Book Image

Implementing VMware Horizon 7 - Second Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7 - Second Edition

By: Jason Ventresco

Overview of this book

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform. We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools. Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Table of Contents (21 chapters)
Implementing VMware Horizon 7 Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Managing Horizon Desktop pool entitlements


The following steps outline how to grant users or AD security groups access to a Horizon desktop pool, a necessary task since no access is granted by default. This can be done while the pool is still being provisioned.

  1. Log on to the Horizon Administrator console using an AD account that has administrative permissions within Horizon.

  2. Open the Catalog | Desktop Pools window within the console.

  3. Highlight the pool you wish to entitle, as shown in the following screenshot, and navigate to the Entitlements... | Add entitlement... to open the Add Entitlements window:

  4. In the Add Entitlements window shown in the following screenshot, click on the Add... button to open the Find User or Group window:

  5. In the Find User or Group window shown in the following screenshot, use the Name/User name: or Description: fields to search for the user or group to which you wish to grant access. In the following example, we used the Find button to search for a security group that...