Security settings include group policies for certificates, login credentials, and the single sign-on feature.
The following table describes the security settings in the Horizon Client Configuration ADMX template file. This table shows whether the settings include both Computer Configuration and User Configuration settings, or only Computer Configuration settings. For the security settings that include both types of settings, the User Configuration setting overrides the equivalent Computer Configuration setting.
The following settings appear in the
folder in the Group Policy Management Editor.Setting | Computer | User | Description |
---|---|---|---|
Allow command line credentials | X | Determines whether user credentials can be provided with Horizon Client command-line options. If this setting is disabled, the smartCardPIN and password options are not available when users run Horizon Client from the command line. This setting is enabled by default. The equivalent Windows Registry value is AllowCmdLineCredentials. |
|
Configures the SSL Proxy certificate checking behavior of the Horizon Client | X | Determines whether to allow certificate checking for secondary connections through an SSL proxy server for Blast Secure Gateway and secure tunnel connections. When this setting is not configured (the default), users can change the SSL proxy setting in Horizon Client manually. By default, Horizon Client blocks SSL proxy connections for Blast Secure Gateway and secure tunnel connections. |
|
Servers Trusted For Delegation | X | Specifies the Connection Server instances that accept the user identity and credential information that is passed when a user selects Log in as current user in the Options menu on the Horizon Client menu bar. If you do not specify any Connection Server instances, all Connection Server instances accept this information, unless the Allow logon as current user authentication setting is disabled for the Connection Server instance in Horizon Console. To add a Connection Server instance, specify the Service Principal Name (SPN) of the Connection Server service. The equivalent Windows Registry value is BrokersTrustedForDelegation. |
|
Certificate verification mode | X | Configures the level of certificate checking that Horizon Client performs. You can select one of these modes:
When this group policy setting is configured, users can view the selected certificate verification mode in Horizon Client, but cannot configure the setting. The certificate checking mode dialog box informs users that an administrator has locked the setting. When this setting is disabled, Horizon Client users can select a certificate checking mode. This setting is disabled by default. To allow a server to perform selecting of certificates provided by Horizon Client, the client must make HTTPS connections to the Connection Server or security server host. Certificate checking is not supported if you off-load TLS to an intermediate device that makes HTTP connections to the Connection Server or security server host. If you do not want to configure this setting as a group policy, you can also enable certificate verification by adding the CertCheckMode value name to one of the following registry keys on the client computer:
Use the following values in the registry key:
If you configure both the group policy setting and the CertCheckMode setting in the Windows Registry key, the group policy setting takes precedence over the registry key value.
Note: In a future
Horizon Client release, using the Windows registry to configure this setting might not be supported and the group policy setting must be used.
|
|
Default value of the 'Log in as current user' checkbox | X | X | Specifies the default value of Log in as current user in the Options menu on the Horizon Client menu bar. This setting overrides the default value specified during Horizon Client installation. If a user runs Horizon Client from the command line and specifies the logInAsCurrentUser option, that value overrides this setting. When Log in as current user is selected in the Options menu, the identity and credential information that the user provided when logging in to the client system is passed to the Connection Server instance and ultimately to the remote desktop or published application. When Log in as current user is deselected, users must provide identity and credential information multiple times before they can access a remote desktop or published application. This setting is disabled by default. The equivalent Windows Registry value is LogInAsCurrentUser. |
Display option to Log in as current user | X | X | Determines whether Log in as current user is visible in the Options menu on the Horizon Client menu bar. When Log in as current user is visible, users can select or deselect it and override its default value. When Log in as current user is hidden, users cannot override its default value from the Horizon Client Options menu. You can specify the default value for Log in as current user by using the policy setting Default value of the 'Log in as current user' checkbox. This setting is enabled by default. The equivalent Windows Registry value is LogInAsCurrentUser_Display. |
Enable jump list integration
|
X | Determines whether a jump list appears in the Horizon Client icon on the taskbar of Windows 7 and later systems. The jump list enables users to connect to recent servers, remote desktops, and published applications. If Horizon Client is shared, you might not want users to see the names of recent desktops and published applications. You can disable the jump list by disabling this setting. This setting is enabled by default. The equivalent Windows Registry value is EnableJumplist. |
|
Enable SSL encrypted framework channel | X | X | Determines whether TLS is enabled for View 5.0 and earlier remote desktops. Before View 5.0, the data sent over port TCP 32111 to the remote desktop was not encrypted.
The equivalent Windows Registry value is EnableTicketSSLAuth. |
Configures SSL protocols and cryptographic algorithms | X | X | Configures the cipher list to restrict the use of certain cryptographic algorithms and protocols before establishing an encrypted TLS connection. The cipher list consists of one or more cipher strings separated by colons. The cipher string is case-sensitive. The default value is TLSv1.1:TLSv1.2:!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES This cipher string means that TLS v1.1 and TLS v1.2 are enabled and SSL v.2.0, SSL v3.0, and TLS v1.0 are disabled. SSL v2.0, SSL v3.0, and TLS v1.0 are no longer the approved protocols and are permanently disabled. Cipher suites use ECDHE, ECDH, and RSA with 128-bit or 256-bit AES. GCM mode is preferred. For more information, see http://www.openssl.org/docs/apps/ciphers.html. The equivalent Windows Registry value is SSLCipherList. |
Enable Single Sign-On for smart card authentication | X | Determines whether single sign-on is enabled for smart card authentication. When single sign-on is enabled, Horizon Client stores the encrypted smart card PIN in temporary memory before submitting it to Connection Server. When single sign-on is disabled, Horizon Client does not display a custom PIN dialog box. The equivalent Windows Registry value is EnableSmartCardSSO. |
|
Ignore certificate revocation problems | X | X | Determines whether errors associated with a revoked server certificate are ignored. These errors occur when the certificate that the server sends has been revoked or the client cannot verify the certificate's revocation status. This setting is disabled by default. |
Unlock remote sessions when the client machine is unlocked | X | X | Determines whether the Recursive Unlock feature is enabled. The Recursive Unlock feature unlocks all remote sessions after the client machine has been unlocked. This feature applies only after a user logs in to the server with the Log in as current user feature. This setting is enabled by default. |
The following settings appear in the
folder in the Group Policy Management Editor.Setting | Computer | User | Description |
---|---|---|---|
Allow NTLM Authentication | X | When this setting is enabled, NTLM authentication is allowed with the Log in as current user feature. When this setting is disabled, NTLM authentication is not used for any servers. When this setting is enabled, you can select Yes or No from the Allow fallback from Kerberos to NTLM drop-down menu.
When this setting is not configured, NTLM authentication is allowed for the servers listed in the Always use NTLM servers group policy setting. To use NTLM authentication, the server SSL certificate must be valid and Windows policies must not restrict the use of NTLM. For information about configuring fallback from Kerberos to NTLM in a Connection Server instance, see "Using the Log In as Current User Feature Available with Windows-Based Horizon Client" in the VMware Horizon Console Administration document. |
|
Always use NTLM for servers | X | When this setting is enabled, the Log in as current user feature always uses NTLM authentication for the listed servers. To create the server list, click Show and enter the server name in the Value column. The naming format for servers is the fully qualified domain name (FQDN). |