Recently got an opportunity to deploy the VMware Horizon TrueSSO within our environment. TrueSSO provides user with the True SSO (single sign-on) feature, after users log in to VMware Identity Manager (WorkSpaceOne) using a RSA SecurID authentication(optional), users are not required to enter Active Directory credentials in order to use virtual desktop or hosted application.
Let me share my top 10 lessons learnt from the deployment:
-
In the production deployment recommend to size the Enrollment Server Windows VM as same as the Connection Server(ES role is not very resource intensive)
-
CPU – 4 vCPU
-
Memory – 10 GB RAM
-
HDD – 80 GB
-
-
Make sure the “Group Scope” is selected as “Universal” for the Active Directory Group in which the Enrollment Server – Computer Account is added
-
On the newly created TrueSSO template (SmartCard Login and Client Authentication) make sure under the Security Tab “Authenticated Users” group has Read permissions and The Active Directory group for the Enrollment Servers (Computer Account) has Read and Enroll
-
If you are deploying more than one Enrollment Server go in the Horizon ADAM database and add the following value to load balance between two Enrollment Servers:
cs-view-certsso-enable-es-loadbalance=true -
To support Smartcard Logon the following Requirements must be met by the Domain Controller or Kerberos Authentication Certificate:
-
Make sure the the CA issuing Domain Controller Certificates has the following requirements met (Use GPO’s to deploy the below)
-
Add the Root Certificate to the Enterprise NTAuth Store
-
Add the Root Certificate to Trusted Root Certification Authorities
- Add an Intermediate Certificate to Intermediate Certification Authorities
-
- Use the True SSO Diagnostic Utility Fling to troubleshoot Enrollment Server, Active Directory PKI Settings and Enterprise CA
- On the Domain Controllers under the registry location HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\NTAuth\Certificates
A key with the “Issuing CA Certificate” thumbprint needs to be created on all the domain controllers participating in the TrueSSO. Ideally if the Step 7&8 are done correctly you should not run into this problem. (In our case we had to open-up a Microsoft Case to get this resolved as we were receiving KDC errors.)
My colleague Tarique Chowdhury has written three awesome blog post on the TrueSSO feature make sure to check them out:
Introduction – https://blogs.vmware.com/euc/2016/03/true-sso-single-sign-on-view-identity-manager-authenticate.html
Advance – https://blogs.vmware.com/euc/2017/02/horizon-7-sso-advanced-features.html
Setting up in Lab – https://blogs.vmware.com/euc/2016/04/true-sso-setting-up-in-a-lab.html
I hope you find this post useful during the Horizon TrueSSO deployment
Thanks,
Aresh Sarkari
Great Article Final Year Project Domains for CSE Project Centers in Chennai JavaScript Training in Chennai JavaScript Training in Chennai