Hi all,
I have the following setup:
Security server:
Connection server:
View Administrator:
Functionally, I have no issue. I can get in, but I get a warning. This happens:
1.) Open view. Type in view.website.org. HTTPS shows a green indication, all good!
2.) Type in credentials, click connect
3.) VMware View cannot verify the identity of the tunnel server you have contacted. Your desktop sessions will not be secure... Show certificate shows view.website.org cert info
Your insight would be greatly appreciated! I'm a bit new with certificates, am I missing something?
What version of View Connection Server and Security Server? Is this 5.1?
Which View Client are you using and what version is it?
Thanks
The infrastructure is running View 4.6, the client is View 5.1
If it helps, here is the workflow I described:
OK - it's the version mismatch that is causing this warning.
With a View 5.1 Connection Server and Security Server a certificate thumbprint (of the Security Server SSL Server Cert) is passed down to the client for it to be able to validate the certificate when making the secondary Secure tunnel connection (after authentication). Without this thumbprint (in versions older than 5.1) the destination URL used for the secure tunnel connection would need to use a name that matched your certificate name or certificate alt name. In your case the certificate name is *.website.org and the destination URL name is secname.domain.org and so a mismatch is detected and hence you get the warning. The Security Server identity can therefore not be verified.
You could do one of the following:
1. Set the External URL to secname.website.org so that tunnel connections will match the cert wildcard. This may need DNS changes so that this External URL is usable by the client.
2. Add secname.domain.org to the cert.
3. Upgrade Connection Server and Security Server to 5.1.
I assume you have a load balancer in front of the Security Servers which is why you don't have your External URL set to view.website.org
Mark
Hi Mark,
I just experienced something similar.
This is what we have.
OUTSIDE FIREWALL - DMZ
Security server:
INSIDE FIREWALL
Internal Connection server:
Firewall has been set correctly to for traffic from Security --> Connection Server.
With this configuration the external client will not connect.
It'll get to the Username and Password section.
Establishing Secure Connection...
And then gave me the error:
The View Connection Server authentication failed. A secure connection to the server '(null)' cannot be established.
What's weird is that the configuration above is exactly the same as the one that I have on the View 5.0.1 environment and it worked there.
The only I can think of is the SSL certificate.
On the View 5.0.1, back then I was able to add internal host name on the GoDaddy certificate but since they have a new policy now, they no longer allowed anyone to include internal host name to the certificate. So it needs to be an external name only listed on the certificate.
Just for a kick, I try changing the connection server "HTTPS Secure Channel - External URL" to match the Security server which my.view.com and it worked for a session. I was able to connect to the desktop.
After about 10-15 minutes, I disconnect.
Then tried it again, and it failed.
I checked the View Administrator, it says that mismatch certificate on the connection server.
My question is do I need to revoke the internal certificate that was authenticated by local CA and install the external certificate that matched the security server?
So both the security server and internal CS will use the same certificate or I just need to make the internal CS to have an external name and issue its own cert from GoDaddy?
Will that be the solution on this?
Remember, they don't allow anyone to use internal name server and domain name on SSL cert.
Much appreciate your input.
Thanks.
Your Security Server external URL is wrong. It should be https://my.view.com:443 where the hostname resolves to the public IP address of your Security Server. - see http://communities.vmware.com/docs/DOC-14974 for more details. The video at the bottom goes through this whole setup step by step
With the way you have set it up, the client will be attemping an HTTP tunnel connection on port 80. This is wrong. This is not related to certificates.
Mark
Thanks Mark.
I'll check the links the you have.
And my apology, that's what I have for the external URL on the security server.
Typo error.
Thanks.
Ah,
I actually already did check out the video when I deployed 4.6 and left a few comments back then.
Just wondering if 5.1 is a bit different to setup. But if not, I must have something not setup correctly on the firewall.
5.1 is the same. Check the 3 steps very carefully. Most people who have incorrect settings fix it by following these 3 steps.
Let us know what it was.
Mark