This document supports the version of each product listed and
supports all subsequent versions until the document is
replaced by a new edition. To check for more recent editions
of this document, see http://www.vmware.com/support/pubs.
EN-001496-00
View Installation
You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
2 VMware, Inc.
Contents
View Installation5
System Requirements for Server Components7
1
View Connection Server Requirements 7
View Administrator Requirements 9
View Composer Requirements 9
System Requirements for Guest Operating Systems13
2
Supported Operating Systems for View Agent 13
Supported Operating Systems for Standalone View Persona Management 14
Remote Display Protocol and Software Support 14
Preparing Active Directory19
3
Configuring Domains and Trust Relationships 19
Creating an OU for Remote Desktops 20
Creating OUs and Groups for Kiosk Mode Client Accounts 20
Creating Groups for Users 21
Creating a User Account for vCenter Server 21
Create a User Account for View Composer 21
Configure the Restricted Groups Policy 22
Using View Group Policy Administrative Template Files 23
Prepare Active Directory for Smart Card Authentication 23
VMware, Inc.
Installing View Composer27
4
Prepare a View Composer Database 27
Configuring an SSL Certificate for View Composer 33
Install the View Composer Service 33
Configuring Your Infrastructure for View Composer 35
Installing View Connection Server37
5
Installing the View Connection Server Software 37
Installation Prerequisites for View Connection Server 37
Install View Connection Server with a New Configuration 38
Install a Replicated Instance of View Connection Server 43
Configure a Security Server Pairing Password 49
Install a Security Server 50
Firewall Rules for View Connection Server 56
Reinstall View Connection Server with a Backup Configuration 58
Microsoft Windows Installer Command-Line Options 59
Uninstalling View Components Silently by Using MSI Command-Line Options 61
3
View Installation
Configuring SSL Certificates for View Servers63
6
Understanding SSL Certificates for View Servers 63
Overview of Tasks for Setting Up SSL Certificates 65
Obtaining a Signed SSL Certificate from a CA 66
Configure View Connection Server, Security Server, or View Composer to Use a New SSL
Certificate 67
Configure Client Endpoints to Trust Root and Intermediate Certificates 72
Configuring Certificate Revocation Checking on Server Certificates 74
Configure the PCoIP Secure Gateway to Use a New SSL Certificate 75
Setting View Administrator to Trust a vCenter Server or View Composer Certificate 79
Benefits of Using SSL Certificates Signed by a CA 79
Troubleshooting Certificate Issues on View Connection Server and Security Server 80
Configuring View for the First Time81
7
Configuring User Accounts for vCenter Server and View Composer 81
Configuring View Connection Server for the First Time 84
Configuring Horizon Client Connections 94
Replacing Default Ports for View Services 100
Sizing Windows Server Settings to Support Your Deployment 104
Configuring Event Reporting107
8
Add a Database and Database User for View Events 107
Prepare an SQL Server Database for Event Reporting 108
Configure the Event Database 109
Configure Event Logging for Syslog Servers 110
Index113
4 VMware, Inc.
View Installation
View Installation explains how to install the VMware Horizon™ with View™ server and client components.
Intended Audience
This information is intended for anyone who wants to install View. The information is written for
experienced Windows or Linux system administrators who are familiar with virtual machine technology
and datacenter operations.
VMware, Inc. 5
View Installation
6 VMware, Inc.
System Requirements for Server
Components1
Hosts that run View server components must meet specific hardware and software requirements.
This chapter includes the following topics:
“View Connection Server Requirements,” on page 7
n
“View Administrator Requirements,” on page 9
n
“View Composer Requirements,” on page 9
n
View Connection Server Requirements
View Connection Server acts as a broker for client connections by authenticating and then directing
incoming user requests to the appropriate remote desktops and applications. View Connection Server has
specific hardware, operating system, installation, and supporting software requirements.
Hardware Requirements for View Connection Server on page 8
n
You must install all View Connection Server installation types, including standard, replica, and
security server installations, on a dedicated physical or virtual machine that meets specific hardware
requirements.
Supported Operating Systems for View Connection Server on page 8
n
You must install View Connection Server on a supported Windows Server operating system.
Virtualization Software Requirements for View Connection Server on page 8
n
View Connection Server requires certain versions of VMware virtualization software.
Network Requirements for Replicated View Connection Server Instances on page 9
n
When installing replicated View Connection Server instances, you must usually configure the
instances in the same physical location and connect them over a high-performance LAN. Otherwise,
latency issues could cause the View LDAP configurations on View Connection Server instances to
become inconsistent. A user could be denied access when connecting to a View Connection Server
instance with an out-of-date configuration.
VMware, Inc.
7
View Installation
Hardware Requirements for View Connection Server
You must install all View Connection Server installation types, including standard, replica, and security
server installations, on a dedicated physical or virtual machine that meets specific hardware requirements.
Table 1‑1. View Connection Server Hardware Requirements
Hardware ComponentRequiredRecommended
ProcessorPentium IV 2.0GHz processor
or higher
Network Adapter100Mpbs NIC1Gbps NICs
Memory
Windows Server 2008 64-bit
Memory
Windows Server 2012 64-bit
These requirements also apply to replica and security server View Connection Server instances that you
install for high availability or external access.
IMPORTANT The physical or virtual machine that hosts View Connection Server must use a static IP address.
4GB RAM or higherAt least 10GB RAM for deployments of 50 or more
4GB RAM or higherAt least 10GB RAM for deployments of 50 or more
4 CPUs
remote desktops
remote desktops
Supported Operating Systems for View Connection Server
You must install View Connection Server on a supported Windows Server operating system.
The following operating systems support all View Connection Server installation types, including standard,
replica, and security server installations.
Table 1‑2. Operating System Support for View Connection Server
Operating SystemVersionEdition
Windows Server 2008 R264-bitStandard
Enterprise
Windows Server 2008 R2 SP164-bitStandard
Enterprise
Windows Server 2012 R264-bitStandard
Virtualization Software Requirements for View Connection Server
View Connection Server requires certain versions of VMware virtualization software.
If you are using vSphere, you must use a supported version of vSphere ESX/ESXi hosts and vCenter Server.
For details about which versions of View are compatible with which versions of vCenter Server and ESXi,
see the VMware Product Interoperability Matrix at
Chapter 1 System Requirements for Server Components
Network Requirements for Replicated View Connection Server Instances
When installing replicated View Connection Server instances, you must usually configure the instances in
the same physical location and connect them over a high-performance LAN. Otherwise, latency issues could
cause the View LDAP configurations on View Connection Server instances to become inconsistent. A user
could be denied access when connecting to a View Connection Server instance with an out-of-date
configuration.
IMPORTANT To use a group of replicated View Connection Server instances across a WAN, MAN
(metropolitan area network), or other non-LAN, in scenarios where a View deployment needs to span
datacenters, you must use the Cloud Pod Architecture feature. You can link together four View pods to
provide a single large desktop brokering and management environment for two geographically distant sites
and manage up to 20,000 remote desktops. For more information, see Administering ViewCloud Pod Architecture.
View Administrator Requirements
Administrators use View Administrator to configure View Connection Server, deploy and manage remote
desktops and applications, control user authentication, initiate and examine system events, and carry out
analytical activities. Client systems that run View Administrator must meet certain requirements.
View Administrator is a Web-based application that is installed when you install View Connection Server.
You can access and use View Administrator with the following Web browsers:
Internet Explorer 8
n
Internet Explorer 9
n
Internet Explorer 10 (from a Windows 8 system in Desktop mode)
n
Firefox 6 and later releases
n
To use View Administrator with your Web browser, you must install Adobe Flash Player 10.1 or later. Your
client system must have access to the Internet to allow Adobe Flash Player to be installed.
The computer on which you launch View Administrator must trust the root and intermediate certificates of
the server that hosts View Connection Server. The supported browsers already contain certificates for all of
the well-known certificate authorities (CAs). If your certificates come from a CA that is not well known, you
must follow the instructions in the View Installation document about importing root and intermediate
certificates.
To display text properly, View Administrator requires Microsoft-specific fonts. If your Web browser runs on
a non-Windows operating system such as Linux, UNIX, or Mac OS X, make sure that Microsoft-specific
fonts are installed on your computer.
Currently, the Microsoft Web site does not distribute Microsoft fonts, but you can download them from
independent Web sites.
View Composer Requirements
With View Composer, you can deploy multiple linked-clone desktops from a single centralized base image.
View Composer has specific installation and storage requirements.
Supported Operating Systems for View Composer on page 10
n
View Composer supports 64-bit operating systems with specific requirements and limitations. You can
install View Composer on the same physical or virtual machine as vCenter Server or on a separate
server.
VMware, Inc. 9
View Installation
Hardware Requirements for Standalone View Composer on page 10
n
If you install View Composer on a different physical or virtual machine from the one used for
vCenter Server, you must use a dedicated machine that meets specific hardware requirements.
Database Requirements for View Composer on page 10
n
View Composer requires an SQL database to store data. The View Composer database must reside on,
or be available to, the View Composer server host.
Supported Operating Systems for View Composer
View Composer supports 64-bit operating systems with specific requirements and limitations. You can
install View Composer on the same physical or virtual machine as vCenter Server or on a separate server.
Table 1‑3. Operating System Support for View Composer
Operating SystemVersionEdition
Windows Server 2008 R264-bitStandard
Windows Server 2008 R2 SP164-bitStandard
Windows Server 2012 R264-bitStandard
Enterprise
Enterprise
If you plan to install View Composer on a different physical or virtual machine than vCenter Server, see
“Hardware Requirements for Standalone View Composer,” on page 10.
Hardware Requirements for Standalone View Composer
If you install View Composer on a different physical or virtual machine from the one used for
vCenter Server, you must use a dedicated machine that meets specific hardware requirements.
A standalone View Composer installation works with vCenter Server installed on a separate Windows
Server machine or with the Linux-based vCenter Server appliance. VMware recommends having a one-toone mapping between each View Composer service and vCenter Server instance.
Table 1‑4. View Composer Hardware Requirements
Hardware ComponentRequiredRecommended
Processor1.4 GHz or faster Intel 64 or
AMD 64 processor with 2 CPUs
NetworkingOne or more 10/100Mbps
network interface cards (NICs)
Memory4GB RAM or higher8GB RAM or higher for deployments of 50 or more
Disk space40GB60GB
IMPORTANT The physical or virtual machine that hosts View Composer must use a static IP address.
2GHz or faster and 4 CPUs
1Gbps NICs
remote desktops
Database Requirements for View Composer
View Composer requires an SQL database to store data. The View Composer database must reside on, or be
available to, the View Composer server host.
If a database server instance already exists for vCenter Server, View Composer can use that existing instance
if it is a version listed in Table 1-5. For example, View Composer can use the Microsoft SQL Server instance
provided with vCenter Server. If a database server instance does not already exist, you must install one.
10 VMware, Inc.
Chapter 1 System Requirements for Server Components
View Composer supports a subset of the database servers that vCenter Server supports. If you are already
using vCenter Server with a database server that is not supported by View Composer, continue to use that
database server for vCenter Server and install a separate database server to use for View Composer and
View database events.
IMPORTANT If you create the View Composer database on the same SQL Server instance as vCenter Server,
do not overwrite the vCenter Server database.
The following table lists the supported database servers and versions. For a complete list of database
versions supported with vCenter Server, see the VMware Product Interoperability Matrixes at
The versions of vCenter Server listed in the table column headings are general. For specific supported
update versions of each vCenter Server release, see the VMware Product Interoperability Matrixes at
Table 1‑5. Supported Database Servers for View Composer
Database
Microsoft SQL Server 2012 Express
(32- and 64-bit)
Microsoft SQL Server 2012 (SP1) Standard and Enterprise
(32- and 64-bit)
Microsoft SQL Server 2008 Express (R2 SP2)
(64-bit)
Microsoft SQL Server 2008 (SP3), Standard, Enterprise, and
Datacenter
(32- and 64-bit)
Microsoft SQL Server 2008 (R2 SP2), Standard and Enterprise
(32- and 64-bit)
Oracle 10g Release 2, Standard, Standard ONE, and Enterprise
[10.2.0.4]
(32- and 64-bit)
Oracle 11g Release 2, Standard, Standard ONE, and Enterprise
[11.2.0.3]
(32- and 64-bit)
vCenter
Server
5.5
YesYesYesNo
YesYesYesNo
NoYesYesNo
NoYesYesYes
YesYesYesYes
NoYesYesYes
YesYesYesYes
vCenter
Server
5.1
vCenter
Server
5.0
vCenter
Server 4.1
VMware, Inc. 11
View Installation
12 VMware, Inc.
System Requirements for Guest
Operating Systems2
Systems running View Agent or Standalone View Persona Management must meet certain hardware and
software requirements.
This chapter includes the following topics:
“Supported Operating Systems for View Agent,” on page 13
n
“Supported Operating Systems for Standalone View Persona Management,” on page 14
n
“Remote Display Protocol and Software Support,” on page 14
n
Supported Operating Systems for View Agent
The View Agent component assists with session management, single sign-on, device redirection, and other
features. You must install View Agent on all virtual machines, physical systems, and RDS hosts.
The following table lists the Windows operating system versions that are supported on virtual machines in a
desktop pool.
Table 2‑1. Operating Systems for Linked-Clone and Full-Clone Remote Desktops
Guest Operating SystemVersionEditionService Pack
Windows 8.164-bit and 32-bitEnterprise and
Professional
Windows 864-bit and 32-bitEnterprise and
Professional
Windows 764-bit and 32-bitEnterprise and
Professional
Windows Vista32-bitBusiness and
Enterprise
Windows XP32-bitProfessionalSP3
Windows Server 2008 R264-bitDatacenterSP1
None and Update
None
None and SP1
SP2
VMware, Inc.
IMPORTANT The virtual machine version must support the guest operating system. For example, to install
Windows 8.1, you must use a vSphere 5.1 or later virtual machine.
To use the View Persona Management setup option with View Agent, you must install View Agent on
Windows 8, Windows 7, Windows Vista, or Windows XP virtual machines. This option does not operate on
physical computers or RDS hosts.
You can install the standalone version of View Persona Management on physical computers. See
“Supported Operating Systems for Standalone View Persona Management,” on page 14.
13
View Installation
The following table lists the Windows operating systems versions that are supported for creating desktop
pools and application pools on an RDS host.
Table 2‑2. Operating Systems for RDS Hosts, Providing Remote Desktops or Applications
Guest Operating SystemEditionService Pack
Windows Server 2008 R2Standard, Enterprise, and
Datacenter
Windows Server 2012Standard and DatacenterNone
Windows Server 2012 R2Standard and DatacenterNone
SP1
Supported Operating Systems for Standalone View Persona
Management
The standalone View Persona Management software provides persona management for standalone physical
computers and virtual machines that do not have View Agent 5.x installed. When users log in, their profiles
are downloaded dynamically from a remote profile repository to their standalone systems.
NOTE To configure View Persona Management for View desktops, install View Agent with the View
Persona Management setup option. The standalone View Persona Management software is intended for
non-View systems only.
Table 2-3 lists the operating systems supported for the standalone View Persona Management software.
Table 2‑3. Operating System Support for Standalone View Persona Management
Guest Operating SystemVersionEditionService Pack
Windows 864-bit and 32-bitPro - Desktop and Enterprise -
Desktop
Windows 764-bit and 32-bitEnterprise and ProfessionalNone and SP1
Windows Vista32-bitBusiness and EnterpriseSP1 and SP2
Windows XP32-bitProfessionalSP3
The standalone View Persona Management software is not supported on Microsoft Terminal Services or
Microsoft Remote Desktop Services.
Remote Display Protocol and Software Support
Remote display protocols and software provide access to remote desktops and applications. The remote
display protocol used depends on the type of client device, whether you are connecting to a remote desktop
or a remote application, and how the administrator configures the desktop or application pool.
PCoIP on page 15
n
PCoIP (PC over IP) provides an optimized desktop experience for the delivery of a remote application
or an entire remote desktop environment, including applications, images, audio, and video content for
a wide range of users on the LAN or across the WAN. PCoIP can compensate for an increase in latency
or a reduction in bandwidth, to ensure that end users can remain productive regardless of network
conditions.
N/A
Microsoft RDP on page 16
n
Remote Desktop Protocol is the same multichannel protocol many people already use to access their
work computer from their home computer. Microsoft Remote Desktop Connection (RDC) uses RDP to
transmit data.
14 VMware, Inc.
Chapter 2 System Requirements for Guest Operating Systems
PCoIP
PCoIP (PC over IP) provides an optimized desktop experience for the delivery of a remote application or an
entire remote desktop environment, including applications, images, audio, and video content for a wide
range of users on the LAN or across the WAN. PCoIP can compensate for an increase in latency or a
reduction in bandwidth, to ensure that end users can remain productive regardless of network conditions.
PCoIP is supported as the display protocol for remote applications and for remote desktops that use virtual
machines, physical machines that contain Teradici host cards, or shared session desktops on an RDS host.
PCoIP Features
Key features of PCoIP include the following:
Users outside the corporate firewall can use this protocol with your company's virtual private network
n
(VPN), or users can make secure, encrypted connections to a security server in the corporate DMZ.
Advanced Encryption Standard (AES) 128-bit encryption is supported and is turned on by default. You
n
can, however, change the encryption key cipher to AES-192 or AES-256.
Connections to Windows desktops with the View Agent operating system versions listed in “Supported
n
Operating Systems for View Agent,” on page 13 are supported.
Connections from all types of client devices.
n
Optimization controls for reducing bandwidth usage on the LAN and WAN.
n
32-bit color is supported for virtual displays.
n
ClearType fonts are supported.
n
Audio redirection with dynamic audio quality adjustment for LAN and WAN.
n
Real-Time Audio-Video for using webcams and microphones on some client types.
n
Copy and paste of text and, on some clients, images between the client operating system and a remote
n
application or desktop. For other client types, only copy and paste of plain text is supported. You
cannot copy and paste system objects such as folders and files between systems.
Multiple monitors are supported for some client types. For example, on Windows-based clients, you
n
can use up to four monitors and adjust the resolution for each monitor separately, with a resolution of
up to 2560 x 1600 per display. Pivot display and autofit are also supported.
When the 3D feature is enabled, up to 2 monitors are supported with a resolution of up to 1920 x 1200.
USB redirection is supported for some client types.
n
MMR redirection is supported for some Windows client operating systems and some remote desktop
n
operating systems (with View Agent-installed).
For information about which desktop operating systems support specific PCoIP features, see "Feature
Support Matrix for View Agent" in the View Architecture Planning document.
For information about which client devices support specific PCoIP features, go to
Recommended operating system settings for remote desktops include the following settings:
For Windows XP desktops: 768MB RAM or more and a single CPU.
n
VMware, Inc. 15
View Installation
n
Video Quality Requirements
For Windows 7 or 8 desktops or Windows Server 2012 or R2 desktops: 1GB of RAM or more and a dual
CPU is recommended for playing in high-definition, full screen mode, or 720p or higher formatted
video. To use Virtual Dedicated Graphics Acceleration for graphics-intensive applications such as CAD
applications, 4GB of RAM is required.
480p-formatted video
720p-formatted video
1080p-formatted video
3D rendering
You can play video at 480p or lower at native resolutions when the remote
desktop has a single virtual CPU. If the operating system is Windows 7 or
later and you want to play the video in high-definition Flash or in full screen
mode, the desktop requires a dual virtual CPU. Even with a dual virtual
CPU desktop, as low as 360p-formatted video played in full screen mode can
lag behind audio, particularly on Windows clients.
You can play video at 720p at native resolutions if the remote desktop has a
dual virtual CPU. Performance might be affected if you play videos at 720p
in high definition or in full screen mode.
If the remote desktop has a dual virtual CPU, you can play 1080p formatted
video, although the media player might need to be adjusted to a smaller
window size.
You can configure remote desktops to use software- or hardware-accelerated
graphics. The software-accelerated graphics feature enables you to run
DirectX 9 and OpenGL 2.1 applications without requiring a physical graphics
processing unit (GPU). The hardware-accelerated graphics features enable
virtual machines to either share the physical GPUs (graphical processing
unit) on a vSphere host or dedicate a physical GPU to a single virtual
machine desktop.
For 3D applications, up to 2 monitors are supported, and the maximum
screen resolution is 1920 x 1200. The guest operating system on the remote
desktops must be Windows 7 or later.
Hardware Requirements for Client Systems
For information about processor and memory requirements, see the "Using VMware Horizon Client"
document for the specific type of desktop or mobile client device. Go to
Remote Desktop Protocol is the same multichannel protocol many people already use to access their work
computer from their home computer. Microsoft Remote Desktop Connection (RDC) uses RDP to transmit
data.
Microsoft RDP is a supported display protocol for remote desktops that use virtual machines, physical
machines, or shared session desktops on an RDS host. (Only the PCoIP display protocol is supported for
remote applications.) Microsoft RDP provides the following features:
With RDP 6, you can use multiple monitors in span mode. RDP 7 has true multiple monitor support, for
n
up to 16 monitors.
You can copy and paste text and system objects such as folders and files between the local system and
n
the remote desktop.
32-bit color is supported for virtual displays.
n
RDP supports 128-bit encryption.
n
16 VMware, Inc.
Chapter 2 System Requirements for Guest Operating Systems
Users outside the corporate firewall can use this protocol with your company's virtual private network
n
(VPN), or users can make secure, encrypted connections to a View security server in the corporate
DMZ.
NOTE For Windows XP desktop virtual machines, you must install the RDP patches listed in Microsoft
Knowledge Base (KB) articles 323497 and 884020. If you do not install the RDP patches, a Windows Sockets
failed error message might appear on the client.
Hardware Requirements for Client Systems
For information about processor and memory requirements, see the "Using VMware Horizon Client"
document for the specific type of client system. Go to
NOTE Mobile client devices use only the PCoIP display protocol.
VMware, Inc. 17
View Installation
18 VMware, Inc.
Preparing Active Directory3
View uses your existing Microsoft Active Directory infrastructure for user authentication and management.
You must perform certain tasks to prepare Active Directory for use with View.
View supports the following Active Directory Domain Services (AD DS) domain functional levels:
Windows Server 2003
n
Windows Server 2008
n
Windows Server 2008 R2
n
Windows Server 2012
n
Windows Server 2012 R2
n
This chapter includes the following topics:
“Configuring Domains and Trust Relationships,” on page 19
n
“Creating an OU for Remote Desktops,” on page 20
n
“Creating OUs and Groups for Kiosk Mode Client Accounts,” on page 20
n
“Creating Groups for Users,” on page 21
n
“Creating a User Account for vCenter Server,” on page 21
n
“Create a User Account for View Composer,” on page 21
n
“Configure the Restricted Groups Policy,” on page 22
n
“Using View Group Policy Administrative Template Files,” on page 23
n
“Prepare Active Directory for Smart Card Authentication,” on page 23
n
Configuring Domains and Trust Relationships
You must join each View Connection Server host to an Active Directory domain. The host must not be a
domain controller. You place remote desktops in the same domain as the View Connection Server host or in
a domain that has a two-way trust relationship with the View Connection Server host's domain. Specifically
this must be an external non-transitive two-way trust.
You can entitle users and groups in the View Connection host's domain to remote desktops and
applications. You can also select users and groups from the View Connection Server host's domain to be
administrators in View Administrator. To entitle or select users and groups from a different domain, you
must establish a two-way trust relationship between that domain and the View Connection Server host's
domain.
VMware, Inc.
19
View Installation
Users are authenticated against Active Directory for the View Connection Server host's domain and against
any additional user domains with which a trust agreement exists.
NOTE Because security servers do not access any authentication repositories, including Active Directory,
they do not need to reside in an Active Directory domain.
Trust Relationships and Domain Filtering
To determine which domains it can access, a View Connection Server instance traverses trust relationships
beginning with its own domain.
For a small, well-connected set of domains, View Connection Server can quickly determine the full list of
domains, but the time that it takes increases as the number of domains increases or as the connectivity
between the domains decreases. The list might also include domains that you would prefer not to offer to
users when they connect to their remote desktops and applications.
You can use the vdmadmin command to configure domain filtering to limit the domains that a View
Connection Server instance searches and that it displays to users. See the View Administration document for
more information.
Creating an OU for Remote Desktops
You should create an organizational unit (OU) specifically for your remote desktops. An OU is a subdivision
in Active Directory that contains users, groups, computers, or other OUs.
To prevent group policy settings from being applied to other Windows servers or workstations in the same
domain as your desktops, you can create a GPO for your View group policies and link it to the OU that
contains your remote desktops. You can also delegate control of the OU to subordinate groups, such as
server operators or individual users.
If you use View Composer, you should create a separate Active Directory container for linked-clone
desktops that is based on the OU for your remote desktops. Administrators that have OU administrator
privileges in Active Directory can provision linked-clone desktops without domain administrator privileges.
If you change administrator credentials in Active Directory, you must also update the credential
information in View Composer.
Creating OUs and Groups for Kiosk Mode Client Accounts
A client in kiosk mode is a thin client or a locked-down PC that runs the client software to connect to a View
Connection Server instance and launch a remote desktop session. If you configure clients in kiosk mode, you
should create dedicated OUs and groups in Active Directory for kiosk mode client accounts.
Creating dedicated OUs and groups for kiosk mode client accounts partitions client systems against
unwarranted intrusion and simplifies client configuration and administration.
See the View Administration document for more information.
20 VMware, Inc.
Creating Groups for Users
You should create groups for different types of users in Active Directory. For example, you can create a
group called View Users for your end users and another group called View Administrators for users that
will administer remote desktops and applications.
Creating a User Account for vCenter Server
You must create a user account in Active Directory to use with vCenter Server. You specify this user account
when you add a vCenter Server instance in View Administrator.
The user account must be in the same domain as your View Connection Server host or in a trusted domain.
If you use View Composer, you must add the user account to the local Administrators group on the vCenter
Server computer.
You must give the user account privileges to perform certain operations in vCenter Server. If you use View
Composer, you must give the user account additional privileges. See “Configuring User Accounts for
vCenter Server and View Composer,” on page 81 for information on configuring these privileges.
Create a User Account for View Composer
If you use View Composer, you must create a user account in Active Directory to use with View Composer.
View Composer requires this account to join linked-clone virtual machines to your Active Directory domain.
Chapter 3 Preparing Active Directory
To ensure security, you should create a separate user account to use with View Composer. By creating a
separate account, you can guarantee that it does not have additional privileges that are defined for another
purpose. You can give the account the minimum privileges that it needs to create and remove computer
objects in a specified Active Directory container. For example, the View Composer account does not require
domain administrator privileges.
Procedure
1In Active Directory, create a user account in the same domain as your View Connection Server host or
in a trusted domain.
2Add the Create Computer Objects, Delete Computer Objects, and Write All Properties permissions to
the account in the Active Directory container in which the linked-clone computer accounts are created
or to which the linked-clone computer accounts are moved.
The following list shows all the required permissions for the user account, including permissions that
are assigned by default:
List Contents
n
Read All Properties
n
Write All Properties
n
Read Permissions
n
Reset Password
n
Create Computer Objects
n
VMware, Inc. 21
View Installation
Delete Computer Objects
n
NOTE If you select the Allow reuse of pre-existing computer accounts setting for a desktop pool, you
only need to add the following permissions:
List Contents
n
Read All Properties
n
Read Permissions
n
Reset Password
n
3Make sure that the user account's permissions apply to the Active Directory container and to all child
objects of the container.
What to do next
Specify the account in View Administrator when you configure View Composer for vCenter Server and
when you configure and deploy linked-clone desktop pools.
Configure the Restricted Groups Policy
To be able to connect to a remote desktop, users must belong to the local Remote Desktop Users group of
the remote desktop. You can use the Restricted Groups policy in Active Directory to add users or groups to
the local Remote Desktop Users group of every remote desktop that is joined to your domain.
The Restricted Groups policy sets the local group membership of computers in the domain to match the
membership list settings defined in the Restricted Groups policy. The members of your remote desktop
users group are always added to the local Remote Desktop Users group of every remote desktop that is
joined to your domain. When adding new users, you need only add them to your remote desktop users
group.
Prerequisites
Create a group for remote desktop users in your domain in Active Directory.
Procedure
1On the Active Directory server, navigate to the Group Policy Management plug-in.
AD VersionNavigation Path
Windows 2003
Windows 2008
aSelect Start > All Programs > Administrative Tools > Active Directory
Users and Computers.
b Right-click your domain and click Properties.
cOn the Group Policy tab, click Open to open the Group Policy
Management plug-in.
d Right-click Default Domain Policy, and click Edit.
a Select Start > Administrative Tools > Group Policy Management.
b Expand your domain, right-click Default Domain Policy, and click
Edit.
2Expand the Computer Configuration section and open Windows Settings\Security Settings.
3Right-click Restricted Groups, select Add Group, and add the Remote Desktop Users group.
4Right-click the new restricted Remote Desktop Users group and add your remote desktop users group
to the group membership list.
5Click OK to save your changes.
22 VMware, Inc.
Chapter 3 Preparing Active Directory
Using View Group Policy Administrative Template Files
View includes several component-specific group policy administrative (ADM and ADMX) template files.
All ADM and ADMX files that provide group policy settings for View are available in a bundled .zip file
named VMware-Horizon-View-GPO-Bundle-x.x.x-yyyyyyy.zip, where x.x.x is the version and yyyyyyy is the
build number. You can download the file from the VMware Horizon (with View) download site at
http://www.vmware.com/go/downloadview.
You can optimize and secure remote desktops by adding the policy settings in these files to a new or
existing GPO in Active Directory and then linking that GPO to the OU that contains your desktops.
See the View Administration and Setting Up Desktop and Application Pools in View documents for information
on using View group policy settings.
Prepare Active Directory for Smart Card Authentication
You might need to perform certain tasks in Active Directory when you implement smart card
authentication.
Add UPNs for Smart Card Users on page 23
n
Because smart card logins rely on user principal names (UPNs), the Active Directory accounts of users
and administrators that use smart cards to authenticate in View must have a valid UPN.
Add the Root Certificate to Trusted Root Certification Authorities on page 24
n
If you use a certification authority (CA) to issue smart card login or domain controller certificates, you
must add the root certificate to the Trusted Root Certification Authorities group policy in Active
Directory. You do not need to perform this procedure if the Windows domain controller acts as the
root CA.
Add an Intermediate Certificate to Intermediate Certification Authorities on page 25
n
If you use an intermediate certification authority (CA) to issue smart card login or domain controller
certificates, you must add the intermediate certificate to the Intermediate Certification Authorities
group policy in Active Directory.
Add the Root Certificate to the Enterprise NTAuth Store on page 25
n
If you use a CA to issue smart card login or domain controller certificates, you must add the root
certificate to the Enterprise NTAuth store in Active Directory. You do not need to perform this
procedure if the Windows domain controller acts as the root CA.
Add UPNs for Smart Card Users
Because smart card logins rely on user principal names (UPNs), the Active Directory accounts of users and
administrators that use smart cards to authenticate in View must have a valid UPN.
If the domain a smart card user resides in is different from the domain that your root certificate was issued
from, you must set the user’s UPN to the Subject Alternative Name (SAN) contained in the root certificate of
the trusted CA. If your root certificate was issued from a server in the smart card user's current domain, you
do not need to modify the user's UPN.
NOTE You might need to set the UPN for built-in Active Directory accounts, even if the certificate is issued
from the same domain. Built-in accounts, including Administrator, do not have a UPN set by default.
Prerequisites
Obtain the SAN contained in the root certificate of the trusted CA by viewing the certificate properties.
n
VMware, Inc. 23
View Installation
If the ADSI Edit utility is not present on your Active Directory server, download and install the
n
appropriate Windows Support Tools from the Microsoft Web site.
Procedure
1On your Active Directory server, start the ADSI Edit utility.
2In the left pane, expand the domain the user is located in and double-click CN=Users.
3In the right pane, right-click the user and then click Properties.
4Double-click the userPrincipalName attribute and type the SAN value of the trusted CA certificate.
5Click OK to save the attribute setting.
Add the Root Certificate to Trusted Root Certification Authorities
If you use a certification authority (CA) to issue smart card login or domain controller certificates, you must
add the root certificate to the Trusted Root Certification Authorities group policy in Active Directory. You
do not need to perform this procedure if the Windows domain controller acts as the root CA.
Procedure
1On the Active Directory server, navigate to the Group Policy Management plug-in.
AD VersionNavigation Path
Windows 2003
Windows 2008
a Select Start > All Programs > Administrative Tools > Active Directory
Users and Computers.
b Right-click your domain and click Properties.
cOn the Group Policy tab, click Open to open the Group Policy
Management plug-in.
d Right-click Default Domain Policy, and click Edit.
a Select Start > Administrative Tools > Group Policy Management.
b Expand your domain, right-click Default Domain Policy, and click
Edit.
2Expand the Computer Configuration section and open Windows Settings\Security Settings\Public
Key.
3Right-click Trusted Root Certification Authorities and select Import.
4Follow the prompts in the wizard to import the root certificate (for example, rootCA.cer) and click OK.
5Close the Group Policy window.
All of the systems in the domain now have a copy of the root certificate in their trusted root store.
What to do next
If an intermediate certification authority (CA) issues your smart card login or domain controller certificates,
add the intermediate certificate to the Intermediate Certification Authorities group policy in Active
Directory. See “Add an Intermediate Certificate to Intermediate Certification Authorities,” on page 25.
24 VMware, Inc.
Chapter 3 Preparing Active Directory
Add an Intermediate Certificate to Intermediate Certification Authorities
If you use an intermediate certification authority (CA) to issue smart card login or domain controller
certificates, you must add the intermediate certificate to the Intermediate Certification Authorities group
policy in Active Directory.
Procedure
1On the Active Directory server, navigate to the Group Policy Management plug-in.
AD VersionNavigation Path
Windows 2003
Windows 2008
2Expand the Computer Configuration section and open the policy for Windows Settings\Security
Settings\Public Key.
a Select Start > All Programs > Administrative Tools > Active Directory
Users and Computers.
b Right-click your domain and click Properties.
cOn the Group Policy tab, click Open to open the Group Policy
Management plug-in.
d Right-click Default Domain Policy, and click Edit.
a Select Start > Administrative Tools > Group Policy Management.
b Expand your domain, right-click Default Domain Policy, and click
Edit.
3Right-click Intermediate Certification Authorities and select Import.
4Follow the prompts in the wizard to import the intermediate certificate (for example,
intermediateCA.cer) and click OK.
5Close the Group Policy window.
All of the systems in the domain now have a copy of the intermediate certificate in their intermediate
certification authority store.
Add the Root Certificate to the Enterprise NTAuth Store
If you use a CA to issue smart card login or domain controller certificates, you must add the root certificate
to the Enterprise NTAuth store in Active Directory. You do not need to perform this procedure if the
Windows domain controller acts as the root CA.
Procedure
On your Active Directory server, use the certutil command to publish the certificate to the Enterprise
u
NTAuth store.
For example: certutil -dspublish -f path_to_root_CA_cert NTAuthCA
The CA is now trusted to issue certificates of this type.
VMware, Inc. 25
View Installation
26 VMware, Inc.
Installing View Composer4
To use View Composer, you create a View Composer database, install the View Composer service, and
optimize your View infrastructure to support View Composer. You can install the View Composer service
on the same host as vCenter Server or on a separate host.
View Composer is an optional feature. Install View Composer if you intend to deploy linked-clone desktop
pools.
You must have a license to install and use the View Composer feature.
This chapter includes the following topics:
“Prepare a View Composer Database,” on page 27
n
“Configuring an SSL Certificate for View Composer,” on page 33
n
“Install the View Composer Service,” on page 33
n
“Configuring Your Infrastructure for View Composer,” on page 35
n
Prepare a View Composer Database
You must create a database and data source name (DSN) to store View Composer data.
VMware, Inc.
The View Composer service does not include a database. If a database instance does not exist in your
network environment, you must install one. After you install a database instance, you add the View
Composer database to the instance.
You can add the View Composer database to the instance on which the vCenter Server database is located.
You can configure the database locally, or remotely, on a network-connected Linux, UNIX, or Windows
Server computer.
The View Composer database stores information about connections and components that are used by View
Composer:
vCenter Server connections
n
Active Directory connections
n
Linked-clone desktops that are deployed by View Composer
n
Replicas that are created by View Composer
n
Each instance of the View Composer service must have its own View Composer database. Multiple View
Composer services cannot share a View Composer database.
For a list of supported database versions, see “Database Requirements for View Composer,” on page 10.
To add a View Composer database to an installed database instance, choose one of these procedures.
27
View Installation
Create a SQL Server Database for View Composer on page 28
n
View Composer can store linked-clone desktop information in a SQL Server database. You create a
View Composer database by adding it to SQL Server and configuring an ODBC data source for it.
Create an Oracle Database for View Composer on page 30
n
View Composer can store linked-clone desktop information in an Oracle 11g or 10g database. You
create a View Composer database by adding it to an existing Oracle instance and configuring an
ODBC data source for it. You can add a new View Composer database by using the Oracle Database
Configuration Assistant or by running a SQL statement.
Create a SQL Server Database for View Composer
View Composer can store linked-clone desktop information in a SQL Server database. You create a View
Composer database by adding it to SQL Server and configuring an ODBC data source for it.
Add a View Composer Database to SQL Server
You can add a new View Composer database to an existing Microsoft SQL Server instance to store linkedclone data for View Composer.
If the database resides locally, on the system on which View Composer will be installed, you can use the
Integrated Windows Authentication security model. If the database resides on a remote system, you cannot
use this method of authentication.
Prerequisites
Verify that a supported version of SQL Server is installed on the computer on which you will install
n
View Composer or in your network environment. For details, see “Database Requirements for View
Composer,” on page 10.
Verify that you use SQL Server Management Studio or SQL Server Management Studio Express to
n
create and administer the data source. You can download and install SQL Server Management Studio
Express from the following Web site.
1On the View Composer computer, select Start > All Programs > Microsoft SQL Server 2008 or
Microsoft SQL Server 2005.
2Select SQL Server Management Studio Express and connect to the existing SQL Server instance for
vSphere Management.
3In the Object Explorer panel, right-click the Databases entry and select New Database.
4In the New Database dialog box, type a name in the Database name text box.
For example: viewComposer
5Click OK.
SQL Server Management Studio Express adds your database to the Databases entry in the Object
Explorer panel.
6Exit Microsoft SQL Server Management Studio Express.
What to do next
Follow the instructions in “Add an ODBC Data Source to SQL Server,” on page 29.
28 VMware, Inc.
Chapter 4 Installing View Composer
Add an ODBC Data Source to SQL Server
After you add a View Composer database to SQL Server, you must configure an ODBC connection to the
new database to make this data source visible to the View Composer service.
When you configure an ODBC DSN for View Composer, secure the underlying database connection to an
appropriate level for your environment. For information about securing database connections, see the SQL
Server documentation.
If the underlying database connection uses SSL encryption, we recommend that you configure your
database servers with SSL certificates signed by a trusted CA. If you use self-signed certificates, your
database connections might be susceptible to man-in-the-middle attacks.
Prerequisites
Complete the steps described in “Add a View Composer Database to SQL Server,” on page 28.
Procedure
1On the computer on which View Composer will be installed, select Start > Administrative Tools > Data
Source (ODBC).
2Select the System DSN tab.
3Click Add and select SQL Native Client from the list.
4Click Finish.
5In the Create a New Data Source to SQL Server setup wizard, type a name and description of the View
Composer database.
For example: ViewComposer
6In the Server text box, type the SQL Server database name.
Use the form host_name\server_name, where host_name is the name of the computer and server_name is
the SQL Server instance.
For example: VCHOST1\VIM_SQLEXP
7Click Next.
8Make sure that the Connect to SQL Server to obtain default settings for the additional configuration
options check box is selected and select an authentication option.
OptionDescription
Windows NT authentication
SQL Server authentication
Select this option if you are using a local instance of SQL Server. This
option is also known as trusted authentication. Windows NT
authentication is supported only if SQL Server is running on the local
computer.
Select this option if you are using a remote instance of SQL Server.
Windows NT authentication is not supported on remote SQL Server.
9Click Next.
10 Select the Change the default database to check box and select the name of the View Composer
database from the list.
For example: ViewComposer
11 If the SQL Server connection is configured with SSL enabled, navigate to the Microsoft SQL Server DSN
Configuration page and select Use strong encryption for data.
12 Finish and close the Microsoft ODBC Data Source Administrator wizard.
VMware, Inc. 29
View Installation
What to do next
Install the new View Composer service. See “Install the View Composer Service,” on page 33.
Create an Oracle Database for View Composer
View Composer can store linked-clone desktop information in an Oracle 11g or 10g database. You create a
View Composer database by adding it to an existing Oracle instance and configuring an ODBC data source
for it. You can add a new View Composer database by using the Oracle Database Configuration Assistant or
by running a SQL statement.
Add a View Composer Database to Oracle 11g or 10g on page 30
n
You can use the Oracle Database Configuration Assistant to add a new View Composer database to an
existing Oracle 11g or 10g instance.
Use a SQL Statement to Add a View Composer Database to an Oracle Instance on page 31
n
The View Composer database must have certain table spaces and privileges. You can use a SQL
statement to create the View Composer database in an Oracle 11g or 10g database instance.
Configure an Oracle Database User for View Composer on page 31
n
By default, the database user that runs the View Composer database has Oracle system administrator
permissions. To restrict the security permissions for the user that runs the View Composer database,
you must configure an Oracle database user with specific permissions.
Add an ODBC Data Source to Oracle 11g or 10g on page 32
n
After you add a View Composer database to an Oracle 11g or 10g instance, you must configure an
ODBC connection to the new database to make this data source visible to the View Composer service.
Add a View Composer Database to Oracle 11g or 10g
You can use the Oracle Database Configuration Assistant to add a new View Composer database to an
existing Oracle 11g or 10g instance.
Prerequisites
Verify that a supported version of Oracle 11g or 10g is installed on the local or remote computer. See
“Database Requirements for View Composer,” on page 10.
Procedure
1Start the Database Configuration Assistant on the computer on which you are adding the View
Composer database.
Database VersionAction
Oracle 11g
Oracle 10g
2On the Operations page, select Create a database.