11. Ensuring Seamless Single Sign-ON Integration with Horizon and Omnissa Access
Traditionally when authenticating to Omnissa Access using a 3rd party authentication method, the user we will by default, not have a Single-Sign On experience when trying to launch any Horizon based resource through Omnissa Access.
Traditionally when using a password based authentication method Omnissa Access would cache the original authentication against Access and then pass this on when required to the Broker.
Traditionally Single-Sign On would only be an issue when using a 3rd Party authentication method. To solve this problem we would deploy what is known as the Horizon Enrollment services to facilitate a single-sign on experience. We integrate with Microsoft Certificate Services to provide a solution to this challenge and we refer to the solution as Horizon TRUE SSO
Since December 2019
When connecting to Horizon Resources via Omnissa Access. Caching of Passwords for Horizon has been disabled by default for SAAS, and a user will have to re-authenticate when they select their entitlement. Whilst the session is open we can choose to Cache the users credentials provided the Authentication method is password based.
To continue offering users a seamless single-sign On experience, Enrollment services has now become a critical service with the integration with Omnissa Access
In this lab scenario the 3rd party authentication method we use to login into Omnissa Access will be a certificate based method of authentication.
We will start off by doing the following:
- Deploying a User Certificate to a Windows Desktop
- Configure Omnissa Access for Certificate based Authentication
- Log into a Windows 11 Desktop and demonstrate the limitation
- Deploy and configure TRUE SSO
- Deploy and configure Horizon Enrollment services
- Integrate and configure Active Directory Certificate services with Horizon Enrollment services
- Log into a Windows 11 Desktop and demonstrate the solution
- On your ControlCenter server
- launch your site 1 browser.
- In the address bar
- enter your assigned Omnissa Access URL

- In the Omnissa Access login window
- In the Username area
- enter administrator
- in the Password area
- enter Pa$$w0rd
- select Sign in
- enter Pa$$w0rd
- In the Username area

- In the Web Intelligent Hub
- top-right corner
- select the AT icon
- from the dropdown
- select Access Console
- top-right corner

- In the Omnissa Access Console
- select Integrations
- under Integrations
- select Connectors
- In the Connectors area
- select NEW
- under Integrations
- select Integrations

- In the Virtual Apps Usage Confirmation window
- select OK
-
In the Confirm Connector selection window
- select CONFIRM

- In the Add New Connector wizard
-
Download Installer area
- select NEXT
-
Download Installer area

- In the Add New Connector window
-
2. Download Configuration File area
- next to Password:
- enter Pa$$w0rdPa$$w0rd
- next to Reenter Password:
- enter Pa$$w0rdPa$$w0rd
- select DOWNLOAD CONFIGURATION FILE
- note an es-config.json file gets downloaded
- next to Password:
- In the top right corner of your browser.
- select the Download icon
- note the name of your download file
- select the Download icon
- In the Add New Connector window
-
2. Download Configuration File area
- select NEXT
-
2. Download Configuration File area
-
2. Download Configuration File area

- In the Add New Connector window
-
Summary window
- select CLOSE
-
Summary window

- On your ControlCenter server browser
- in your site 1 browser
- select the Download icon
- select Show in folder icon
- select the Download icon
- in your site 1 browser

- In the File Explorer window
- select and right-click the es-config.json file
- select Copy
- In the left pane
- select Desktop
- select and right-click the es-config.json file

- In the File Explorer window
-
Desktop area
- select the Software shortcut
- in the Software folder
- open the ACCESS folder
-
Desktop area

- In the File Explorer window
-
ACCESS folder
- Paste your es-config.json file
- Close your File Explorer window
-
ACCESS folder

- On your ControlCenter server
- on the Desktop.
- open the Remote Desktops\Site1 folders
- select and launch the WS1-Connector.RDP shortcut
- on the Desktop.

- On your WS1-Connector server
- open the Software Folder
- select the ACCESS Folder
- select and Launch
- Workspace-ONE-Access-Connector-Installer-24.12.0.0.exe
- select and Launch
- select the ACCESS Folder
- open the Software Folder

- In the Open File - Security Warning window

- On your WS1-Connector server
- on the Open File - Security Warning windows
- select Run
- on the Open File - Security Warning windows

- On the Access Connector - InstallShield Wizard
-
Licence Agreement window
- select the radio button next to:-
- I accept the terms in the license agreement
- select Next
- select the radio button next to:-
-
Licence Agreement window

- On the Access Connector - InstallShield Wizard
-
Service Selection window
- Select Next
-
Service Selection window

- On the Omnissa Access Connector - InstallShield Wizard
-
Specify Configuration File window
- In the box in front of Browse...
-
validate the path
- \\horizon-01a\software\ACCESS\es-config.json
-
validate the path
- next to Password:
- type Pa$$w0rdPa$$w0rd
- In the box in front of Browse...
- select Next
-
Specify Configuration File window

- In the Omnissa Access Connector - InstallShield Wizard
- keep Default
- select Next
- keep Default

- In the Omnissa Access Connector - InstallShield Wizard
-
Specify Service Account window
- under User name: type
- techseals\WS1Access
- under Password:
- type Omnissa1!
- under User name: type
- select Next
-
Specify Service Account window

- In the Omnissa Access Connector - InstallShield Wizard
-
Ready to Install window
- select Install
-
Ready to Install window
The Installation of the Omnissa Access Connector will take about 5 minutes to complete.

- In the Omnissa Access Connector - InstallShield Wizard
-
Installation Wizard Completed window
- Select Finish
-
Installation Wizard Completed window

First we will configure the Attributes.
Note! Every organisation will need to research their requirements when deciding whether or not to set attributes to required.
- In the Omnissa Access Admin console
- select Settings
- select User Attributes
- select Settings

- In the User Attributes console
-
In the right area under Custom Attributes
- Select ⊕ ADD ROW 3 times
-
In the right area under Custom Attributes

- In the User Attributes console
- Under Name
- Add the following additional attributes
- note this is case sensitive :
- Add the following additional attributes
- Under Name
objectGuid
sid
netBios

- In the User Attributes console
- in the top-left corner
- under User Attributes
- select SAVE
- under User Attributes
- in the top-left corner

- In the Omnissa Access admin console.
- select Integrations,
- under the Integrations tab
- select Directories
- under the Integrations tab
- select Integrations,

- In the Directories area
- to the right
- select Add Directory
-
In the Add Directory dropdown
- select Active Directory
- to the right

- In the Add Active Directory section
- under Directory Information
- next to 1. Directory Name
- type TechSeals
- ensure the Active Directory over LDAP radio button is selected
- select NEXT
- next to 1. Directory Name
- under Directory Information

- In the Configure Directory section,
- leave the Directory Sync and Authentication as default
-
scroll down to the Bind User Details area
- enter the following next to :
- Base DN: dc=techseals,dc=co
- Bind DN: cn=administrator,ou=corp,dc=techseals,dc=co
- Bind DN Password: Pa$$w0rd
- enter the following next to :
- select SAVE
-
scroll down to the Bind User Details area
- leave the Directory Sync and Authentication as default

- In the Select the Domains section
- next to Domains
- in front of techseals.co
- select the checkbox
- select SAVE
- in front of techseals.co
- next to Domains

- On the Map User Attribute section
- map the following attributes :
- what you enter here is case sensitive
- scroll down next to:-
-
netbios:
- select custom input
- enter msDS-PrincipalName
- select custom input
-
objectGuid:
-
from the dropdown
- select objectGUID
-
from the dropdown
-
sid:
- select custom input
- enter objectSid
- select custom input
-
netbios:
-
in the bottom left corner
- select SAVE
- scroll down next to:-
- what you enter here is case sensitive
- map the following attributes :
Note: userPrincipalName is a required attribute for Horizon, it is enabled by default

- On the Select the Groups you want to sync section
- select +ADD
- under Create Group
- enter dc=techseals,dc=co
- select ADD

- On the Select the Groups you want to sync section
- next to Select All
- select the check box
- select SAVE.
- next to Select All

- In the Select Users you would like to sync section
- under Specify the user DNs
- edit the existing syntax so that it reads
- ou=corp,dc=techseals,dc=co
- edit the existing syntax so that it reads
-
under Verify
- select TEST
- select SAVE
- under Specify the user DNs

- In the Sync Frequency area
- next to Sync Frequency
- from the dropdown
- select to Every hour
- from the dropdown
- select SAVE & SYNC
- next to Sync Frequency

- On the Directories window
-
Refresh your browser window
- note the Synced Groups and Synced Users
-
Refresh your browser window

- In your Omnissa Access admin console
- select the Settings tab
- In the Settings area
- select Login Preferences
-
under Login Preferences
- select EDIT
- In the Settings area
- select the Settings tab

- In the Login Preferences area
- In line with:
-
Sync Group Members to the Directory When Adding Group
- select the Checkbox
-
Sync Group Members to the Directory When Adding Group
- In line with:

- In the Login Preferences area
- in the bottom right
- select SAVE
- in the bottom right

- In the Omnissa Access console
- select Integrations
- select Directories
- select Integrations

- In the Directories area
- next to Techseals
- select the radio button
- select the Techseals
- select the radio button
- next to Techseals

- In the Directories > Techseals area
- In the right corner
- next to SYNC
- select the dropdown
- select Sync without Safeguards
- select the dropdown
- next to SYNC
- In the right corner

Note, this process is purely here to facilitate a 3rd Party auth method for TrueSSO in a Proof of Concept environment. There are more secure approaches to delivering Certificates for Certificate Authentication, one being Workspace ONE UEM.
- On your ControlCenter server
- on server Desktop,
- open the Remote Desktops > Site 1 folder
- In the Site 1 folder
- launch the W11Client-01a.RDP shortcut
- If necessary
- in the Windows Security window
- login as techseals\craig
-
In the password area
- enter Pa$$w0rd
-
In the password area
- login as techseals\craig
- in the Windows Security window
- on server Desktop,

- On the W11Client-01a
-
select and right-click the Start Button,
- select Run,
-
In the Run window
-
enter mmc,
- select OK
-
enter mmc,
-
select and right-click the Start Button,

- In the Console1 window
- select File > Add/Remove Snap-in..

- In the Add or Remove Snap-ins window,
- select Certificates
- select Add
- select OK
- select Certificates

- In the Console1 window
- expand Certificates > Personal
- select & Right-click Personal,
- from the dropMenu
- select All Tasks > Request New Certificate
- from the dropMenu
- on the Certificate Enrollment page
- select Next
- select & Right-click Personal,
- expand Certificates > Personal

- On the Certificate Enrollment window
- select Next

- On the Certificate Enrollment window
- next to User
- select the check box
- to the right of User
- next to Details
- select the Dropdown
-
from the Dropdown
- select Properties
- next to Details
- next to User

- In the Certificate Properties window
- select the Certification Authority tab

- In the Certificate Properties window
- next to techseals-TRUESSO-02A-CA
-
uncheck the checkbox
-
to close the window
- select OK
-
to close the window
-
uncheck the checkbox
- next to techseals-TRUESSO-02A-CA

- On the Certificate Enrollment window
-
Request Certificates window
- select Enroll .
-
Request Certificates window

- On the Certificate Enrollment window
-
Certificate Installation Results
- select Finish
-
Certificate Installation Results

- On the Console1 window
- Expand Certificates > Personal > Certificates.
- You will notice you now have a user based certificate deployed.
- Expand Certificates > Personal > Certificates.

There are two sections to Part 2
- On your ControlCenter server
-
select and right-click the Start Button,
- select Run,
-
in the Run window
-
type mmc,
- select OK
-
type mmc,
-
select and right-click the Start Button,

- In the Console1 window
- select File > Add/Remove Snap-in..

- In the Add or Remove Snap-ins window,
- select Certificates
- select Add
- select Certificates

- In the Certificate snap-in window
- next to Computer account
- select the radio button
- select Next
- select the radio button
- next to Computer account

- In the Select Computer window
- select Finish

-
In the Add or Remove Snap-ins window
-
to close the window
- select OK
-
to close the window

- In the Certificates Console,
- expand Certificates > Trusted Root Certificate Authorities > Certificates

- In the Certificates area
- in the right section
- select the first of a set of 2 certificates
- techseals-CONTROLCENTER-CA
- select, right-click
- select Open
- select the first of a set of 2 certificates
- in the right section

- In the Certificate window
- select the Details tab,
- at the bottom of the Details area,
- select Copy to File..
- at the bottom of the Details area,
- select the Details tab,

- On Welcome window
- select Next

- On the Export File Format window
- next to Base-64 encoded X.509 (.CER),
- select the radio button
- select Next
- select the radio button
- next to Base-64 encoded X.509 (.CER),

- In the File to Export window
- select Browse
- In the Save As window
- under Quick access
- select Downloads
- next to the Filename box
- type Root.cer,
- under Quick access
- select Save
- In the Save As window
- select Browse

- In the File to Export window
- select Next

- On the Completing the Certificate Export Wizard
- select Finish
-
on The export was successful window
- select OK
-
to close the Certificate window
- select OK

- On your ControlCenter server
- switch to your Omnissa Access tenant
- If necessary, login with
-
Username
- enter administrator
-
Password
- enter Pa$$w0rd
- select SIGN IN
- enter Pa$$w0rd
-
Username
- If necessary, login with
- switch to your Omnissa Access tenant

- In the Web Intelligent Hub
- top-right corner
- select the AT icon
- from the dropdown
- select Access Console
- top-right corner

- In the Access admin console
- navigate to the Integrations tab
-
Authentication Methods. is the default area
- next to Certificate (Cloud Deployment)
- select the radio button
- select CONFIGURE
- select the radio button
- next to Certificate (Cloud Deployment)
-
Authentication Methods. is the default area
- navigate to the Integrations tab

- In the Certificate (cloud deployment) page
- below Enable Certificate Adapter
- move the Toggle from No to Yes
- below Root and Intermediate CA Certificates
- click on SELECT FILE for the
- In the Open window
- in the Quick Access bar
- select Downloads
- select the root.cer certificate file
- select Downloads
- in the Quick Access bar
- select Open
- In the Open window
- click on SELECT FILE for the
-
in the Update Authentication Adapter window
- select YES
- below Enable Certificate Adapter

- In the Certificate (cloud deployment) page
- Keep the remaining settings as default
- at the bottom of the page
- select Save
- at the bottom of the page
- Keep the remaining settings as default

- In the Omnissa Access console
- under the Integrations tab
- in the Menu pane
- select Identity Providers
- in the Identity Providers area
- select. IDP_for_TechSEALs
- in the Menu pane
- under the Integrations tab

- In the Identity Providers > IDP for TechSeals window
-
scroll down
- In the Authentication Methods area
- next to Certificate (cloud deployment)
- select the checkbox
- in the bottom right-corner of the page.
- select SAVE
- next to Certificate (cloud deployment)
- In the Authentication Methods area
-
scroll down

- In the Omnissa Access Admin console
- navigate to Resources
- in the side menu
- select Policies
- in the side menu
- navigate to Resources

- In the Policies area
- in line with Default Policy
- to the far right next to VIEW
- select EDIT
- to the far right next to VIEW
- in line with Default Policy

- In the Edit Policy window,
- In side column
- select Configuration
- next to Web Browser,
- select All Ranges
- In side column

- In the Edit Policy Rule window
- next to then the user may authenticate using *
- from the dropdown
- select Certificate (Cloud Deployment)
- from the dropdown
- next to if preceding method fails or is not applicable, then *
- from the dropdown
- select Password (Cloud Deployment),
- from the dropdown
- select ADD FALLBACK METHOD
- next to if preceding method fails or is not applicable, then *
- from the dropdown
- select Password (Local Directory)
- at the bottom of the window
- select SAVE
- from the dropdown
- next to then the user may authenticate using *

- In the Edit Policy Rule window
- select + ADD POLICY RULE

- In the Edit Policy Rule window
- next to and user accessing content *
- from the dropdown.
- select Windows 10+
- from the dropdown.
- next to then the user may authenticate using *
- from the dropdown
- select Certificate (Cloud Deployment) for the first authentication method
- from the dropdown
- select ADD FALLBACK METHOD twice
- next to if preceding method fails or is not applicable, then
- from the dropdown
- select Password (cloud deployment)
- from the dropdown
- next to if preceding method fails or is not applicable, then
- from the dropdown
- select Password (Local Directory)
- next to if preceding method fails or is not applicable, then
- at the bottom right hand side of the page
- select SAVE
- next to and user accessing content *

- In the Edit Policy window,
- In side column
- select Configuration
- next to Omnissa App
- select All Ranges
- In side column

- In the Edit Policy Rule window
- next to then the user may authenticate using *
- from the dropdown
- select Certificate (Cloud Deployment)
- from the dropdown
- next to if preceding method fails or is not applicable, then *
- from the dropdown
- select Password (Cloud Deployment),
- from the dropdown
- select ADD FALLBACK METHOD
- next to if preceding method fails or is not applicable, then *
- from the dropdown
- select Password (Local Directory)
- at the bottom of the window
- select SAVE
- from the dropdown
- next to then the user may authenticate using *

- In the Configuration window
- ensure the following Device Types
-
Omnissa App
- then
-
Windows 10+
- then
-
Web Browser
- are first and second in the authentication flow
- next to ALL RANGES for Omnissa App
- on the left select the 6 DOTS
- drag to the top
- on the left select the 6 DOTS
- next to ALL RANGES for Windows 10 +
- on the left select the 6 DOTS
- drag to below Omnissa App
- on the left select the 6 DOTS
- if necessary,
- next to ALL RANGES for Web Browser
- on the left select the 6 DOTS
- drag below Windows 10+
- on the left select the 6 DOTS
- next to ALL RANGES for Web Browser
- In the Configuration window
- select NEXT

- In the Edit Policy Page.
- Summary section
- review the policy configurations
- select SAVE
- Summary section

- On your ControlCenter server
- open your Site 1 browser
- In the Favourites bar
- select the Horizon Site 1 shortcut
- In the Favourites bar
- open your Site 1 browser

- In the Horizon login
- in the User Name area
- enter administrator
- in the Password area
- enter Pa$$w0rd
- select SIGN IN
- in the User Name area

- In the Horizon Admin console
-
Side Menu
- expand Settings
- select Servers
- expand Settings
-
Side Menu

- In the Horizon Admin console
-
Servers area
- select the Connection Servers tab
-
Servers area

- In the Horizon Admin console
-
Servers area
-
Connection Servers tab
- next to HORIZON-01A
- select the Radio button
- select EDIT
- select the Radio button
- next to HORIZON-01A
-
Connection Servers tab
-
Servers area

- In the Edit Connection Server Settings window
- select the Authentication tab

- In the Edit Connection Server Settings window
- select the Authentication tab
- below Delegation. of authentication of Horizon (SAML 2.0 Authenticator)
- from the dropdown
- select Allowed
- from the dropdown
- below No Enabled Authenticator configured
- select MANAGE SAML AUTHENTICATORS
- below Delegation. of authentication of Horizon (SAML 2.0 Authenticator)
- select the Authentication tab

- In the Manage SAML Authenticators window
- select ADD

- In the Add SAML 2.0 Authenticator window
- below *Label
- enter Omnissa Access
- below *Label

- In the Add SAML 2.0 Authenticator window
- below *Metadata URL
- replace https://<YOUR SAML AUTHENTICATOR NAME>/SAAS/API/1.0/GET/metadata/idp.xml
- with your Omnissa Access tenant id
- ie https://techseals-trainingXX.vidmpreview.com/SAAS/API/1.0/GET/metadata/idp.xml
- with your Omnissa Access tenant id
- replace https://<YOUR SAML AUTHENTICATOR NAME>/SAAS/API/1.0/GET/metadata/idp.xml
- below *Metadata URL

- In the Add SAML 2.0 Authenticator window
- below *TrueSSO Trigger Mode
- from the dropdown
- select Always
- select OK
- from the dropdown
-
to close the Manage SAML Authenticators window
- select OK
- below *TrueSSO Trigger Mode

- In the Edit Connection Server Settings window
- below Delegation of authentication to VMware Horizon (SAML2.0 Authenticator)
- from the dropdown
- select Required
- next to Enable Workspace ONE Mode
- select the checkbox
- from the dropdown
- below * Workspace ONE Server Hostname
- enter yourAccess Tenant ID
- to close the Edit Connection Server Settings window
- select OK
- below Delegation of authentication to VMware Horizon (SAML2.0 Authenticator)
Note that Workspace ONE Mode only becomes available to be enabled when set to Required
Note. Make sure there is no forward slash at the end ".com" of your URL
We enable Workspace ONE Mode and set it to required when we want all authentication to be done by Access.
When the user connects to the Service and is redirected to the Identity Provider, we refer to this as an SP-Init flow
In Horizon, Workspace ONE Mode enforces SP-Init flows

- In the Horizon Admin console
-
Servers area
-
Connection Servers tab
- next to HORIZON-01B
- select the Radio button
- select EDIT
- select the Radio button
- next to HORIZON-01B
-
Connection Servers tab
-
Servers area

- In the Edit Connection Server Settings window
- select the Authentication tab

- In the Edit Connection Server Settings window
- select the Authentication tab
- below Delegation. of authentication of Horizon (SAML 2.0 Authenticator)
- from the dropdown
- select Required
- below No Enabled Authenticator configured
- select MANAGE SAML AUTHENTICATORS
- from the dropdown
- below Delegation. of authentication of Horizon (SAML 2.0 Authenticator)
- select the Authentication tab

- In the Manage SAML Authenticators window
- next to Omnissa Access
- select the radio button
- select EDIT
- select the radio button
- next to Omnissa Access

- In the Edit SAML 2.0 Authenticator window
- below * TrueSSO Trigger Mode
- next to Enabled for Connection Server
- select the check box
- next to Enabled for Connection Server
- to close the Edit SAML 2.0 Authenticator window
- select OK
- below * TrueSSO Trigger Mode

- In the Manage SAML Authenticators window
- to close this window
- select OK
- to close this window

- In the Edit Connection Server Settings window
- below MANAGE SAML AUTHENTICATORS
- next to Enable Workspace ONE mode
- select the checkbox
- in the BOX below * Workspace ONE Server Hostname
- paste your Omnissa Access tenant id
- next to Enable Workspace ONE mode
- to close the Edit Connection Server Settings window
- select OK
- below MANAGE SAML AUTHENTICATORS

- On your ControlCenter server
- open your Site 2 browser
- In the Favourites bar
- select the Horizon Site 2 shortcut
- In the Favourites bar
- open your Site 2 browser

- In the Horizon login
- in the User Name area
- enter administrator
- in the Password area
- enter Pa$$w0rd
- select SIGN IN
- in the User Name area

- In the Horizon Admin console
-
Side Menu
- expand Settings
- select Servers
- expand Settings
-
Side Menu

- In the Horizon Admin console
-
Servers area
- select the Connection Servers tab
-
Servers area

- In the Horizon Admin console
-
Servers area
-
Connection Servers tab
- next to HORIZON-02A
- select the Radio button
- select EDIT
- select the Radio button
- next to HORIZON-02A
-
Connection Servers tab
-
Servers area

- In the Edit Connection Server Settings window
- select the Authentication tab

- In the Edit Connection Server Settings window
- select the Authentication tab
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- from the dropdown
- select Allowed
- from the dropdown
- below No Enabled Authenticator configured
- select MANAGE SAML AUTHENTICATORS
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- select the Authentication tab

- In the Manage SAML Authenticators window
- select ADD

- In the Add SAML 2.0 Authenticator window
- below *Label
- enter Omnissa Access
- below *Label

- In the Add SAML 2.0 Authenticator window
- below *Metadata URL
- replace https://<YOUR SAML AUTHENTICATOR NAME>/SAAS/API/1.0/GET/metadata/idp.xml
- with your Omnissa Access tenant id
- ie https://techseals-trainingXX.vidmpreview.com/SAAS/API/1.0/GET/metadata/idp.xml
- with your Omnissa Access tenant id
- replace https://<YOUR SAML AUTHENTICATOR NAME>/SAAS/API/1.0/GET/metadata/idp.xml
- below *Metadata URL

- In the Add SAML 2.0 Authenticator window
- below *TrueSSO Trigger Mode
- from the dropdown
- select Always
- select OK
- select Always
- from the dropdown
-
to close the Manage SAML Authenticators window
- select OK
-
to close the Edit Connection Server Settings window
- select OK
- below *TrueSSO Trigger Mode

- In the Edit Connection Server Settings window
- below Delegation of authentication to Horizon (SAML2.0 Authenticator)
- from the dropdown
- select Required
- next to Enable Workspace ONE Mode
- select the checkbox
- from the dropdown
- below * Workspace ONE Server Hostname
- enter your Omnissa Access Tenant ID
- to close the Edit Connection Server Settings window
- select OK
- below Delegation of authentication to Horizon (SAML2.0 Authenticator)

In our testing , we learned that untrusted Forests do not work in an integration with Omnissa Access when the federation is setup with the Unified Access Gateway. This gives us an opportunity to show how to setup Federations with Omnissa Access and Horizon directly
- In the Omnissa Access console
- select the Resources tab
- in the Resources menu
- select Virtual Apps Collections
- in the Introducing Virtual Apps Collections area
- select GET STARTED
- in the Resources menu
- select the Resources tab

- In the Select the Source Type window
- below the Horizon area
- click SELECT
- below the Horizon area

- In the New Horizon Collection wizard
- in the 1 Connector page
- below Name *
- enter TechSeals.co
- note the Access Connector you will be using
- in the bottom right corner
- select NEXT
- enter TechSeals.co
- below Name *
- in the 1 Connector page

- In the New Horizon Collection wizard
- in the 2 Pod and Federation page
- below Pod and Federation
- select + ADD A POD
- below Pod and Federation
- in the 2 Pod and Federation page

- In the Add A Pod window
- enter the following
- below Horizon Connection Server
- type horizon-01a.techseals.co
- below Username
- type administrator
- below Password
- type Pa$$w0rd
- below True SSO
- move the toggle
- to enabled
- move the toggle
- select ADD
- below Horizon Connection Server
- enter the following

- In the New Horizon Collection wizard
- in the 2 Pod and Federation page
- below Pod and Federation
- select + ADD A POD
- below Pod and Federation
- in the 2 Pod and Federation page

- In the Add A Pod window
- enter the following
- below Horizon Connection Server
- type horizon-02a.techseals.co
- below Username
- type administrator
- below Password
- type Pa$$w0rd
- below True SSO
- move the toggle
- to enabled
- move the toggle
- select ADD
- below Horizon Connection Server
- enter the following

- In the New Horizon Collection wizard
- in the 2 Pod and Federation page
- below Have you enabled Cloud Pod Architecture for any of the pods added above?
- move the Toggle from No to Yes
- select + ADD A FEDERATION
- move the Toggle from No to Yes
- below Have you enabled Cloud Pod Architecture for any of the pods added above?
- in the 2 Pod and Federation page

- In the Add A Federation window
- below Federation Name*
- enter Techseals.co
- below Default Client Access FQDN*
- enter corp.techseals.co
- below Available Pods
- select the checkboxes above horizon-01a and horizon-02a
- select ADD
- select the checkboxes above horizon-01a and horizon-02a
- below Federation Name*

- In the New Horizon Collection wizard
- in the 2 Pod and Federation page
- select NEXT
- in the 2 Pod and Federation page

- In the New Horizon Collection wizard
- in the 3 Configuration page
- scroll down to the bottom
- below Activation Policy
- select Automatic
- below Default Launch Client
- select Native
- below Activation Policy
- in the bottom right corner
- select NEXT
- scroll down to the bottom
- in the 3 Configuration page

- In the New Horizon Collection wizard
- in the 4 Summary page
-
review your configuration
- select SAVE
-
review your configuration
- in the 4 Summary page

- In the Virtual Apps Collections > TechSeals.co window
- select Overview

- In the Virtual Apps Collections > Techseals.co window
-
Overview section
-
next to SYNC
- select the dropdown
-
in the dropdown menu
- select Sync without safeguards
-
next to SYNC
-
Overview section
Check that the Sync Status has Completed

- In the Omnissa Access console
-
Resources tab
- in the left menu
- select Virtual Apps
- in the left menu
-
Resources tab
Note that your Global and Local entitlements have been synchronized to Omnissa Access

- On your Controlcenter server
- log out from all Omnissa Access Admin console sessions
- close all browser sessions

- On the ControlCenter server Desktop,
- switch to your W11Client-01a.RDP session
Note ensure you are still logged in as [email protected]

- On your W11Client-01a Desktop
- open your Chrome Browser
- in your Chrome browser address bar
- enter your Access URL
- e.g. https://techseals-trainingxxx.vidmpreview.com/
- enter your Access URL
- in your Chrome browser address bar
- on the Select a certificate window
- select Craig Stroser
- select OK
-
in the Web Intelligent Hub
- under Apps
- select Enterprise_Desktop
- select Craig Stroser
- open your Chrome Browser

- On your W11Client-01a Desktop
- in the Enterprise_Desktop window
- select Launch
- in the Open Omnissa Horizon Client? window
- select Open Omnissa Horizon Client
- in the Enterprise_Desktop window

- In the Horizon Client session,
-
notice we are getting a Password request.
-
from the Horizon Client Dropdown
- select Disconnect
- In the Disconnect desktop? window
- select OK
-
from the Horizon Client Dropdown
-
notice we are getting a Password request.
Horizon requires the users password to be part of the SAML Artifact. Using a 3rd Party authentication methods or having Password Caching disabled does not allow that to happen.
- In the next Part we will proceed with the deployment of TRUESSO to solve this challenge.

- On your ControlCenter server
- open the Remote Desktop Folder
- open the Site1 folder
- launch the TrueSSO-01a.RDP shortcut
- you should login automatically
- open the Remote Desktop Folder
If automatic login fails use the following credentials
- login as techseals\administrator
- enter the password Pa$$w0rd

- On the TrueSSO-01a server
- select the Start button
- from the menu
- select Server Manager
- from the menu
- select the Start button

- On the Server Manager Interface
- select Manage > Add Roles and Features

- On the Before you begin window
- select Next

- On the Select installation type window,
- next to Role-based or feature-based installation
- select the radio button
- select Next
- next to Role-based or feature-based installation

- On Select destination server window (accept the defaults)
- select Next

- On the Select server roles window,
- in front of Active Directory Certificate Services,
- select the check box
- when prompted for the Add Features window,
- select the Add Features box,
- select Next
- in front of Active Directory Certificate Services,

- On the Select features window
- select Next

- On the Active Directory Certificate Services window
- select Next

- On the Select role services window
- select Next

- On the Confirm Installation selections window,
- next to Restart the destination server automatically if required,
- select the checkbox
- on the Add Roles and Features Wizard window
- select Yes
- select Install
- next to Restart the destination server automatically if required,
You will have to wait a short while before moving on to section 2

- On the Installation progress page,
- select the Configure Active Directory Certificate Services on the destination server hyper-link

- On the Credentials window
- select Next

- On the Role Services page,
- select the Certificate Authority checkbox
- select Next
- select the Certificate Authority checkbox

- On the Specify the setup type of the CA window
- next to Enterprise CA
- select the radio button
- select Next
- next to Enterprise CA

- On the CA type window
- next to Subordinate CA
- select the radio button
- select Next
- next to Subordinate CA

- On the Private Key window,
- next to Create a new private key
- ensure the radio button is selected
- select Next
- next to Create a new private key

- On the Cryptography for CA window
- validate the following is selected
- under Cryptographic Provider:
- RSA#Microsoft Software Key Storage Provider
- next to Key Length:
- 2048
-
Hash Algorithm:
- SHA256
- select Next
- under Cryptographic Provider:
- validate the following is selected

- On the Specify the Name of the CA window
- observe the CA naming convention
- select Next
- observe the CA naming convention

- On the Request a certificate from parent CA ,
- next to Send a certificate request to a parent CA:
- select the radio button
- next to Send a certificate request to a parent CA:

- On the Request a certificate from parent CA ,
- to the right of the Parent CA box,
- click the Select button
- In the Select Certificate Authority window
- ensure that techseals-CONTROLCENTER-CA is selected
- select OK
- ensure that techseals-CONTROLCENTER-CA is selected
- to the right of the Parent CA box,

- On the Request a certificate from parent CA window
- select Next

- On the CA Database window,
- select Next

- On the Confirmation window
- select Configure

- On the Results window
- select Close
- on the Installation progress window,
- select Close

As a result of this being a multi-site setup. We have already deployed all the services for Site 2.
Both Site 1 and Site 2 share the same Active Directory Certificate Services. One of the requirements for TRUESSO is to setup a certificate Template. This has already been setup. In a future lab, which could be optional, that being Integrating with Untrusted Forests, you will have the opportunity to setup the Template in its entirety
In this section we will validate and perform configuration specific to Site 1
- On your TRUESSO-01a server
- select Start > Run > type mmc
- select File > Add/Remove Snap-in...
- select the Certification Authority services snap-in,
- select Add
- In the Certificate Authority window,
- select Finish
- to close the Add or Remove Snap-ins window
- select OK
- select the Certification Authority services snap-in,
- select File > Add/Remove Snap-in...
- select Start > Run > type mmc

- Expand the techseals-TRUESSO-01a-CA inventory
- select Certificate Templates,
-
right-click
- select Manage
-
right-click
- select Certificate Templates,

- In the Certificate Template Console
- find and select the TrueSSO template
- right-click the TrueSSO template
- select Properties
- right-click the TrueSSO template
- find and select the TrueSSO template

- In the TrueSSO Template Properties
- select the Security tab
- in the Group or user names: area
- select Add
- to the right of the Select this object type: box
- select the Object types button
- next to Computers,
- select the checkbox
- next to Computers,
- select OK
- select the Object types button
- to the right of the Select this object type: box
- select Add
- in the Group or user names: area
- select the Security tab

- In the Select Users, Computers, Service Accounts, or Groups window
-
Enter the object names to select
- type TRUESSO-01a
- to the right select Check Names
- select OK
- to the right select Check Names
- type TRUESSO-01a
-
Enter the object names to select

- In the TrueSSO Template Properties windows
- next to Enroll
- select the checkbox
- Read should be selected by default
- to close the TrueSSO Template Properties,
- select OK
- select the checkbox
- next to Enroll

- Switch to the Certificate Authority Console
- select and right-click the Certificate Templates container,
- select New > Certificate Template to Issue
- select and right-click the Certificate Templates container,

When authoring this content, I had a situation where the TrueSSO Template would not show after adding the Template permissions. I gave the TrueSSO-01a server a reboot , logged in and voila, the template was now available.
This could be a once off as I have not seen this happen with other courses I have authored content for in this scenario.
It have tested this twice now with the same result.
- In the Enable Certificate Templates window,
- select your TrueSSO Template
- select OK
- select your TrueSSO Template

- In the Certificate Authority Console
- select Certificate Templates,
-
right-click
- select Manage
-
right-click
- select Certificate Templates,

- In the Certificate Templates Console
- select Enrollment Agent (computer) template
- right-click
- select Properties
- right-click
- select Enrollment Agent (computer) template

- In the Enrollment Agent Properties window
- select the Security tab

- In the TrueSSO Template Properties
- select the Security tab
- in the Group or user names: area
- select Add
- to the right of the Select this object type: box
- select the Object types button
- next to Computers,
- select the checkbox
- next to Computers,
- select OK
- select the Object types button
- to the right of the Select this object type: box
- select Add
- in the Group or user names: area
- select the Security tab

- In the Enrollment agent properties window
- next to Enroll
- select the checkbox
- Read should be selected by default
- select the checkbox
- to close the Enrollment Agent (Computer) Properties
- select OK
- Switch back to the Certificate Authority Console
- next to Enroll

- In the Certificate Authority Console select
- right-click the Certificate Templates container,
- select New > Certificate Template to Issue
- right-click the Certificate Templates container,

- In the Enable Certificate Templates window
- Select the Enrollment Agent (Computer) template
- Select OK

- In the Certificate Authority window
- Note the Templates you now have
- TrueSSO Template
- Enrollment Agent (Computer)
- Note the Templates you now have

- We will now configure the CA for non-persistent certificate processing
- on the TrueSSO-01a server
- select the Start button
- right-click
- select Command Prompt (Admin)
- right-click
- select the Start button
- on the TrueSSO-01a server

- In the Administrator: Command Prompt
- enter the following command
certutil -setreg DBFlags +DBFLAGS_ENABLEVOLATILEREQUESTS

- In the Administrator: Command Prompt
- enter the following command
- to Configure the CA to ignore offline CRL errors
- to Configure the CA to ignore offline CRL errors
- enter the following command
certutil -setreg ca\CRLFlags +CRLF_REVCHECK_IGNORE_OFFLINE

- In the Administrator: Command Prompt
- enter the following command
- From the command prompt run:
- Restart the CA service.
- From the command prompt run:
- enter the following command
net stop certsvc & net start certsvc

- On the TrueSSO-01a server desktop
- launch the software shortcut
- In the Software folder,
- open the Horizon\2412 folder.
- select the installer Omnissa-Horizon-Connection-Server-x86_64-2412-8.14.0-xxxx
- from the dropdown
- select Run as administrator
- from the dropdown
- select the installer Omnissa-Horizon-Connection-Server-x86_64-2412-8.14.0-xxxx
- open the Horizon\2412 folder.
- In the Software folder,
- launch the software shortcut

- On the Open File - Security Warning window
- select Run

- On the Welcome window
- select Next

- On Destination Folder window
- select Next

- On the Installation Options window
- select Horizon Enrollment Server
- select Next
- select Horizon Enrollment Server

- On Firewall configuration window
- select Next

- On the Ready to Install Program window
- select Install

- On the Installer Completed Window
- select Finish

- On the TrueSSO-01a server
-
select the Start Button,
-
right-click
-
select Run,
-
type MMC,
- select OK
-
type MMC,
-
select Run,
-
right-click
-
select the Start Button,

- In the Console window
- select File > Add/Remove Snap-in..

- In the Add or Remove Snap-ins window,
- select Certificates
- select Add
- select Certificates

- In the Certificates snap-in
- next to Computer account
- select the radio button
- select Next
- select Finish
- select OK
- select Finish
- select Next
- select the radio button
- next to Computer account

- Expand the Certificates console inventory
- select the Personal > Certificates container.
- and right-click
- select All Tasks > Request New Certificate
- and right-click
- select the Personal > Certificates container.

- On the Certificate Enrollment window
- select Next

- On the Select Certificate Enrollment Policy window
- select Next

- On the Request Certificates window
- in front of Enrollment Agent (Computer)
- select the checkbox
- select Enroll
- in front of Enrollment Agent (Computer)

- On the Certificate Installation Results window,
- ensure the enrollment was successful
- select Finish
- ensure the enrollment was successful

- In the Certificates Console
- note you now a TrueSSO-01a template for enrollment

In a Horizon Pod with multiple Connection Servers, this task is only completed once
- Switch to your ControlCenter server,
- Open up your Remote Desktop > Site 1 folder
- launch the RDP shortcut for Horizon-01a
- If necessary, authenticate, using the following credentials
-
username techseals\administrator
- password Pa$$w0rd
-
username techseals\administrator
- Open up your Remote Desktop > Site 1 folder

- On the Horizon Server desktop
- select and open your CACertSnapin.mmc

- In the Certificates Console
-
Expand the inventory
- Browse down to:
- Omnissa Horizon Certificates > Certificates
- Browse down to:
-
Expand the inventory

- In the Omnissa Certificates > Certificates folder
- expand the console or scroll across the console
- notice the guid based certificate has a friendly name of vdm.ec
- expand the console or scroll across the console

- In the Certificates console
- select your top GUID certificate with the friendly name of vdm.ec.
- right-Click select All Tasks
- select Export
- right-Click select All Tasks
- select your top GUID certificate with the friendly name of vdm.ec.
Note there are two GUID based certificates with a vdm.enc Friendly name. Select the cert with vdm.ec
In your environment, the certificate order might differ to the screenshot

- On the Welcome to the Certificate Export Wizard window
- select Next

- On the Export Private Key page
- next to No, do not export the private key
- select the radio button
- select Next
- select the radio button
- next to No, do not export the private key

- On the Export File Format window
- next to Base-64 encoded X.509
- select the radio button
- select Next
- select the radio button
- next to Base-64 encoded X.509

- In the File to Export window
- under File name
- type the following
-
\\horizon-01a\software\Horizon\enroll.cer
- select Next
-
\\horizon-01a\software\Horizon\enroll.cer
- type the following
- under File name
Software is a shared folder which we will use to copy from on the TrueSSO server

- On the Completing the Certificate Export Wizard window
- when prompted that The export was successful,
- select Finish
- select OK
- select Finish
- when prompted that The export was successful,

- On your ControlCenter server desktop
- on your TrueSSO-01a RDP session
- switch from your Horizon-01a RDP session
- on your TrueSSO-01a RDP session

- On our TrueSSO-01a server
- select your Certificate services Snap-in,
- select the Omnissa Horizon Enrollment Server Trusted Roots, folder
- and right-click
- select All Tasks > Import
- and right-click
- select the Omnissa Horizon Enrollment Server Trusted Roots, folder
- select your Certificate services Snap-in,

- On the Welcome window
- select Next

- In the File to import window
- Under File name,
- enter the following
- \\Horizon-01a.techseals.co\software\Horizon\enroll.cer
- enter the following
- select Next
- Under File name,

- In the Certificate Store window accept the defaults and
- select Next.
- on the Summary page
- select Finish.
- in the Certificate Import Wizard window
- select OK
- on the Summary page
- select Next.

- In the Certificates Folder
- select the imported certificate
- and Right-click
- select Properties.
- and Right-click
- In the Friendly name: section
- type vdm.ec
- select OK
- type vdm.ec
- select the imported certificate

- On your TrueSSO-01a.RDP session
- select and right-click the Start button > RUN
- type regedit.exe
- In the regedit inventory,
- browse to the following location:
- HKLM\SOFTWARE\Omnissa\Horizon\
-
what we should see is an Enrollment Service Key
- HKLM\SOFTWARE\Omnissa\Horizon\Enrollment Service.
- you will notice there is no Enrollment Service key, we need to create one. In our case we have to
- browse to the following location:
- Create the Enrollment Service key
- Right-click Horizon > New > Key
- type Enrollment Service
- Right-click Horizon > New > Key
- select and right-click the Start button > RUN

We will add 3 String Values in the Registry Key
- In the Registry Editor
- right-click the Enrollment Service key > New > String Value
- type PreferLocalCa
- right-click the PreferLocalCa String value
- select Modify
- in the Value data: field
- enter 1
- select OK to close the window
- right-click the Enrollment Service key > New > String Value

- Add your second String Value
- right-click the Enrollment Service key > New > String Value
- enter UseKerberosAuthenticationToCa
- right-click the UseKerberosAuthenticationToCa String value
- select Modify
- in the Value data: field
- enter false
- select OK to close the window.
- right-click the Enrollment Service key > New > String Value

- Add a third String Value
- right-click the Enrollment Service key > New > String Value
- enter UseNTLMAuthenticationToCa
- right-click the UseNTLMAuthenticationToCa String value
- select Modify
- in the Value data: field
- enter true
- select OK to close the window.
- right-click the Enrollment Service key > New > String Value

- On your TrueSSO-01a server
- From the Start button,
- select Run
- type services.msc
- select OK
- type services.msc
- select Run
- in services menu, scroll down until you find
- Omnissa Horizon Enrollment Server service
- select and right-click the Omnissa Horizon Enrollment Server service
- select Restart
- Close the Services mmc
- From the Start button,

- On your ControlCenter server
- from the Taskbar
- switch to your HORIZON-01a.RDP session

- On the Horizon-01a Connection server
- from the Desktop
- select and right-click the Command Prompt shortcut
- from the dropdown
- select Run as administrator
- from the Desktop

- In the Administrator: Command Prompt
- enter the following:-
- enter the following:-
cd "\Program Files\Omnissa\Horizon\Server\tools\bin"

- In the Administrator: Command Prompt
- type the following:-
The enrollment server is added to the global list.
vdmUtil --authAs administrator --authDomain techseals.co --authPassword Pa$$w0rd --truesso --environment --add --enrollmentServer TrueSSO-01a.techseals.co
Wait 2 min before doing the next command
- In the Administrator: Command Prompt
- type the following:-
The output shows the forest name, whether the certificate for the enrollment server is valid, the name and details of the certificate template you can use, and the common name of the certificate authority.
vdmUtil --authAs administrator --authDomain techseals.co --authPassword Pa$$w0rd --truesso --environment --list --enrollmentServer TrueSSO-01a.techseals.co --domain techseals.co

- In the Administrator: Command Prompt
- Enter the command to create a True SSO connector, which will hold the configuration information, and enable the connector.
vdmUtil --authAs administrator --authDomain techseals.co --authPassword Pa$$w0rd --truesso --create --connector --domain techseals.co --template TrueSSOTemplate --primaryEnrollmentServer truesso-01a.techseals.co --certificateServer techseals-TRUESSO-01A-CA --mode enabled

- In the Administrator: Command Prompt
- Validate the Authenticator is configured
vdmUtil --authAs administrator --authDomain techseals.co --authPassword Pa$$w0rd --truesso --list --authenticator
You will notice True SSO mode now Enabled
For --truessoMode, use ENABLED if you want True SSO to be used only if no password was supplied when the user logged in to Omnissa Access. In this case if a password was used and cached, the system will use the password. Set --truessoMode to ALWAYS if you want True SSO to be used even if a password was supplied when the user logged in to Omnissa Access

- On your ControlCenter server,
- switch to your W11Client-01a.RDP Remote Desktops session
The w11Client-01a session should still be logged in with the techseals\craig account

- On your W11Client-01a desktop,
-
In the Web Intelligent Hub
-
under the New Apps area
- select Enterprise_Desktop
-
from the pop-up
- select Launch from Client
-
on the Open Omnissa Horizon Client? window
- select Open Omnissa Horizon Client
-
under the New Apps area
-
In the Web Intelligent Hub

- In the W11Client-01a Horizon session
- If you the see the above message.
- Follow the below mentioned steps
- This as a result of the Active Directory Certificate Hierarchy certificates not being replicated to all Domain Controllers and Horizon based Infrastructure. The TrueSSO-01a server is an intermediate issuing server in the Microsoft Active Directory Certificate Authority and every Server that is Active Directory based, requires the certificate of the TrueSSO-01a service in its intermediate list to trust it as an issuing service.
- Therefore the above mentioned message regarding a certificate from an untrusted authority.
- This as a result of the Active Directory Certificate Hierarchy certificates not being replicated to all Domain Controllers and Horizon based Infrastructure. The TrueSSO-01a server is an intermediate issuing server in the Microsoft Active Directory Certificate Authority and every Server that is Active Directory based, requires the certificate of the TrueSSO-01a service in its intermediate list to trust it as an issuing service.
- Follow the below mentioned steps
- If you the see the above message.

- On the following Servers:
- Site 1
- ControlCenter.techseals.co
- Horizon-01a.techseals.co
-
Site 2
- DC-02a.techseals.co
- open the Administrator: Command Prompt
- enter gpupdate /force
- Site 1

- On your W11Client-01a desktop
- on the Web Intelligent Hub
- In the New Apps area
- double click Enterprise_Desktop
- In the Open Omnissa Horizon Client? window
- select Open Omnissa Horizon Client
- In the New Apps area
- on the Web Intelligent Hub

- On your W11Client-01a desktop,
- Note you have a single sign on experience
- shut down and close all your windows
- Note you have a single sign on experience

- On your W11Client-01a desktop,
-
from the Virtual Desktop session
-
MORE icon dropdown
- select Logoff Desktop
-
MORE icon dropdown
-
on the Disconnect and log off desktop? window
- select OK
- close all windows sessions
-
from the Virtual Desktop session

Now that we have demonstrated the Potential of Omnissa Access and the relevance of Enrollment Services. We will turn off Enforced authentication as we are using an unreliable Certificate Authentication method
- On your ControlCenter server
- open your Site 1 browser
- In the Favourites bar
- select the Horizon Site 1 shortcut
- In the Favourites bar
- open your Site 1 browser

- In the Horizon login
- in the User Name area
- enter administrator
- in the Password area
- enter Pa$$w0rd
- select Sign In
- in the User Name area

- In the Horizon Admin console
-
Side Menu
- in the Settings category
- select Servers
- in the Settings category
-
Side Menu

- In the Horizon Admin console
-
Servers area
- select the Connection Servers tab
-
Servers area

- In the Horizon Admin console
-
Servers area
-
Connection Servers tab
- next to HORIZON-01A
- select the Radio button
- select EDIT
- select the Radio button
- next to HORIZON-01A
-
Connection Servers tab
-
Servers area

- In the Edit Connection Server Settings window
- select the Authentication tab

- In the Edit Connection Server Settings window
- select the Authentication tab
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- from the dropdown
- select Allowed
- from the dropdown
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- select the Authentication tab

- In the Edit Connection Server Settings window
- To close the Edit Connection Server Settings window
- select OK
- To close the Edit Connection Server Settings window

- In the Horizon Admin console
-
Servers area
-
Connection Servers tab
- next to HORIZON-01B
- select the Radio button
- select EDIT
- select the Radio button
- next to HORIZON-01B
-
Connection Servers tab
-
Servers area

- In the Edit Connection Server Settings window
- select the Authentication tab

- In the Edit Connection Server Settings window
- select the Authentication tab
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- from the dropdown
- select Allowed
- from the dropdown
- below Delegation. of authentication of VMware Horizon (SAML 2.0 Authenticator)
- select the Authentication tab

- In the Edit Connection Server Settings window
- To close the Edit Connection Server Settings window
- select OK
- To close the Edit Connection Server Settings window

References
https://docs.omnissa.com/bundle/Horizon-AdministrationVmulti/page/ConfigureHorizonConnectionServerforTrueSSO.html
0 Comments
Add your comment