VMware View Manager 4.5 Admin Manual page 233

Hide thumbs Also See for View Manager 4.5:
Table of Contents

Advertisement

The SSL settings do not affect local data on the client computers, which is always encrypted.
Table 13-4. Using Secure, Tunneled Connection and SSL for Local Desktop Operations
Setting
Use secure tunnel connection for Local Mode operations
Use SSL for Local Mode operations
Use SSL when provisioning desktops in Local Mode
Change the Local Desktop Encryption Key Cipher for New Key Generation
By default, View Connection Server uses AES-128 to encrypt the virtual disk (
and check out a local desktop. If you prefer stronger encryption, you can change the encryption key cipher to
AES-192 or AES-256 by editing a global property in View LDAP on your View Connection Server host.
After you change the encryption key cipher for local desktops, the new cipher is used for new key generation,
for example, when a local desktop is checked out for the first time. Previously generated keys are not changed.
To change the encryption key cipher for existing local desktops, see
an Existing Local Desktop,"
You use the ADSI Edit utility to modify View LDAP. The ADSI Edit utility is installed with View Connection
Server. When you change View LDAP on a View Connection Server instance, the change is propagated to all
replicated View Connection Server instances.
Prerequisites
See the Microsoft TechNet Web site for information on how to use the ADSI Edit utility on your Windows
operating system version.
Procedure
1
Start the ADSI Edit utility on your View Connection Server host.
2
Select or connect to DC=vdi, DC=vmware, DC=int.
3
On the object CN=Common, OU=Global, OU=Properties, set the pae-OVDIKeyCipher attribute to the
new encryption key cipher value.
You can set the encryption key cipher value to
.
AES-128
VMware, Inc.
on page 234.
AES-128
Chapter 13 Managing Local Desktops
Description
Local desktops use tunneled communications. Network
traffic is routed through View Connection Server or a
security server if one is configured.
If you do not use this setting, data transfers take place directly
between local desktops and the corresponding remote
desktops in the datacenter.
The default is to use secure tunnel connections, not direct
connections.
Communications and data transfers between client
computers and the datacenter use SSL encryption. These
operations include checking in and checking out desktops
and replicating data from client computers to the datacenter.
They involve connections between client computers and
View Transfer Server.
The default is not to use SSL.
Transfers of View Composer base-image files from the
Transfer Server repository to client computers use SSL
encryption. These operations involve connections between
client computers and View Transfer Server.
The default is not to use SSL.
.vmdk
"Change the Encryption Key Cipher for
,
or
. The default value is
AES-192
AES-256
) file when users check in
233

Advertisement

Table of Contents
loading

This manual is also suitable for:

View composer 2.5

Table of Contents