for the Connector If you want to provide RSA SecurID security, prepare the RSA SecurID server for the Connector. You must change the Connector-specific information necessary to configure the Connector with RSA SecurID. For detailed information about configuring the RSA SecurID server, see RSA documentation. IMPORTANT After you restart the RSA SecurID server, the system takes time to become operational. Wait time can vary, but expect from several minutes to half an hour of delay before the system can process authentication requests from the Connector. Prerequisites Verify that one of the following RSA Authentication Manager versions is installed and functioning on the enterprise network to allow communication with the Connector: 6.1.2, 7.1 SP2, or 7.1 SP3. Horizon Workspace uses AuthSDK_Java_v _03_11_03_16_51 (Agent API 8.1 SP1), which only supports the preceding versions of RSA Authentication Manager (the RSA SecurID server). See the VMware Product Interoperability Matrixes at to verify version information. For information about installing and configuring RSA Authentication Manager (RSA SecurID server), see RSA documentation. Install and configure the Connector. After you install the Connector and use the Configurator Web interface to run the setup wizard, you have the information necessary to prepare the RSA SecurID server. 1 On a supported version of the RSA SecurID server, add the Connector as an authentication agent. 98 VMware, Inc.
99 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 2 Type in the following Connector-related information when you add the Connector as an agent. Option Hostname IP address Alternate IP address Description The hostname of the Connector. The IP address of the Connector. If traffic from the Connector passes through a network address translation (NAT) device to reach the RSA SecurID server, enter the private IP address of the Connector. Be prepared to provide this information again in the Connector Web interface when you configure the SecurID page that is available on the Advanced tab. 3 Download the compressed configuration file and extract the sdconf.rec file. Be prepared to upload this file later with the Connector Web interface when you configure the SecurID page that is available on the Advanced tab. What to do next Using the Connector Web interface, configure the SecurID page that is available on the Advanced tab. Configure SecurID with the Connector Web Interface After you run the Horizon Workspace Setup wizard, you can configure the SecurID page. Prerequisites Verify that RSA Authentication Manager (the RSA SecurID server) is installed and properly configured. Download the compressed file from the RSA SecurID server and extract the server configuration file. See Prepare the RSA SecurID Server for the Connector, on page Click Advanced > SecurID to open the SecurID page. 2 Click the Enable SecurID check box. 3 Configure the SecurID page. Information used and files generated on the RSA SecurID server are required when you configure the SecurID page. See Prepare the RSA SecurID Server for the Connector, on page 98. Table 4 6. SecurID Configuration Settings Option Connector Address Agent IP Address Server Configuration Node Secret Action Enter the appropriate Connector IP address. The value you enter matches the value you used to configure the RSA SecurID Server when you added the Connector as an authentication agent. If your RSA SecurID server has a value assigned to the Alternate IP address prompt, enter that value as the Connector IP address. If no alternate IP address is assigned, enter the value assigned to the IP address prompt instead. Enter the value assigned to the IP address prompt in the RSA SecurID server. Upload the server configuration file. First, you must download the compressed file from the RSA Secure ID server and extract the server configuration file, which by default is named sdconf.rec. Leaving the node secret blank allows the node secret to autogenerate. It is recommended that you clear the node secret file on the RSA SecurID server and intentionally do not upload the node secret file to the Connector. Ensure that the node secret file on the RSA SecurID server and on the Connector always match. If you change the node secret at one location, change it respectively at the other location. For example, if you clear or generate the node secret on the RSA SecurID server, clear or upload the node secret file on the Connector as well. VMware, Inc. 99
100 Installing and Configuring Horizon Workspace 4 Save your SecurID settings. The connector-va virtual machine is configured to use RSA SecurID to authenticate users with Horizon Workspace. Configuring Kerberos for Horizon Workspace When you configure Kerberos for Horizon Workspace, you must consider many different components. Configuring Kerberos for the Connector involves installation, and possibly configuration tasks. Kerberos authentication provides another layer of security for your Horizon Workspace deployment. Active Directory Configuration You do not need to directly configure Active Directory to make Kerberos function with your Horizon Workspace deployment. Connector Installation After you install the Connector, you use the Connector Web interface to enable the Connector to use Kerberos authentication. To enable the Connector, you must first join the domain on the Join Domain page and then enable Windows Authentication on the Windows Authentication page. Configuring Join Domain You can configure the join domain functionality in the Connector on the Join Domain tab. You must enable join domain functionality to provide single sign-on to the Web interface using Windows authentication (Kerberos). The Active Directory information that you provide for the Join Domain page is for the user who has permission to join machines to the Active Directory domain. Table 4 7. Active Directory Information Option AD FQDN AD Username AD Password Join Domain/Leave Domain Description The text box for the fully qualified domain name of an Active Directory instance. The domain name you enter must be the same Windows domain where the Connector resides. The text box for the username associated with the user account that has permission to join machines to the Active Directory domain. The text box for the password associated with the user account that has permission to join machines to the Active Directory domain. The button to join and leave the domain. The wording on the button changes to and from Join Domain and Leave Domain depending on whether you last joined or left the domain. Enabling Windows Authentication You can enable Windows authentication (Kerberos) in the Connector on the Windows Auth tab. You must enable Windows authentication to allow the Kerberos protocol to secure interactions between users' browsers and Horizon Workspace. Prior to enabling Windows authentication on this page, you must join the Connector to the Active Directory domain on the Join Domain page. 100 VMware, Inc.
101 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines Table 4 8. Windows Authentication Information Option Enable Windows Authentication Description The check box to extend authentication interactions between users' browsers and Horizon Workspace. Kerberos Authentication Operating System Support Currently, interactions between a user's browser and Horizon Workspace are authenticated by Kerberos on the Windows operating systems only. Accessing Horizon Workspace from other operating systems does not take advantage of Kerberos authentication. Configuring your Browser The following browsers can support Horizon Workspace, on Windows only, during Kerberos authentication: Firefox, Internet Explorer, and Chrome. All the browsers require additional configuration. Configure Internet Explorer to Access the Web Interface on page 101 You must configure the Internet Explorer browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using Internet Explorer. Configure Firefox to Access the Web Interface on page 102 You must configure the Firefox browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using Firefox. Configure the Chrome Browser to Access the Web Interface on page 103 You must configure the Chrome browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using the Chrome browser. Configure Internet Explorer to Access the Web Interface You must configure the Internet Explorer browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using Internet Explorer. Kerberos authentication works in conjunction with Horizon Workspace on Windows operating systems. NOTE Do not implement these Kerberos-related steps on other operating systems. Prerequisites Configure the Internet Explorer browser, for each user, or provide users with the instructions, after you configure Kerberos. 1 Verify that you are logged into Windows as a user in the domain. 2 In Internet Explorer, enable automatic log on. a b c d Select Tools > Internet Options > Security. Click Custom level. Select Automatic login only in Intranet zone. Click OK. VMware, Inc. 101
102 Installing and Configuring Horizon Workspace 3 Verify that this instance of the Connector is part of the local intranet zone. a b Use Internet Explorer to access the Connector login URL at Locate the zone in the bottom right corner on the status bar of the browser window. If the zone is Local intranet, Internet Explorer configuration is complete. 4 If the zone is not Local intranet, add the Connector to the intranet zone. a b Select Tools > Internet Options > Security > Local intranet > Sites. Select Automatically detect intranet network. If this option was not selected, selecting it might be sufficient for adding the Connector to the intranet zone. c d (Optional) If you selected Automatically detect intranet network, click OK until all dialog boxes are closed. In the Local Intranet dialog box, click Advanced. A second dialog box named Local intranet appears. e Type the Connector URL in the Add this Web site to the zone text box. f Click Add > Close > OK. 5 Verify that Internet Explorer is allowed to pass the Windows authentication to the trusted site. a b In the Internet Options dialog box, click the Advanced tab. Select Enable Integrated Windows Authentication. This option takes effect only after you restart Internet Explorer. c Click OK. 6 Log in to the Connector Web interface at to check access. If Kerberos authentication is successful, the test URL goes to the Web interface. The Kerberos protocol secures all interactions between this Internet Explorer browser instance and Horizon Workspace. Now, users can use single sign-on access to Horizon Workspace. Configure Firefox to Access the Web Interface You must configure the Firefox browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using Firefox. Kerberos authentication works in conjunction with Horizon Workspace on Windows operating systems. NOTE Do not implement these Kerberos-related steps on other operating systems. Prerequisites Configure the Firefox browser, for each user, or provide users with the instructions, after you configure Kerberos. 1 In the URL text box of the Firefox browser, type about:config to access the advanced settings. 102 VMware, Inc.
103 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 2 Click I'll be careful, I promise!. 3 Double-click network.negotiate-auth.trusted-uris in the Preference Name column. 4 Type your Connector URL in the text box. 5 Click OK. 6 Double-click network.negotiate-auth.delegation-uris in the Preference Name column. 7 Type your Connector URL in the text box. 8 Click OK. 9 Test Kerberos functionality by using the Firefox browser to log in to the Connector at If the Kerberos authentication is successful, the test URL goes to the Web interface. The Kerberos protocol secures all interactions between this Firefox browser instance and Horizon Workspace. Now, users can use single sign-on access to Horizon Workspace. Configure the Chrome Browser to Access the Web Interface You must configure the Chrome browser if Kerberos is configured for your Horizon Workspace deployment and if you want to grant users access to the Web interface using the Chrome browser. Kerberos authentication works in conjunction with Horizon Workspace on Windows operating systems. NOTE Do not implement these Kerberos-related steps on other operating systems. Prerequisites Configure Kerberos. Since Chrome uses the Internet Explorer configuration to enable Kerberos authentication, you must configure Internet Explorer to allow Chrome to use the Internet Explorer configuration. See Google documentation for information about how to configure Chrome for Kerberos authentication. 1 Test Kerberos functionality by using the Chrome browser. 2 Log in to the Connector at Workspace FQDN. If Kerberos authentication is successful, the test URL connects with the Web interface. If all related Kerberos configurations are correct, the relative protocol (Kerberos) secures all interactions between this Chrome browser instance and Horizon Workspace. Users can use single sign-on access to Horizon Workspace. VMware, Inc. 103
104 Installing and Configuring Horizon Workspace Using SSL Certificates in Horizon Workspace SSL protects communications to Horizon Workspace and within it. During the Horizon Workspace Web interface initialization, the Configurator randomly generates a self-signed Horizon Workspace root CA certificate. The Horizon Workspace Setup wizard generates individual certificates for each virtual machine in the vapp and chains those certificates to the newly generated root CA. Horizon Workspace uses the hostname as the CN within the certificate for all machines except the Gateway. The Horizon Workspace Setup wizard uses the Horizon Workspace FQDN to generate the SSL certificate for the Gateway. Since the initial SSL certificates in the vapp do not chain to a publicly available root CA, the generated root CA must be distributed to establish trust between Horizon Workspace and its clients. The initial Horizon Workspace Setup wizard automatically distributes the root CA certificate to all virtual machines in the vapp to establish trust for intra-workspace communication. If you deploy Horizon Workspace with our generated SSL certificates, the Horizon Workspace root CA certificate must be available as a trusted CA for any client who accesses Horizon Workspace. The clients can include end user machines, load balancers, proxies, and so on. You can download the Horizon Workspace root CA from hostname/horizon_workspace_rootca.pem. You can use your own certificates with Horizon Workspace, even if you use CAs that were not included initially. Apply an SSL Certificate from a Major or Private Certificate Authority Some enterprises use certificates generated by their own company or other certificate authorities. These certificates have not been included in the trusted certificate authority list. All communication in the vapp is processed by the Horizon Workspace FQDN server. Horizon Workspace pre-loads the machines in the vapp to trust the major certificate vendors. As a result, if custom SSL certificates chain to one of the major certificate vendors or if you want to use a new private certificate, you can apply the new certificate by copying it to the load balancers, Gateway, or Connector. If Horizon Workspace FQDN points to a load balancer, the SSL certificate can only be applied to the load balancer. Since the load balancer communicates with the gateway-va virtual machine, you must copy the Horizon Workspace root CA certificate to the load balancer as a trusted root certificate. When you update your certificate, if you are using View integration, you must follow the steps in Establish or Update SSL Trust between the Connector and the View Connection Server, on page 71. When you use multiple load balancers, you must copy both your major and private certificates to all of them. If you do not use a load balancer, the Horizon Workspace FQDN points to the gateway-va virtual machine. In this case, you must apply the SSL certificate to the gateway-va virtual machine. 1 Apply the certificate to each of your load balancers. Refer to the documentation from your load balancer vendor. 2 Apply the certificate to the gateway-va virtual machine. a b c d Go to Configurator virtual machine at Log in and click SSL Certificate. Copy the complete certificate chain and private key. Ensure that the certificate includes the Horizon Workspace FQDN hostname in the CN. Save the SSL certificate. The Configurator copies the certificate to the gateway-va virtual machine. 104 VMware, Inc.
105 Chapter 4 Advanced Configuration for Horizon Workspace Virtual Machines 3 If your deployment uses external connectors that grant users access to the connector as an IDP URL either directly or through a load balancer, apply the certificate to the connector-va virtual machine. a b c d Go to Connector virtual machine at Log in and click SSL Certificate. Copy the complete certificate chain and private key. Ensure that the certificate includes the FQDN hostname for the connector-va virtual machine in the CN. Save the SSL certificate. The Configurator copies the certificate to the connector-va virtual machine. 4 Verify that users can log in successfully. Horizon Workspace will use the newly applied certificate. (Optional) Adjusting Java Heap Size for Improved Performance The Java heap size settings must be changed manually on the data-va and connector-va virtual machines if you add or remove memory. The service-va virtual machine automatically adjusts the settings. Update Java Heap Size on the data-va Virtual Machine on page 105 If you increase the capacity of the virtual machines, you must increase the Java heap size settings. As a best practice, you set the Java heap size to half the total memory allocated to the data-va virtual machine. Update Java Heap Size on the connector-va Virtual Machine on page 106 If you increase the capacity of the virtual machines, you must also increase the Java heap size settings. As a best practice, you set the Java heap size to include the total memory allocated to the connector-va virtual machine minus 1GB. The 1GB of memory is reserved for use by the system and the ThinApp repo server. Update Java Heap Size on the data-va Virtual Machine If you increase the capacity of the virtual machines, you must increase the Java heap size settings. As a best practice, you set the Java heap size to half the total memory allocated to the data-va virtual machine. The maximum value for the mailboxd_java_heap_size must be less than 10GB. 1 Open the data-va. 2 Log in as the root user. 3 Change to the Zimbra user. su - zimbra 4 Type zmlocalconfig -e mailboxd_java_heap_size to edit the heap size. 5 Type the new value to update the heap size setting. 6 Type zmcontrol restart to restart the server. VMware, Inc. 105
106 Installing and Configuring Horizon Workspace Update Java Heap Size on the connector-va Virtual Machine If you increase the capacity of the virtual machines, you must also increase the Java heap size settings. As a best practice, you set the Java heap size to include the total memory allocated to the connector-va virtual machine minus 1GB. The 1GB of memory is reserved for use by the system and the ThinApp repo server. The maximum value for the mailboxd_java_heap_size must be less than 10GB. 1 Open the connector-va. 2 Log in as a root user. 3 Modify the Xmx property in /opt/vmware/c2/c2instance/bin/setenv.sh. 4 Type the new value for the Java heap size. The new value must include all the memory allocated to the connector-va virtual machine minus 1GB. 106 VMware, Inc.
107 Index A Active Directory domain service forest 44 global catalog 44 groups 22 join 68 multi-forest 42 users 22, 24 add, storage 37 add desktop client applications to data-va virtual machines 32 add user, Demo User Store 46 add VM to rotation 95 adding client applications to data-va server 31 audience 5 AUDIT events 78 authentication 89, 90 automatic client application update directory 32 automatic update of clients 31 C checklist Active Directory Domain Controller 15 network information Configurator 15 Connector 15 Gateway 15 Horizon Files 15 IP Pools 15 Manager 15 Chrome 103 Citrix server 65 Citrix PowerShell Remoting 65 Citrix server farm 65 Citrix-based, applications 57 Citrix-based application support 66 client downloads directory 32 Configurator, settings 28, 97 configurator-va 18 configure data preview 39, 41 logging 27 SAML authentication 70 virtual machines 75 configure, view client 72 Connector 9 connector password 90 connector user name 90 connector-va 84, 87 create datava-template 36 D data 82 data preview 39 data-va 37, 84, 91, 92 delete extensions 20 demo user store 45 deployment checklists 15 preparation 14 disk buffer 85 distributing guest users 93 DNS 14 download OVA file 14 E enable 66, 71 external database, Configurator 83 external access 76 F failover 84, 85, 87, 91, 92 filter 25 Firefox 102 forward DNS 14 FQDN 26 G gateway-va 84 groups, assign users 48 H hardware ESX 9 Horizon Workspace 9 requirements 9 high availability application monitoring 96 Horizon Workspace Setup wizard 22 Horizon Workspace deploy 20, 21 VMware, Inc. 107
108 Installing and Configuring Horizon Workspace install 20, 21, 62 license key 15 HTTPS on IIS 62 I identity provider Connector 9 third-party 9 IdP URL 88 install 20, 21, 62 Integration Broker Integration Broker Server 62 Internet Explorer 101 J Java Heap Size connector-va 106 data-va 105 join, Active Directory Domain 68 K Kerberos 90, keystore file 32 L Linux SUSE 5 system administrator 5 load balancer 78 logging 27 M Microsoft Windows Preview 15, 40 modify, preview server 41 module 26 MTA 19 multi-forest 43 multiple virtual machines 84, 85, 87, 91, 92 N NAS 38 network configuration, requirements 9 network share, ThinApp packages 54 O oracle database 80 OVA file deploy 20, 21 install 20, 21, 62 overview, install 7 P port, 3268, PostgreSQL database 81 PowerShell Remoting 65 preview LibreOffice 39 Microsoft Windows 40 proxy server 78 proxy server settings 73 Q query 25 quiesce timeout 20 R redundancy 84, 85, 87, 91, 92 remove data-va permanently 95 data-va temporarily 94 reverse lookup 14 reverse DNS 14 RSA SecurID server 98 run, Configurator Virtual Appliance 18 S SAML authentication 70, 88 SecurID, configure 99 server components 5 service-va 84, 85 setup wizard, setup wizard 22 SMTP server 19 SMTP Server 15 SSHA encrypted password 47 SSL certificate, major certificate authority 104 SSL trust, update on View Connection Server 71 storage 37, 38 storage, adding 39 SUSE Linux 5 sync View pools 70 View Connection Server 68 syslog server 29 System Diagnostics 30 system and functional administrator Linux 5 Windows 5 T ThinApp, packages 49 ThinApp applications 50 ThinApp packages change share folder 57 configuring access to 54 network share repository VMware, Inc.
109 Index U URLs 30 user authentication 5 V vapp 78 vcenter credentials 15 extensions 20 password 29 vcenter Server, timeout 20 View 68 View pools configuration 73 sync 70 View desktop, start 72 virtual appliance, requirements 9 VMDK 37, 38 W Windows, system administrator 5 VMware, Inc. 109
110 Installing and Configuring Horizon Workspace 110 VMware, Inc.
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Installing and Configuring VMware Workspace Portal
Installing and Configuring VMware Workspace Portal Workspace Portal 2.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Installing and Configuring VMware Identity Manager
Installing and Configuring VMware Identity Manager VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
VMware Workspace Portal 2.1 Reviewer s Guide
Previously VMware Horizon Workspace WHITE PAPER Table of Contents.. Introduction... 4 What Is Workspace Portal?.... 5 Key Features.... 6 Architecture.... 9 Packaging and Licensing... 11 Proof-of-Concept
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
VMware Workspace Portal Reference Architecture
VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Deployment and Configuration Guide
vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
vrealize Air Compliance OVA Installation and Deployment Guide
vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
vcenter Chargeback User s Guide vcenter Chargeback 1.0 EN-000186-00
vcenter Chargeback 1.0 EN-000186-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
vsphere App HA Installation and Configuration Guide
vsphere App HA Installation and Configuration Guide VMware vsphere App HA 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Cloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
OnCommand Unified Manager 6.2
OnCommand Unified Manager 6.2 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER
How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Horizon and XenApp Components Comparison.... 4 Preparing for the Migration.... 5 Three Approaches
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
vcenter Operations Manager for Horizon Supplement
vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon 1.6 This document supports the version of each product listed and supports all subsequent versions until the document
OnCommand Unified Manager 6.3
OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Product Version 1.0 Document Version 1.0-B
VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Upgrading VMware Identity Manager Connector
Upgrading VMware Identity Manager Connector VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
OnCommand Performance Manager 2.0
OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Virtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
vrealize Infrastructure Navigator Installation and Configuration Guide
vrealize Infrastructure Navigator Installation and Configuration Guide vrealize Infrastructure Navigator 5.8.4 This document supports the version of each product listed and supports all subsequent versions
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
VMware vcenter Log Insight Administration Guide
VMware vcenter Log Insight Administration Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
VMware vrealize Operations for Horizon Installation
VMware vrealize Operations for Horizon Installation vrealize Operations for Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
vcenter Chargeback User s Guide
vcenter Chargeback 1.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Infrastructure Navigator Installation and Administration Guide
Infrastructure Navigator Installation and Administration Guide vcenter Infrastructure Navigator 2.0.0 This document supports the version of each product listed and supports all subsequent versions until
Installing and Configuring VMware vcenter Orchestrator
Installing and Configuring VMware vcenter Orchestrator vcenter Orchestrator 5.5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam
Cisco WebEx Meetings Server Administration Guide
First Published: October 21, 2012 Last Modified: October 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
VCCC Appliance VMware Server Installation Guide
VCCC Appliance VMware Server Installation Guide Content Preface... 4 System Requirements... 4 Installation Procedure... 4 CCC Virtual Machine Installation... 5 CCC Virtual Machine Management... 12 Resource
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02
Update 1 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
QuickStart Guide vcenter Server Heartbeat 5.5 Update 2
vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Managing Multi-Hypervisor Environments with vcenter Server
Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent
vcenter Operations Manager for Horizon View Installation
vcenter Operations Manager for Horizon View Installation vcenter Operations Manager for Horizon View 1.5 vcenter Operations Manager for Horizon View 1.5.1 This document supports the version of each product
Reconfiguration of VMware vcenter Update Manager
Reconfiguration of VMware vcenter Update Manager Update 1 vcenter Update Manager 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is
VMware vcenter Operations Manager for Horizon Supplement
VMware vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon 1.7 This document supports the version of each product listed and supports all subsequent versions until
Offline Data Transfer to VMWare vcloud Hybrid Service
Offline Data Transfer to VMWare vcloud Hybrid Service vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
VMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
vrealize Operations Manager vapp Deployment and Configuration Guide
vrealize Operations Manager vapp Deployment and Configuration Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until
vcenter CapacityIQ Installation Guide
vcenter CapacityIQ 1.5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Lifecycle Manager Installation and Configuration Guide
Lifecycle Manager Installation and Configuration Guide vcenter Lifecycle Manager 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is
VMware vrealize Operations for Horizon Installation
VMware vrealize Operations for Horizon Installation vrealize Operations for Horizon 6.3 This document supports the version of each product listed and supports all subsequent versions until the document
Polycom RealPresence Resource Manager System, Virtual Edition
[Type the document title] Getting Started Guide 8.1.0 December 2013 3725-72102-001H Polycom RealPresence Resource Manager System, Virtual Edition Polycom Document Title 1 Trademark Information POLYCOM
RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2
RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
vshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Installation and Configuration Guide for Windows and Linux
Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.0.3 This document supports the version of each product listed and supports all subsequent versions until the document
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
vcloud Usage Meter User's Guide 3.4
This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs.
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
VMWARE PROTECTION USING VBA WITH NETWORKER 8.1
Technical Note VMWARE PROTECTION USING VBA WITH NETWORKER 8.1 Complete Deployment and Implementation procedure Abstract This technical note describes the integration of EMC NetWorker with VMware vcenter
