heimdm's Posts

Did you ever get a solution on this?
Ideally, I'd like that ability to pass a username and password into the UAG login screen. However, it is my understanding that VMware does not allow the password to be prepopulated or sent in as a ur... See more...
Ideally, I'd like that ability to pass a username and password into the UAG login screen. However, it is my understanding that VMware does not allow the password to be prepopulated or sent in as a url parameter for security purposes. Is there another way such as single sign on that this could be accomplished?  The goal is that users can access their desktop via UAG with a prepopulated set of credentials.
I have Cisco IP Communicator, latest release from Cisco (8.6.6.16). It works fine with View Agent 7.5.4. I tried upgrade the Agent to 7.10.1, and at first it's fine. However, the longer it runs t... See more...
I have Cisco IP Communicator, latest release from Cisco (8.6.6.16). It works fine with View Agent 7.5.4. I tried upgrade the Agent to 7.10.1, and at first it's fine. However, the longer it runs the more delay there is between when I should hear audio and when it plays. If I close Cisco IP Communicator and open it again, then it repeats the process. It takes about 15 minutes for the delay to show up. Desktop is running Windows 10.
Any luck on this? I have 7.11 with UAG 3.81 and see disconnects as well.
After doing some digging, I found that the issue is related to what gets pushed into the LDAP configuration store. I have a case opened with VMware tech support and will update this when I get an... See more...
After doing some digging, I found that the issue is related to what gets pushed into the LDAP configuration store. I have a case opened with VMware tech support and will update this when I get an official resolution. In the meantime I have figured out a solution. 1. Install the agent as usual with the usual command line option  /v"VDM_VC_MANAGED_AGENT=0". 2. When you log back into VMware View (admin), the desktop will show as an RDS Host with a configuration error for the status. This is expected. 3. From the VMware View connection server open ADSIEdit and connect to the following location: ldap://127.0.0.1/dc=vdi,dc=vmware,dc=int 4. Navigate to the OU=Servers folder 5. Locate the Windows 2016 entry. Double click on each entry and find the server by the <description> or <ipHostNumber>. 6. Once you find the right entry, modify the attribute <pae-Server-In-DesktopMode>. This needs to be set to a value of 1. 7. Reboot the Windows 2016 desktop.
When we try to setup a windows 2016 server for desktop mode, it still shows up at RDS Host mode inside the View server. THis works on windows 2012, and 2008 without any problems. Is there a new s... See more...
When we try to setup a windows 2016 server for desktop mode, it still shows up at RDS Host mode inside the View server. THis works on windows 2012, and 2008 without any problems. Is there a new step required to make 2016 work?
View 7.4. Executing the process to refresh the internal certificates via vdmutil. When I run the --createPendingConnectionServerCertificates it generates the cert request find. However, when I go... See more...
View 7.4. Executing the process to refresh the internal certificates via vdmutil. When I run the --createPendingConnectionServerCertificates it generates the cert request find. However, when I go to complete that process with the --activatePendingCertificates, I get java errors. errorMessage: Unable to activate pending connection server message security certificate causeString: com.vmware.vdi.messsagesecurity.swiftmq.MQCertificateRefreshException: Tunnel certificate refreshed failed.
How do I increase the default ssl certificate duration from the default 180 days? In my vdm logs I see <pool-2-thread-1> [MessageBusCertificateGeneration] MQ Router SSL keysize: 2048 <pool-... See more...
How do I increase the default ssl certificate duration from the default 180 days? In my vdm logs I see <pool-2-thread-1> [MessageBusCertificateGeneration] MQ Router SSL keysize: 2048 <pool-2-thread-1> [MessageBusCertificateGeneration] MQ Router validty period: 180 DAYS <pool-2-thread-1> [MessageBusCertificateGeneration] Router SSL Check interval: 3600s
I am running VMware View 7.0, in my lab. I know this is a semi-unique use case. What I want: 1. User logs in to View with the username demo7. 2.They see all the desktops for this demo. 3. I ... See more...
I am running VMware View 7.0, in my lab. I know this is a semi-unique use case. What I want: 1. User logs in to View with the username demo7. 2.They see all the desktops for this demo. 3. I would like to hard code it so when they connect to Desktop-001, it logs in a bob, and when they select Desktop-002, it logs in as Nancy. Currently they have to login to the View Server as Bob, then open a 2nd connection to the view server as Nancy, in order to interact with both desktops. Any ideas?
Is there a way to recover the root password on the access point product?
I installed the latest 3.5(2) and am getting this error still.
This is what I have figured out: 1) Registry Entry externalBlastPort appears to change the port that the web client will expect Blast to be on 2) Whatever you set externalBlastPort to, if chang... See more...
This is what I have figured out: 1) Registry Entry externalBlastPort appears to change the port that the web client will expect Blast to be on 2) Whatever you set externalBlastPort to, if changing from the default you also need to change the Blast GPO parameter http service to that port. By doing #1 and #2, blast internally works for me now, when using a non-default port. However, even with all the ports forwarded, blast does not work externally. Looks at the logs via fiddler, I never see the request for the HTTPS Tunnel to the blast port, everything shows as 1000, which is my HTTPS port for view agent. Other thing I noticed, if I change the port that view agent is running on (registry entry: httpsPortNumber) to anything but 443, Blast is broken internally and externally.
I have the exact same thing. Have you had any luck on this?
I got the thick client to work, added an binding on IIS for https on 1000... but am getting a blank screen when accessing the Blast/HTML5 page. Registry Entries: httpsPortNumber = 1000 exter... See more...
I got the thick client to work, added an binding on IIS for https on 1000... but am getting a blank screen when accessing the Blast/HTML5 page. Registry Entries: httpsPortNumber = 1000 externalRDPPort = 1001 externalPCOIPPort = 1002 externalIPAddress: 192.168.50.10 externalFrameworkChannelPort = 1003 externalBlastPort = 1004 My NAT rules look this (External->Internal) 1004->8443 (TCP & UDP) 1003->3211 (TCP) 1001->3389 (TCP & UDP) 1002->4172 (TCP & UDP) 1000->1000 (TCP & UDP) Is there a specific port that I should be mapping 1004 other than 8443?
I want to automate logging in to desktops via URL. I found the following syntax to access a desktop: VMware-view://<fqn>/<desktop-name>?desktopProtocol. Is there a way to pass in username, pas... See more...
I want to automate logging in to desktops via URL. I found the following syntax to access a desktop: VMware-view://<fqn>/<desktop-name>?desktopProtocol. Is there a way to pass in username, password, domain so a user is not prompted? I want to do that with the thick client and HTML5/blast.