This example shows a View deployment that includes two View Connection Server instances. The first instance supports internal users. The second instance is paired with a security server and supports external users.
To prevent external users from accessing certain desktops, you could set up restricted entitlements as follows:
Assign the tag "Internal" to the View Connection Server instance that supports your internal users.
Assign the tag "External" to the View Connection Server instance that is paired with the security server and supports your external users.
Assign the "Internal" tag to the desktop pools that should be accessible only to internal users.
Assign the "External" tag to the desktop pools that should be accessible only to external users.
External users cannot see the desktop pools tagged as Internal because they log in through the View Connection Server tagged as External, and internal users cannot see the desktop pools tagged as External because they log in through the View Connection Server tagged as Internal. Restricted Entitlement Configuration illustrates this configuration.
You can also use restricted entitlements to control desktop access based on the user-authentication method that you configure for a particular View Connection Server instance. For example, you can make certain desktop pools available only to users who have authenticated with a smart card.