Complete these high-level tasks to install Horizon and configure an initial deployment.
Review the system requirements for all of the Horizon components that you plan to install. For more information, see System Requirements for Server Components and System Requirements for Guest Operating Systems.
- Set up the required administrator users and groups in Active Directory.
- If you have not yet done so, install and set up VMware ESXi servers and vCenter Server.
See the VMware vSphere documentation on the VMware Documentation Web site.
- Install and set up Horizon Connection Server.
- Configure SSL certificates for Horizon servers. See Configuring TLS Certificates for VMWare Horizon Servers.
- Complete the initial set-up of your Horizon environment. See Configuring Horizon for the First Time.
- Create desktop pools that run on virtual desktop machines.
- Create one or more virtual machines that can be used as a template VM for full-clone desktop pools.
- To create an instant-clone desktop pool, see Creating and Managing Instant-Clone Desktop Pools.
- To create a full-clone desktop pool, see Creating and Managing Automated Full-Clone Desktop Pools.
- To create a manual desktop pool, see Creating and Managing Manual Desktop Pools.
- Create desktop and application pools that run on session-based Remote Desktop Services (RDS) hosts.
- Control user access to desktops and applications.
- Install Horizon Client on end users' machines and mobile devices and have end users access their remote desktops and applications.
See the VMware Horizon Clients documentation Web page.
Your initial configuration of Horizon is completed.
What to do next
After you have successfully installed and configured your Horizon environment, you can perform the following additional configuration tasks.
- Create and configure additional administrators to allow different levels of access to specific inventory objects and settings. See Configuring Role-Based Delegated Administration.
- Configure policies to control the behavior of Horizon components, desktop and application pools, Remote Desktop Services, and users. See Configuring Policies for Desktop and Application Pools.
- For added security, integrate smart card authentication and two-factor authentication solutions such as RSA SecurID and RADIUS. See Setting Up Other Types of User Authentication.