1. Trang chủ
  2. » Công Nghệ Thông Tin

View Manager Administration Guide phần 5 pdf

18 306 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 18
Dung lượng 673,86 KB

Nội dung

VMware, Inc. 73 Chapter 5 Client Management ThisscenariocanbeaddressedbyconfiguringViewConnectionServertoreturnan externalURLinsteadofitsownFQDNforthesecondconnectionchannel. TheprocessofsettingtheexternalURLisnotthesameforalltypesofserver.For standardorreplicaserversyoucansettheURLfromwithinVi ewAdministrator.Fora securityserveryoumustcreateoreditapropertiesfilethatcontainstheinbound connectiondetailsandsaveitinadirectorylocatedunderthesecurityserver installationpath. To set the external URL on a standard or replica server 1FromwithinViewAdministrator,clicktheConfiguration()button. 2UnderViewServersselectaViewConnectionServerentryandcl ickEdit. 3EnteraURLintheExternalURLfield.Thenamemustcontaintheprotocol, addressandportnumber.Forexample: https://view.example.com:443 ClickOK. To set the external URL on a security server Createoreditatextfilethatcontainstheexternallyresolvablenameofthesecurity server,portnumber,andprotocol,andsaveitinthefo llowinglocationonthesecurity server: C:\Program Files\VMware\VMware View\Server\sslgateway\conf\locked.properties Forexample,iftheexternallyresolvablenameofthesecurityserveris viewsecure.example.com,theportnumberis443,andtheclientprotocolisHTTPS, createapropertiesfilecalledlocked.propertiesthatcontainsthefollowingentries:  clientHost=viewsecure.example.com  clientPort=443  clientProtocol=https  CAUTIONForsecurityservers,youmustusethemethoddescribedin“Generating locked.propertiesAutomatically”onpage 74ifyouintendtousemessagesecurity modeinyourViewManagerenvironment—theconfigurationfilecreatedbythis procedurecontainsinformationthatiscriticaltothistypeofglobalconfiguration. NOTEYoumustrestarttheViewConnectionServerserviceforthesechangestotake effect. View Manager Administration Guide 74 VMware, Inc. Generating locked.properties Automatically Ifyouhavealreadyassociatedasecurityserverwithyourstandardserverorreplicated groupyoucangeneratethelocked.propertiesconfigurationfileautomaticallyfrom ViewAdministratoronanystandardorreplicaserver. To generate a Security Server locked.properties file from the Configuration view 1FromwithintheViewAdministratoronastandardorreplicaserver,clickthe Configuration()button. 2UnderSecurityServers,clickAd d.TheAddSecurityServerwindowisdisplayed. 3EntertheFQDNofthesecurityserverintheServerNamefield. 4EntertheexternalURLintheExternalURLfield.Thenamemustcontainthe protocol,addressandportnumber.Forexample: https://view.example.com:443 ClickOK.ThesecurityserverisaddedtotheSecurityServ erslistinthe Configurationview. 5 SelectthesecurityserverentryandclickDownloadsecuritykeys.Yourbrowser willdownloadtheconfigurationfile. 6 Savethisfileaslocked.propertiesinaconvenientlocationandthencopyitto thefollowinglocationonthesecurityserver: C:\Program Files\VMware\View Manager\Server\sslgateway\conf Configuring locked.properties Inadditiontodeterminingtheinformationreturnedtotheclientinordertoestablisha tunnelconnection,thelocked.propertiesfilecancontainpropertiesrelatingtothe securityservercommunications.ThesepropertiesaredescribedinTable 5‐1. N OTEOnthesecurityserver,youmustrestarttheViewConnectionServerservicefor thesechangestotakeeffect. VMware, Inc. 75 Chapter 5 Client Management Bydefault,theclientHost,clientPort,andclientProtocolpropertiesdefaultto thoseexhibitedbythesecurityserver;theserversettingsthemselvescanbeexplicitly configuredusingtheserverName,serverPort,andserverProtocolproperties. If thesevaluesareexplicitlyset,theportandprotocolvaluesshouldcorrelatebetween clientandserver. Onescenariowhereyo umayneedtospecifydifferentportandprotocolsettingsis whereanintermediarySSLacceleratorexistsbetweentheclientandsecurityserver. In anarrangementsuchasthis,theclientPortandclientProtocolcouldbesetto 443andhttps,buttheback‐endcommunicationsbetweentheacceleratorandthe serv ercouldtakeplaceoverhttpusingport80. Creating SSL Server Certificates ASecureSocketsLayer(SSL)certificateisacryptographicallysealeddataobjectthat containstheidentityofaserver,publicandprivateencryptionkeys,andthedigital signatureofthecertificateissuer.Certificatesserv etw omajorpurposes:  Theycanprovideauthenticatedprooftoaclientthatthewebsitetheyvisitis ownedbythecompanyorindividualwhohasinstalledthecertificate.  Theycontainthepublickeythattheclientusestoestablishanencrypted connectiontoaserver. Table 5-1. locked.properties—Client and Server properties Property Description clientHost Theexternallyresolvablehostnamethattheclientisinstructedtouse whencontactingthesecurityserver. Ifnotspecified,thisissettothevaluespecifiedbyserverNameorthe systemdefault. clientPort Theportthattheclientisinstructedtousewhencontactingthesecurity server. Ifnotspecified,thisissettoth evaluespecifiedbyserverPortorthe systemdefault. clientProtocol Theprotocolthattheclientisinstructedtousewhencontactingthe securityserver—thiscanbehttporhttps. Ifnotspecified,thisissettothevaluespecifiedbyserverProtocolorthe systemdefault. serverName Theuniqueidentityofth esecurityserver. serverPort Theportthatthesecurityserverlistenson.Defaultis80. serverProtocol Theprotocolthatthesecurityserveruses—thiscan beeitherhttporhttps. Defaultishttp. View Manager Administration Guide 76 VMware, Inc. Bydefault,inViewConnectionServerwhenaclientvisitsasecurepagesuchasView Administratortheyarepresentedwiththeself‐signedcertificateprovidedwiththe application.Byreadingtheservercertificatetheusercandecideiftheserverisatrusted source,andthenaccept(orreject)theco nnection. ThecertificatecanbesignedbyaCertificateAuthority(CA)—atrustedthirdpartywho guaranteestheidentityofthecertificateanditscreator. TocreateyourowncertificateforViewConnectionServerdooneofthefollowing:  Createaself‐signedcertificateforyoursystemusingthekeytoolutilityprovided withtheJavaRuntimeEnvironment(JRE)instancethataccompaniesView ConnectionServer.Self‐signedcertificatesareusergeneratedcertificatesthathave notbeenofficiallyregisteredwithanytrustedCA,andarethereforenot guaranteedtobeauthentic.  Createacertificateandthensendacertificatesigningrequest(CSR)thatcontains yourcertificatedetailstoaCA.Afterconductingsomechecksonthecompanyor individualmakingtheapplication,theCAsignstherequestandencryptsitwith theirprivatekey.Thevalidcertificateisreturnedandistheninse rtedintoa keystoreonViewConnectionServer. ClientsconnectingtoViewConnectionServerarepresentedwithyourcertificate.Ifthe certificateisself‐signedbutacceptedbytheuser,orsignedbyaCAthatistrustedby theclientbrowser,theclientusesthepublickeycontainedwithinthecertificat eto encryptthedataitsendstoViewConnectionServer.Typically,thecertificatefortheCA itselfisembeddedinthebrowserorislocatedinatrusteddatabasethatisaccessibleby theclient. Onceacertificatehasbeenaccepted,theclientrespondsbysendingitsownpublickey soth atViewConnectionServercanencryptthedataittransmitstotheclient.Inthis way,asecureconnectionbetweentheclientandserverisestablished. Bydefault,ViewConnectionServerincludesaself‐signedSSLcertificatethatclients canusetocreatesecuresessionswhentheyconnect.Thiscertificateisnottrustedby c lientsan ddoesnothaveth ecorrectnamefortheservice,butitdoesallowconnectivity. YoucanreplacethedefaultcertificateprovidedwithViewManagerwithaproperly definedcertificatefortheservice.IfthecertificateissignedbyatrustedCA,userswill notbepresen tedwithmessagesaskingthemtoverifythecertificate,andthinclient deviceswillbeabletoconnectwithoutrequiringadditionalconfiguration. N OTECertificatesareonlyrequiredforstandard,replica,orsecurityserversthat receivedirectconnectionsfromtheirclients.Ifyouareusingasecurityserverasyour client‐facingsystem,onlythisserverwillrequireacertificate. VMware, Inc. 77 Chapter 5 Client Management TocreateandinstallyourowncertificateyoumustfirstaddtheJavakeytoolutilityto yourcommandpathsothatyoucanexecuteitfromanylocationusingthecommand prompt.Once thisisdoneyoucancreateaself‐signedSSLcertificateusingthekeytool utility. Toobtainavalidatedcertificat ethathasbeensignedbyatrustedcertificateauthority youmustfirstsubmitacertificatesigningrequest(CSR)toatheCAinordertoreceive atrustedcertificate.OnceyouhavereceivedatrustedcertificatefromtheCAyoucan importitintothekeystorefortheViewCon nectionServer,andthenconfigureView ConnectionServertouseit. To add the Java keytool to the system path 1PresstheWindowskey+BreaktodisplaytheWindowsSystemPropertiesdialog box. 2UndertheAdvancedtab,clickonEnvironmentVariables. 3IntheSystemvariablesgroup,selectPATHandthenclickEdit. 4IntheVariablevaluefieldaddthepathtotheJREinst allationdirectory: C:\Program Files\VMware\View Manager\Server\jre\bin Ensurethatthisentryisdelimitedwithasemicolon(;)fromanyotherentries presentinthefield. 5ClickOK>OK>OKtoclosetheWindowsSystemPropertiesdialogbox. Creating an SSL Certificate Decidingwhatnametobindtoacertificateisanimportantconsideration.Acertificate bindsthenameoftheservicetoacryptographickeypairand,indoingso,assumes ownershipoftheserviceandkeys.Oncethecertificateissignedtheclientcantrustthe server(anditscryptographickey)beca usetheCAindependentlydeterminedthatthe organizationthatisclaimingownershiprequestedthekey. Themostimportantpartofthecertificateisthecommonname(CN)attribute.Usethe fullyqualifieddomainnamethattheclientcomputerusestoconnecttotheView ConnectionServer.Inasingle‐serverenvironment,thenameisty picallythenameof theserver.Ifloadbalancingisbeingused,usetheload‐balancedname. N OTEYoumayalreadyhaveanSSLcertificatethatyouwanttousewithView ConnectionServer.Referto“UsingExistingSSLCertificates”onpage 81formore informationonhowtodothis. View Manager Administration Guide 78 VMware, Inc. To create a self-signed SSL certificate 1Fromacommandprompt,enterthefollowing: keytool -genkey -keyalg "RSA" -keystore keys.p12 -storetype pkcs12 -validity 360 2Youarepromptedtoenterapasswordforthekeystoreandthentoprovide informationaboutyourselfandyourorganization.Whenyouareaskedtoenter yourfirstandlastname,entertheFQDNoftheViewConnectionServerinstance youwanttosec ure. 3Enteryourdepartment,organization,location,state,andcountry.Thelattermust beintheformofatwo‐lettercountrycode. 4Youareshownasummaryofthedatayouhaveenteredandareaskedifyouwant toproceed.Enteryesifyouaresatisfiedthatthedetailsarecorrect. 5Y ouarepromptedforakeypassword,whichisthepasswordspecificallyforthis certificate(asopposedtoanyothercertificatesstoredinthesamekeystorefile). Thekeys.p12fileiscreatedinthecurrentdirectory. Itisadvisabletobackupthekeys.p12fileafterthecertificateisimportedin toitincase youneedtorebuildtheconfigurationfortheserveratsomepoint. Validating the SSL Certificate Self‐signedcertificates,whileadequatefordataencryptionbetweenserverandclient, donotprovideanyreliableinformationaboutthelocationofViewConnectionServer orthecorporateentityresponsibleforitsadministration. Whereitisimportantforyourclientstobeabletodeterminetheoriginandintegrityof thedatatheyreceiv e,itisrecommendedthatyouobtainaCA‐authenticatedcertificate foryoursite. To create a certificate signing request (CSR) Fromacommandprompt,enterthefollowingwhere<secret>isthekeystore password: keytool -certreq -keyalg "RSA" -file certificate.csr -keystore keys.p12 -storetype pkcs12 -storepass <secret> VMware, Inc. 79 Chapter 5 Client Management Thecertificate.csrfileiscreatedinthesamelocation.Thecontentsofthefile shouldresembleaslightlylongerversionofthefollowingexample: BEGIN NEW CERTIFICATE REQUEST MIIBuDCCASECAQAweDELMAkGA1UEBhMCR0IxEDAOBgNV BAgTB1Vua25vd24xEDAOBgNVBAcTB1Vua25vd24xFDAS BgNVBAoTC1ZNd2FyZSBJbmMuMRMwEQYDVQQLEwp2bXdh XU8/2jEUL5DocLDLnygsUD2g7cUMYdz/HeECAwEAAaAA AeHnsPs7a1Q0JH6OZvdU END NEW CERTIFICATE REQUEST To submit the CSR and import the certificate 1SendtheCSRfiletoacertificateauthorityinaccordancewiththeirenrollment processandrequestacertificateinPKCS7format.Aspartofthisprocess,youmay needtoprovideproofofidentity ,proofofdomainownership,andsoforth. Fortestingpurposes,manycertificateauthoritiesalsoprovideafreetemporary SSLcertificatebasedonanuntrustedroot: Thawte—https://www.thawte.com/cgi/server/try.exe VeriSign—http://verisign.com/ssl/buy‐ssl‐certificates/free‐ssl‐certificate‐trial GlobalSign—http://globalsign.com/free‐ssl‐certificate/free‐ssl.htm 2Ifyouhavereceivedeitheratempo rar yor fullPKCS#7 ce rtificatefromtheCA,copy  thecontentsofthefileintoatexteditorandsaveitascertificate.p7.Thecontents ofthefileshouldresembleaslightlylongerversionofthefollowingexample: BEGIN PKCS7 MIIF+AYJKoZIhvcNAQcCoIIF6TCCBeUCAQExADALBgkqhkiG9w0BBwGgggXNMIID LDCCApWgAwIBAgIQTpY7DsV1n1HeMGgMjMR2PzANBgkqhkiG9w0BAQUFADCBhzEL N OTEIfthecertificateauthoritydoesnotofferPKCS#7asaformat,usethedefault settingsprovided—youwillbeabletoexportthecertificatedataintheappropriate formatatalaterstage. N OTEAtemporarycertificateispreferabletothedefaultself‐signedcertificate suppliedwithViewManagerbecauseitusesthecorrectdomainname.However, clientsstillissuewarningsthattheserviceisnottrusted. View Manager Administration Guide 80 VMware, Inc. i7coVx71/lCBOlFmx66NyKlZK5mObgvd2dlnsAP+nnStyhVHFIpKy3nsDO4JqrIg EhCsdpikSpbtdo18jUubV6z1kQ71CrRQtbi/WtdqxQEEtgZCJO2lPoIWMQA= END PKCS7 3Fromacommandprompt,enterthefollowingwhere<secret>isthekeystore password: keytool -import -keystore keys.p12 -storetype pkcs12 -storepass <secret> -keyalg "RSA" -trustcacerts -file certificate.p7 Ifyouareusingatemporarycertificateyoumaybepresentedwiththefollowing message: is not trusted. Install reply anyway? Thismessageisgeneratedbecausetherootcertificategiventoyouisnottrustedby Javabecauseitisatestcertificatean dnotforproductionuse. To configure the View Connection Server to use the new certificate 1Placeanewcertificatefileinthefollowinglocationonastandard,replica,or securityserverinstanceofViewConnectionServer: C:\Program Files\VMware\View Manager\Server\sslgateway\conf 2 Createoreditthefollowingfileoneachserver: C:\ProgramFiles\VMware\View Manager\Server\sslgateway\conf\locked.properties 3Addthefollowingproperties:  keyfile=keys.p12  keypass=secret Thischangesthevaluesasneededtomatchwhatyoucreatedinthepreviousstep. 4RestarttheViewConnectionServerservice. AssumingyourenvironmentisconfiguredtouseSSL,alogmessagelikethe followingappears: 13:57:40,676 INFO <Thread-1> [NetHandler] Using SSL certificate store: keys.p12 with password of 6 characters Thismessageindicatesthattheconfigurationisinuse. VMware, Inc. 81 Chapter 5 Client Management Using Existing SSL Certificates Youorganizationmayalreadyhaveavalid(CAsigned)SSLcertificatesthatyouwant tousewithViewConnectionServer.InordertouseanSSLcertificateyouwillrequire boththecertificateandtheprivatekeythataccompaniesit. Exporting from Microsoft IIS Server InordertouseanexistingMicrosoftIISSSLservercertificate,youmustfirstexportit fromtheIISapplicationserverthathoststheWebsite,orsites,thatuseit.Windows providesvisualtoolstoassistyouwiththis. To export an SSL server certificate from the IIS application 1OntheIISapplicationserverhostsystem,clickStart>AdministrativeTools> Inter netInformationServices(IIS)Manager.TheInternetInformationServices Managerisdisplayed. 2Fromthetreewidgetintheleftpane,expandthelocalcomputerentryandthen clickWebSitestoviewthelistofsiteshostedbytheserver. 3Intheright‐handpane,right‐clicktheWebsi teentrythatcontainstheSSL certificateyouwanttoexport,andselectPropertiesfromthecontextmenu. The Websitepropertieswindowisdisplayed. 4 SelecttheDirectorySecuritytab.UnderSecurecommunicationsclickServer Certificate.YouarepresentedwiththeWebServerCertificatewizard.ClickNext. 5 SelectExportthecurrentcertificatetoa.p fxfile.ClickNext. 6Specifyafilenameforthefileyouwanttoexport.ClickNext. 7Enterandconfirmapasswordthatwillbeusedtoencrypttheinformationyou wanttoexport.ClickNext. 8Youareshownasummaryofthecertificateyouareabouttoexport.Ens urethat theinformationiscorrect(andthatyouhaveselectedthecorrectcertificate)and clickNext>Finish. Thecertificateisexportedtothespecifiedlocation.Youmustnowcarryoutthe proceduredescribedin“ToconfiguretheViewConnectionServertousethenew certificate”onpage 80.Ensurethatth ekeypassentryinthelocked.properties filecorrespondstothepasswordyouusedwhenexportingthecertificate. View Manager Administration Guide 82 VMware, Inc. Smart Card Authentication Someorganizationsrequirepersonneltopassmultiplestagesofauthenticationbefore allowingthemtoconnecttotheirsystems.ViewManagerprovidessupportfor high‐securityenvironmentsbyofferingsmartcardauthenticationofclientsessions. Smartcardauthenticationworksbypresentingatrustedsetofclientcredentials—a usercertificate—toViewConnectionServer.Ausercertificat eisanencryptedsetof authenticationcredentialsthatincludesthedigitalsignatureofthetrustedroot CertificateAuthority(CA)thatissuedthecertificate. Theusercertificateisstoredonthesmartcardandcanonlyberetrievedandpassedto theserveraftertheuserhasverifiedtheirownershipbyenteringapersonal identificatio nnumber(PIN).Certificatesarethenauthenticatedbyusingapublickey toverifytheincludeddigitalsignature;theexpecteddigitalsignatureiscontainedina trustedCAcertificatethatisstoredonViewConnectionServer. ThisfollowingsectionsdescribehowtoconfigureandenablethisfeatureonVi ew ConnectionServer. Smart Card Hardware EachclientsystemusingsmartcardauthenticationwillrequireViewClientanda Windows‐compatiblesmartcardreadertobeinstalled. Inordertorecognizeandusethesmartcardhardware,product‐specificapplication driversmustbeinstalledonboththeclientsystemsandremotedesktops.Smartcard profilescanvarybetweenve ndors;refertothedocumentationthataccompaniesthe smartcardreaderformoreinformationabouthowtodothis. NOTESmartcardauthenticationisonlysupportedbyViewClient;itisnotsupported byViewAdministrator,ViewPortal,orbyofflinedesktopinstancesaccessedthrough ViewClientwithOfflineDesktop. [...]... In the Variable value field add the path to the JRE installation directory: C:\Program Files\VMware \View Manager\ Server\jre\bin Ensure that this entry is delimited with a semicolon (;) from any other entries  present in the field 5 VMware, Inc Click OK > OK > OK to close the Windows System Properties dialog box 85 View Manager Administration Guide Using keytool to Create a Truststore From a command prompt, enter the following where  is a unique (case‐insensitive) ... Files\VMware \View Manager\ Client\bin\wswc" /? To launch View Client in fully scripted mode—that is, with all connection, user, and  desktop criteria provided—enter the following: "C:\Program Files\VMware \View Manager\ Client\bin\wswc" -serverURL -userName -password -domainName -desktopName Table 5 2 describes the command line options you can use when you launch View ... Under the Content tab, click Certificates.  VMware, Inc 83 View Manager Administration Guide 3 Under the Personal tab, select the certificate you wish to use and click View.   NOTE   If the user certificate is not present in the list you must first click the Import  button to manually import the user certificate. Once the certificate has been  imported, select it from the list and click View 4 Under the Certification Path tab, select the certificate at the top of the tree and click ... desktopName property to be supplied screenMulti  Start the session in full‐screen multi‐monitor mode. This  property requires the desktopName property to be supplied VMware, Inc 89 View Manager Administration Guide Table 5- 2 View Client Command Line Options (Continued) Property Description rollback (Offline Desktop only) Unlocks the online version of a checked  out desktop and discards the offline session... The value for trustKeyfile must correspond to that of  You must restart the View Connection Server service for these changes to take effect NOTE   Once a standard or replica View Connection Server has been configured, you  will be prompted to choose a certificate when logging in to View Portal or to View Administrator on that server.  86 VMware, Inc Chapter 5 Client Management Configuring a Standard or Replica Server... If you are using RSA SecurID, you must first enable it by editing your View Connection  Server settings. After you install the RSA SecurID software on your server or servers,  you can edit RSA settings in the View Administrator user interface.  To enable or edit RSA SecurID 1 From within the View Administrator, click the Configuration ( ) button 2 Under View Servers select a View Connection Server entry and click Edit 3 Under the RSA SecurID 2‐Factor Authentication heading, configure the desired ... staycheckedout, and offlineDirectory can also be specified by Active Directory  group policies. Refer to Chapter 8, “Component Policies,” on page 1 35 for more  information about this NOTE   Command line properties override system policies, which in turn override user  policies.  Virtual Printing The Virtual Printing (ThinPrint) feature of View Manager allows View Client and  View Client with Offline Desktop users to transparently use local or network printers ... from within their remote systems, yet removes the requirement for installing  proprietary printer drivers on each View Manager desktop NOTE   View Portal does not support Virtual Printing Virtual Printing is a plug‐and‐play solution; once a printer is installed on the local  system it is automatically added to the list of available printers on the View Manager desktop. No further configuration is required 90 VMware, Inc ... A truststore is a keystore that is used by View Manager when making decisions about  which clients to trust. In order for View Connection Server to authenticate smart card  users and connect them to their desktops, the root certificate for all trusted users must  first be added to the server truststore A truststore can be created by using the keytool utility provided with the Java  Runtime Environment (JRE) instance that accompanies View Connection Server... You can locate this information by viewing the certificate properties, as described in  “Exporting a Root Certificate from a User Certificate” on page 83 To set the UPN to the SAN on ADAM 1 On any standard or replica connection server, click Start > All Programs > ADAM >  ADAM ADSI Edit 2 In the left pane, expand the domain in which the user you want to edit is located  and expand CN=Users VMware, Inc 87 View Manager Administration . beeitherhttporhttps. Defaultishttp. View Manager Administration Guide 76 VMware, Inc. Bydefault,in View ConnectionServerwhenaclientvisitsasecurepagesuchas View Administratortheyarepresentedwiththeself‐signedcertificateprovidedwiththe application.Byreadingtheservercertificatetheusercandecideiftheserverisatrusted source,andthenaccept(orreject)theco nnection. ThecertificatecanbesignedbyaCertificateAuthority(CA)—atrustedthirdpartywho guaranteestheidentityofthecertificateanditscreator. Tocreateyourowncertificatefor View ConnectionServerdooneofthefollowing: . MIIF+AYJKoZIhvcNAQcCoIIF6TCCBeUCAQExADALBgkqhkiG9w0BBwGgggXNMIID LDCCApWgAwIBAgIQTpY7DsV1n1HeMGgMjMR2PzANBgkqhkiG9w0BAQUFADCBhzEL N OTEIfthecertificateauthoritydoesnotofferPKCS#7asaformat,usethedefault settingsprovided—youwillbeabletoexportthecertificatedataintheappropriate formatatalaterstage. N OTEAtemporarycertificateispreferabletothedefaultself‐signedcertificate suppliedwith View Manager becauseitusesthecorrectdomainname.However, clientsstillissuewarningsthattheserviceisnottrusted. View Manager Administration Guide 80 VMware, Inc. . Certificate Decidingwhatnametobindtoacertificateisanimportantconsideration.Acertificate bindsthenameoftheservicetoacryptographickeypairand,indoingso,assumes ownershipoftheserviceandkeys.Oncethecertificateissignedtheclientcantrustthe server(anditscryptographickey)beca usetheCAindependentlydeterminedthatthe organizationthatisclaimingownershiprequestedthekey. Themostimportantpartofthecertificateisthecommonname(CN)attribute.Usethe fullyqualifieddomainnamethattheclientcomputerusestoconnecttothe View ConnectionServer.Inasingle‐serverenvironment,thenameisty picallythenameof theserver.Ifloadbalancingisbeingused,usetheload‐balancedname. N OTEYoumayalreadyhaveanSSLcertificatethatyouwanttousewith View ConnectionServer.Referto“UsingExistingSSLCertificates”onpage 81formore informationonhowtodothis. View Manager Administration Guide 78 VMware, Inc.

Ngày đăng: 09/08/2014, 07:21

w