You can deploy Unified Access Gateway from Horizon View and Horizon Cloud with On-Premises Infrastructure. For the View component of VMware Horizon, the Unified Access Gateway appliance fulfills the same role that was previously played by the View security server.
- In the admin UI Configure Manually section, click Select.
- In the General Settings > Edge Service Settings line, click Show.
- Click the Horizon Settings gearbox icon.
- In the Horizon Settings page, change NO to YES to enable Horizon
- Configure the following edge service settings resources for Horizon
Set by default to View. Unified Access Gateway can communicate with servers that use the View XML protocol, such as View Connection Server, Horizon Cloud, and Horizon Cloud with On-Premises Infrastructure.
Connection Server URL
Enter the address of the Horizon server or load balancer. Enter as https://00.00.00.00
Proxy Destination URL Thumb Prints
Enter the list of Horizon server thumbprints.
If you do not provide a list of thumbprints, the server certificates must be issued by a trusted CA. Enter the hexadecimal thumbprint digits. For example, sha1= C3 89 A2 19 DC 7A 48 2B 85 1C 81 EC 5E 8F 6A 3C 33 F2 95 C3
- To configure the authentication method rule, and other advanced settings, click More.
Select the authentication methods to use.
The default is to use pass-through authentication of the user name and password. The authentication methods you configured in Unified Access Gateway are listed in the drop-down menus.
To configure authentication that includes applying a second authentication method if the first authentication attempt fails.
Select one authentication method from the first drop-down menu.
Click the + and select either AND or OR.
Select the second authentication method from the third drop-down menu.
To require users to authenticate through two authentication methods, change OR to AND in the drop-down.
Health Check URL
If a load balancer is configured, enter the URL that the load balancer uses to connect and check the health of the Unified Access Gateway appliance.
Enter the name of the SAML service provider for the View XMLAPI broker. This name must either match the name of a configured service provider metadata or be the special value DEMO.
Change NO to YES to specify whether the PCoIP Secure Gateway is enabled.
Proxy External URL
Enter the external URL of the Unified Access Gateway appliance. Clients use this URL for secure connections through the PCoIP Secure Gateway. This connection is used for PCoIP traffic. The default is the Unified Access Gateway IP address and port 4172.
Smart Card Hint Prompt
Change NO to YES to enable Unified Access Gateway appliance to support the smart card user name hints feature. With the smart card hint feature, a user's smart card certificate can map to multiple Active directory domain user accounts.
To use the Blast Secure Gateway, change NO to YES.
Blast External URL
Enter the FQDN URL of the Unified Access Gateway appliance that end users use to make a secure connection from the Web browsers through the Blast Secure Gateway. Enter as https://exampleappliance:443
UDP Tunnel Server Enabled
Enable this if the Horizon Clients use a poor network condition.
If the View secure tunnel is used, change NO to YES. The Client uses the external URL for tunnel connections through the View Secure Gateway. The tunnel is used for RDP, USB, and multimedia redirection (MMR) traffic.
Tunnel External URL
Enter the external URL of the Unified Access Gateway appliance. The default value is used if not set.
Enter the regular expression that matches the URIs that are relatd to the Horizon Server URL (proxyDestinationUrl). For the View Connection server, a forward slash (/) is a typical value to redirect to the HTML Access Web client when using the Unified Access Gateway appliance.
Match Windows User Name
Change NO to YES to match RSA SecurID and Windows user name. When set to YES, securID-auth is set to true and the securID and Windows user name matching is enforced.
Change NO to YES to enable the location from where the requests originate. The security server and Unified Access Gateway set the gateway location. The location can be external or internal.
Windows SSO Enabled
Change NO to YES to enable RADIUS authentication. The Windows log in uses the credentials that are used the first successful RADIUS access request.
Enter a comma separated list of host entries to be added in /etc/hosts file. Each entry includes an IP, a hostname, and an optional hostname alias in that order, separated by a space. For example, 10.192.168.1 example1.com, 10.192.168.2 example2.com example-alias.
- Click Save.