View Agent 62 Direct Connection Plugin Administration
View Agent 62 Direct Connection Plugin Administration
Administration
VMware Horizon 6
Version 6.2
EN-001912-01
You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
[email protected]
Copyright 2015 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
VMware, Inc.
Contents
Index
VMware, Inc.
26
27
VMware, Inc.
View Agent Direct-Connection Plug-In Administration provides information about installing and configuring
View Agent Direct-Connection Plugin. This plug-in is an installable extension to View Agent that allows
Horizon Client to directly connect to a virtual machine-based desktop, a Remote Desktop Services (RDS)
desktop, or an application without using View Connection Server. All the desktop and application features
work in the same way as when the user connects through View Connection Server.
Intended Audience
This information is intended for an administrator who wants to install, upgrade or configure View Agent
Direct-Connection Plug-In in a virtual machine-based desktop or an RDS host. This guide is written for
experienced Windows system administrators who are familiar with virtual machine technology and
datacenter operations.
VMware, Inc.
VMware, Inc.
View Agent Direct-Connection (VADC) Plug-In enables Horizon Clients to directly connect to virtual
machine-based desktops, RDS desktops, or applications. VADC Plug-In is an extension to View Agent and
is installed on virtual machine-based desktops or RDS hosts.
This chapter includes the following topics:
n
The virtual or physical machine that has VADC Plug-In installed must have a minimum of 128 MB of
video RAM for PCoIP to function properly.
For a virtual machine, you must install VMware Tools before you install View Agent.
A physical machine must have a Teradici host card. Installing VMware Tools is not required.
NOTE A virtual machine-based desktop that supports VADC can be joined to a Microsoft Active Directory
domain, or it can be a member of a workgroup.
Verify that View Agent is installed. If your environment does not include View Connection Server,
install View Agent from the command line and specify a parameter that tells View Agent not to register
with View Connection Server. See Install View Agent for HTML Access, on page 19.
VMware, Inc.
Procedure
1
Download the VADC Plug-In installer file from the VMware download page at
http://www.vmware.com/go/downloadview.
The installer filename is VMware-viewagent-direct-connection-x86_64-y.y.y-xxxxxx.exe for 64-bit
Windows or VMware-viewagent-direct-connection--y.y.y-xxxxxx.exe for 32-bit Windows, where y.y.y
is the version number and xxxxxx is the build number.
Description
Default Value
LISTENPORT
The TCP port that VADC Plug-In uses to accept remote connections. By
default, the installer will configure Windows Firewall to allow traffic on the
port.
443
MODIFYFIREWALL
DISABLE_SSLV3
Prerequisites
n
Verify that View Agent is installed. If your environment does not include View Connection Server,
install View Agent from the command line and specify a parameter that tells View Agent not to register
with View Connection Server. See Install View Agent for HTML Access, on page 19.
Procedure
1
VMware, Inc.
Run the VADC Plug-In installer file with command-line options to specify a silent installation. You can
optionally specify additional MSI properties.
The following example installs VADC Plug-In with default options.
VMware-viewagent-direct-connection--y.y.y-xxxxxx.exe /s
The following example installs VADC Plug-In and specifies a TCP port that vadc will listen to for
remote connections.
VMware-viewagent-direct-connection--y.y.y-xxxxxx.exe /s /v"/qn LISTENPORT=9999"
VMware, Inc.
10
VMware, Inc.
You can use the default View Direct-Connection Plug-In configuration settings or customize them through
Windows Active Directory group policy objects (GPOs) or by modifying specific Windows registry settings.
This chapter includes the following topics:
n
VDM\Agent\Configuration\XMLAPI.
Registry Value
Type
Description
httpsPortNumber
REG_SZ
Session Timeout
sessionTimeout
REG_SZ
Disclaimer Enabled
disclaimerEnabled
REG_SZ
VMware, Inc.
11
12
Setting
Registry Value
Type
Description
Disclaimer Text
disclaimerText
REG_SZ
Client setting:
AlwaysConnect
alwaysConnect
REG_SZ
externalPCoIPPort
REG_SZ
externalBlastPort
REG_SZ
externalRDPPort
REG_SZ
External IP Address
externalIPAddress
REG_SZ
External Framework
Channel Port
externalFrameworkCha
nnelPort
REG_SZ
VMware, Inc.
Registry Value
Type
Description
USB Enabled
usbEnabled
REG_SZ
usbAutoConnect
REG_SZ
Reset Enabled
resetEnabled
REG_SZ
Client Credential
Cache Timeout
clientCredentialCacheTi
meout
REG_SZ
userIdleTimeout
REG_SZ
x509CertAuth
REG_SZ
0: Not allowed
1: Optional
2: Required
x509SSLCertAuth
REG_SZ
BioMetricsTimeout
REG_SZ
The External Port numbers and External IP Address values are used for Network Address Translation
(NAT) and port mapping support. For more information see, Using Network Address Translation and Port
Mapping, on page 15.
You can set policies that override these registry settings by using the Local Policy Editor or by using Group
Policy Objects (GPOs) in Active directory. Policy settings have precedence over normal registry settings. A
GPO template file is supplied to configure policies. When ViewView Agent and the plug-in are installed in
the default location, the template file has the following location:
C:\Program Files\VMware\VMware View\Agent\extras\view_agent_direct_connection.adm
VMware, Inc.
13
You can import this template file into Active Directory or the Local Group Policy Editor to simplify the
management of these configuration settings. See the Microsoft Policy Editor and GPO handling
documentation for details of managing policy settings in this way. Policy settings for the plug-in are stored
in the registry key:
HKEY_LOCAL_MACHINE Software\Policies\VMware, Inc.\VMware VDM\Agent\Configuration\XMLAPI
For smart card authentication, the certificate authority (CA) that signs the smart card certificates must be in
the Windows certificate Store. For information about how to add a certificate authority, see Add a
Certificate Authority to the Windows Certificate Store, on page 18.
NOTE If a user attempts to log in using a smart card to a Windows 7 or Windows Server 2008 R2 machine
and the Smart Card certificate has been signed by an intermediate CA, the attempt may fail because
Windows can send the client a trusted issuer list that does not contain intermediate CA names. If this
happens, the client will be unable to select an appropriate Smart Card certificate. To avoid this problem, set
the registry value SendTrustedIssuerList (REG_DWORD) to 0 in the registry key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL. With this registry
value set to 0, Windows does not send a trusted issuer list to the client, which can then select all the valid
certificates from the smart card.
On the Active Directory server, edit the GPO by selecting Start > Administrative Tools > Group Policy
Management, right-clicking the GPO, and selecting Edit.
In the Group Policy Management Editor, navigate to the Computer Configuration > Policies >
Administrative Templates > Network > SSL Configuration Settings.
In the Options pane, replace the entire content of the SSL Cipher Suites text box with the following
cipher list:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384,
TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA
The cipher suites are listed above on separate lines for readability. When you paste the list into the text
box, the cipher suites must be on one line with no spaces after the commas.
14
Restart the VADC machines for the new group policy to take effect.
VMware, Inc.
NOTE If Horizon Client is not configured to support any cipher that is supported by the virtual desktop
operating system, the TLS/SSL negotiation will fail and the client will be unable to connect.
For information on configuring supported cipher suites in Horizon Clients, refer to Horizon Client
documentation at https://www.vmware.com/support/viewclients/doc/viewclients_pubs.html.
VMware, Inc.
15
An example deployment of a desktop whose IP address is 192.168.1.1 illustrates the configuration of NAT
and port mapping. A Horizon Client system with an IP address of 192.168.1.9 on the same network
establishes a PCoIP connection by using TCP and UDP. This connection is direct without any NAT or port
mapping configuration.
Figure 21. Direct PCoIP from a Client on the Same Network
IP address
192.168.1.9
PCoIP Client
IP address
192.168.1.1
TCP DST 192.168.1.1:4172
SRC 192.168.1.9:?
UDP DST 192.168.1.1:4172
SRC 192.168.1.9:55000
View Desktop
PCoIP server
If you add a NAT device between the client and desktop so that they are operating in a different address
space and do not make any configuration changes to the plug-in, the PCoIP packets will not be routed
correctly and will fail. In this example, the client is using a different address space and has an IP address of
10.1.1.9. This setup fails because the client will use the address of the desktop to send the TCP and UDP
PCoIP packets. The destination address of 192.168.1.1 will not work from the client network and might
cause the client to display a blank screen.
Figure 22. PCoIP From a Client via a NAT Device Showing the Failure
NAT
PNAT
IP address
10.1.1.9
IP address
192.168.1.1
View Desktop
PCoIP Client
PCoIP server
To resolve this problem, you must configure the plug-in to use an external IP address. If externalIPAddress
is configured as 10.1.1.1 for this desktop, the plug-in gives the client an IP address of 10.1.1.1 when making
desktop protocol connections to the desktop. For PCoIP, the PCoIP Secure Gateway service must be started
on the desktop for this setup.
For port mapping, when the desktop uses the standard PCoIP port 4172, but the client must use a different
destination port, mapped to port 4172 at the port mapping device, you must configure the plug-in for this
setup. If the port mapping device maps port 14172 to 4172, the client must use a destination port of 14172 for
PCoIP. You must configure this setup for PCoIP. Set externalPCoIPPortin the plug-in to 14172.
In a configuration which uses NAT and port mapping, the externalIPAdress is set to 10.1.1.1, which is
network translated to 192.168.1.1, and externalPColPPort is set to 14172, which is port mapped to 4172.
16
VMware, Inc.
Figure 23. PCoIP From a Client via a NAT Device and Port Mapping
IP address
192.168.1.1
NAT
PNAT
IP address
10.1.1.9
PCoIP Client
View Desktop
TCP DST 10.1.1.1:14172
SRC 10.1.1.9:?
PCoIP
server
As with the external PCoIP TCP/UDP port configuration for PCoIP, if the RDP port (3389) or the Framework
Channel port (32111) is port mapped, you must configure externalRDPPort and
externalFrameworkChannelPort to specify the TCP port numbers that the client will use to make these
connections through a port mapping device.
VMware, Inc.
17
Desktop IP
Address
HTTPS
RDP
Framework Channel
192.168.0.0
10.20.30.40:1000 ->
192.168.0.0:443
10.20.30.40:1001 ->
192.168.0.0:3389
10.20.30.40:1002 ->
192.168.0.0:4172
10.20.30.40:1003 ->
192.168.0.0:32111
192.168.0.1
10.20.30.40:1005 ->
192.168.0.1:443
10.20.30.40:1006 ->
192.168.0.1:3389
10.20.30.40:1007 ->
192.168.0.1:4172
10.20.30.40:1008 ->
192.168.0.1:32111
192.168.0.2
10.20.30.40:1010 ->
192.168.0.2:443
10.20.30.40:1011 ->
192.168.0.2:3389
10.20.30.40:1012 ->
192.168.0.2:4172
10.20.30.40:1013 ->
192.168.0.2:32111
192.168.0.3
10.20.30.40:1015 ->
192.168.0.3:443
10.20.30.40:1016 ->
192.168.0.3:3389
10.20.30.40:1017 ->
192.168.0.3:4172
10.20.30.40:1018 ->
192.168.0.3:32111
In this example, Horizon Client connects to IP address 10.20.30.40 and an HTTPS destination port number of
(1000 + n * 5) where n is the desktop number. To connect to desktop 3, the client would connect to
10.20.30.40:1015. This addressing scheme significantly simplifies the configuration setup for each desktop.
All desktops are configured with identical external address and port configurations. The NAT and port
mapping configuration is done within the NAT and port mapping device with this consistent pattern, and
all desktops can be accessed on a single public IP address. The client would typically use a single public
DNS name that resolves to this IP address.
Start MMC.
In the MMC console, expand the Certificates (Local Computer) node and go to the Trusted Root
Certification Authorities > Certificates folder.
If the root certificate is present and there are no intermediate certificates in the certificate chain, exit
MMC.
18
Right-click the Trusted Root Certification Authorities > Certificates folder and click All Tasks >
Import.
In the Certificate Import wizard, click Next and browse to the location where the root CA certificate is
stored.
If the smart card certificate is issued by an intermediate CA, import all intermediate certificates in the
certificate chain.
a
Go to the Certificates (Local Computer) > Intermediate Certification Authorities > Certificates
folder.
VMware, Inc.
View Agent Direct-Connection (VADC) Plug-In supports HTML Access to virtual machine-based desktops.
HTML Access to RDS desktops or applications is not supported.
This chapter includes the following topics:
n
Download the View Agent installer file from the VMware download page at
http://www.vmware.com/go/downloadview.
The installer filename is VMware-viewagent-y.y.y-xxxxxx.exe for 32-bit Windows or VMware-viewagentx86_64-y.y.y-xxxxxx.exe for 64-bit Windows, where y.y.y is the version number and xxxxxx is the build
number.
Procedure
u
Install View Agent from the command line and specify a parameter that tells View Agent not to register
with View Connection Server.
This example installs the 32-bit version of View Agent.
VMware-viewagent-y.y.y-xxxxxx.exe /v VDM_SKIP_BROKER_REGISTRATION=1
What to do next
Install View Agent Direct-Connection Plug-In. See Install View Agent Direct-Connection Plug-In, on
page 7.
VMware, Inc.
19
Download the View HTML Access portal.war zip file from the VMware download page at
http://www.vmware.com/go/downloadview.
The filename is VMware-Horizon-View-HTML-Access-y.y.y-xxxxxx.zip, where y.y.y is the version
number and xxxxxx is the build number.
Procedure
1
Select the check box Internet Information Services and click OK.
In Control Panel, navigate to Administrative Tools > Internet Information Services (IIS) Manager.
Click Add.
Action
10
In the Site Bindings dialog, remove the entry for http port 80 and click Close.
11
12
13
If the File name extension .json does not exist, in the Actions pane, click Add.... Otherwise, skip the
next 2 steps.
14
15
16
17
Unzip VMware-Horizon-View-HTML-Access-y.y.y-xxxxxx.zip.
The result is a file named portal.war.
18
19
20
20
Open Notepad.
VMware, Inc.
21
Create the file C:\inetpub\wwwroot\Default.htm with the following content (replace <IP address or DNS
name of desktop> with the actual IP address or DNS name of the desktop):
<HEAD>
<noscript>
<meta HTTP-EQUIV="REFRESH" content="0; url=https://<IP address or DNS name of
desktop>/portal/webclient/index.html">
</noscript>
</HEAD>
<script>
var destination = 'https://<IP address or DNS name of
desktop>/portal/webclient/index.html';
var isSearch = !!window.location.search;
window.location.href = destination + (isSearch ? window.location.search + '&' : '?') +
'vadc=1' + (window.location.hash || '');
</script>
Replace the default self-signed SSL server certificate with a trusted CA-signed SSL server certificate. See
Replacing the Default Self-Signed SSL Server Certificate, on page 15. This creates a certificate that has
the Friendly Name value vdm.
If the client's static content is served by the desktop, set up static content delivery. See Set Up Static
Content Delivery, on page 20.
Familiarize yourself with the Windows Certificate Store. See "Configure View Connection Server,
Security Server, or View Composer to Use a New SSL Certificate" in the View Installation document.
Procedure
1
VMware, Inc.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters.
21
22
Add 2 new REG_DWORD values, EnableHttp2Tls and EnableHttp2Cleartext, to this registry key.
VMware, Inc.
View supports Remote Desktop Services (RDS) hosts that provide RDS desktops and applications that users
can access from Horizon Clients. An RDS desktop is based on a desktop session to an RDS host. In a typical
View deployment, clients connect to desktops and applications through View Connection Server. However,
if you install View Agent Direct-Connection Plug-In on an RDS host, clients can connect directly to RDS
desktops or applications without using View Connection Server.
This chapter includes the following topics:
n
After you set up an RDS host and install VADC Plug-In, you must entitle RDS desktops and applications.
See Entitle RDS Desktops and Applications, on page 23.
VMware, Inc.
23
Desktop Entitlements
To entitle a user to launch an RDS desktop, perform the following steps:
n
Ensure that the user is a member of the local group View Agent Direct-Connection Users. By default,
all authenticated users are a members of this group.
For Windows Server 2008 R2 SP1, in RemoteApp Manager, ensure that the RD Session Host Server is
configured to Show a remote desktop connection to this RD Session Host server in RD Web Access.
For Windows 2012 or 2012 R2, run Server Manager and navigate to Remote Desktop Services to
configure entitlements.
Application Entitlements
To entitle a user to launch an application, perform the following steps:
24
Ensure that the user is a member of the local group View Agent Direct-Connection Users. By default,
all authenticated users are a members of this group.
For Windows Server 2008 R2 SP1, in RemoteApp Manager, ensure that the application is listed under
RemoteApp Programs, is set for RD Web Access, and has user assignments set for all users, this user or
a group of which the user is a member.
For Windows 2012 or 2012 R2, run Server Manager and navigate to Remote Desktop Services to
configure entitlements.
VMware, Inc.
When using View Agent Direct-Connection Plug-In, you might encounter known issues.
When you investigate a problem with View Agent Direct-Connection Plug-In, make sure that the correct
version is installed and running.
If a support issue needs to be raised with VMware, always enable full logging, reproduce the problem, and
generate a Data Collection Tool (DCT) log set. VMware technical support can then analyze these logs. For
details on generating a DCT log set, refer to Collecting diagnostic information for VMware View KB article
http://kb.vmware.com/kb/1017939.
This chapter includes the following topics:
n
VMware, Inc.
25
Solution
u
26
VMware, Inc.
Index
A
applications, entitling 23
authorizing Horizon Client 15
C
certificate authority, add to Windows certificate
store 18
silent install 8
system requirements for virtual machinebased desktops 7
W
weak ciphers in SSL/TLS, disabling 14
D
desktops, RDS 23
H
HTML Access
disable HTTP/2 protocol 21
install View Agent for 19
set up trusted CA-signed SSL server
certificate 21
setting up 19
setting up static content delivery 20
N
Network Address Translation (NAT), advanced
addressing scheme 17
P
port mapping, advanced addressing scheme 17
R
RDS desktopss, entitling 23
Remote Desktop Services (RDS) hosts
introduction 23
setting up 23
S
SSL Server Certificate, replacing 15
T
troubleshooting
enabling full logging 26
incorrect graphics driver 25
insufficient video RAM 25
V
View Agent Direct-Connection Plug-In
advanced configuration 11
configuration settings 11
installing 7
VMware, Inc.
27
28
VMware, Inc.