Configuring Support for VMware True SSO

Configuring support for True SSO requires that you enable Imprivata OneSign for Kerberos authentication.

VMware True SSO Support Introduced

As part of True SSO authentication, the Microsoft Certificate Authority (CA) creates a certificate on behalf of the user. True SSO uses this certificate to log the user into their virtual desktops or applications, without requiring them to enter their Active Directory credentials.

Enabling Kerberos support allows Imprivata OneSign to trust the True SSO user certificate, which extends the True SSO environment to Imprivata Virtual Desktop Access functionality.

NOTE: For additional details on the True SSO workflow, see Introducing True SSO in VMware Horizon 7.

When True SSO support is enabled:

  1. The user logs into VMware Workspace ONE.
  2. The user opens the virtual desktop or applications manually.
  3. The Imprivata agent is active and is available to:
    • Provide Imprivata Virtual Desktop Access functionality.
    • Proxy user credentials to Imprivata SSO-enabled applications, if licensed for Imprivata Single Sign-On.

Before You Begin

Before you begin:

  • Verify that the True SSO environment is functioning normally, independent of Imprivata OneSign, before installing and configuring Imprivata components. For more information on configuring True SSO, see "Setting up True SSO" in the VMware Horizon documentation.
  • Review Imprivata OneSign Supported Components to confirm that your True SSO environment meets all of the minimum or recommended requirements.

NOTE: Imprivata Virtual Desktop Access supports True SSO on Windows endpoints only.

Kerberos Prerequisites

Review the following prerequisites before you begin:

  • The Imprivata OneSign keytab utility, which you use to create and upload a keytab file to an appliance, uses ktpass. The keytab utility is installed with the Imprivata agent.

  • Ktpass is part of the Microsoft Windows Server resource kit. Beginning with Windows Server 2008, the resource kit tools are installed as part of the server role installation.

  • The endpoint computer from which you run the keytab utility and the primary appliance to which the Imprivata agent communicates must be in the same Active Directory domain.

    For example, if the fully qualified domain name (FQDN) of the endpoint computer is endpoint.example.com, then the Imprivata appliance FQDN could be server_name.example.com.

  • The Service Principal Name (SPN) of the appliance that the keytab utility registers with Active Directory is case-sensitive. The hostname and the domain name that appear in the Imprivata Appliance Console of this appliance must contain all lowercase letters.

  • If the Imprivata enterprise includes more than one domain that share a trust relationship, for example a parent company (company.com) and two subdomains (us.company.com and eu.company.com), make sure that at least one appliance is placed in company.com. Upload the keytab file to this appliance.

    Uploading to the appliance that is in the second-level domain (SLD) ensures that the keytab file is valid for all domains.

Enabling Kerberos Authentication

Enabling Kerberos authentication requires that you:

Install the Imprivata Agent to the Virtual Machines

The Imprivata agent must be installed on each virtual machine from which Imprivata Virtual Desktop Access functionality is required.

The installation can be pushed to groups of computers or installed on one computer at a time, depending on your organization's preferences. See Deploying the Imprivata Agent for instructions on installing agents. Choose the method that suits your environment.

Create and Assign Computer Policy for the Virtual Machines

Create and assign a computer policy for the virtual machines. The computer policy must be enabled for Kerberos authentication.

Create and Apply a User Policy

Create and apply a user policy for the True SSO users. The user policy must be configured for smart cards.

Verify that the Imprivata Agent is Enabled for Kerberos

You can use the Imprivata agent logging utility (ISXTrace) to verify the Imprivata agent is functioning normally in the True SSO environment.

  1. Use a test user to log into Workspace ONE and launch a desktop or application.
  2. From the virtual machine that is hosting the virtual desktop or application, verify that the Imprivata OneSign agent icon is in active status.
  3. Ctrl + click the icon, and click Trace Utility.
  4. Click Logging options (hammer icon) to open the ISXTrace Options dialog.
  5. Select Log to Viewer (Real-Time Logging), and click OK.
  6. Verify that the log includes messages that Kerberos is employed.
  7. Re–open the ISXTrace Options dialog, select No Log, and click OK.
  8. Close the tracing utility.