Book Image

Implementing VMware Horizon 7 - Second Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7 - Second Edition

By: Jason Ventresco

Overview of this book

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform. We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools. Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Table of Contents (21 chapters)
Implementing VMware Horizon 7 Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Horizon Access Point overview


The Horizon Access Point is a type of Horizon Connection Server that is designed to add an additional layer of security between remote Horizon Clients and Horizon resources that are located on a private network. Rather than providing remote clients with direct access to the Connection Server, organizations can deploy an Access Point within a DMZ or other secure network to provide secure remote access to Horizon-managed resources. Some of the functions and features of the Horizon Access Point include:

  • Providing remote Horizon clients with their own dedicated connection broker, ensuring an optimal user experience

  • Brokering connections between remote Horizon clients and internal Horizon-managed resources

  • Authenticating user connection requests

  • Supporting RSA SecurID, RADIUS, Smart Cards, and Security Assertion Markup Language (SAML) based authentication for enabling optional two-factor user authentication

  • Ability to be placed in a DMZ to further isolate the Access Point...