AWI Client: View Connection Server + Imprivata OneSign Session Settings

Select the View Connection Server + Imprivata OneSign session connection type from the Configuration > Session page to configure the client to authenticate through the Imprivata OneSign system in addition to a View Connection Server when connecting to a VMware desktop.

AWI Session Connection Type – View Connection Server + Imprivata OneSign

AWI Session Page Parameters

Parameter Description

Bootstrap URL

Enter the bootstrap URL used to find an initial OneSign server in a OneSign authentication deployment.

OneSign Pool Name Mode

Select whether the Pool Name to Select property is used in OneSign mode.

  • Ignore the Pool Name to Select field
  • Use the Pool Name to Select field if set

Note: For Tera1 zero clients, this parameter is called OneSign Desktop Name Mode.

Pool Name to Select

Enter the pool name. When the list includes a pool with this name, the client will immediately start a session with that pool.

Note: This field is case-insensitive. For Tera1 zero clients, this parameter is called Desktop Name to Select.

Onesign Appliance Verification

Select the level of verification performed on the certificate presented by the OneSign appliance server:

  • No verification: Connect to any appliance
  • Full verification: Only connect to appliances with verified certificates

Direct To View Address (Tera2 only)

Enter the address of the View Connection Server to use when OneSign servers cannot be reached. When configured, a Direct to View link occurs on the OSD Connect page and user authentication screens. When users click the link, it cancels the current OneSign connection or authentication flow and starts a Horizon View authentication flow instead. This feature provides a mechanism for OneSign zero client users to access their View desktops when the OneSign infrastructure is unavailable.

Certificate Check Mode

Select the level of verification performed on the certificate presented by the connection server:

  • Never connect to untrusted servers: Configure the client to reject the connection if a trusted, valid certificate is not installed. (This is the most secure option.)
  • Warn before connecting to untrusted servers: Configure the client to display a warning if an unsigned or expired certificate is encountered, or if the certificate is not self-signed and the zero client trust store is empty. (This option is selected by default.)
  • Do not verify server identity certificates: Configure the client to allow all connections. (This option is not secure.)

Certificate Check Mode Lockout

When enabled, prevents users from changing the Certificate Check Mode settings from the OSD or AWI.

Trusted View Connection Servers

Click the Show button to display View Connection Servers for which the client has received a valid certificate.

Click the Clear button to clear this cache.

Remember Username

When enabled, the username text box automatically populates with the last username entered.

Use OSD Logo for Login Banner

When enabled, the OSD logo banner appears at the top of login screens in place of the default banner. You can upload an OSD logo from the OSD Logo Upload page.

Prefer GSC-IS

When selected, the GSC-IS interface is used if a smart card supports more than one interface such as CAC (GSC-IS) and PIV endpoint. If a smart card supports only one interface, such as either CAC or PIV endpoint, then only the CAC or PIV endpoint interface is used regardless of this setting. This only affects smart card access performed outside of PCoIP sessions.

Enable Peer Loss
Overlay

When enabled, the “Network Connection Lost” overlay appears on the display(s) when a loss of network connectivity is detected. Normal hypervisor scheduling delays can falsely trigger this message.

Note: This option is only available for a zero client. Desktop applications that require the peer loss notification should re-enable the feature through the OSD, AWI, or MC.

Enable Preparing Desktop Overlay

When enabled, the "Preparing Desktop" overlay appears on the display(s) when users log in.

Note: This overlay provides assurance that login is proceeding if the desktop takes more than a few seconds to appear.

Enable Session Disconnect Hotkey

When enabled, users can press the Ctrl+Alt+F12 hotkey sequence to pop up the "Zero Client Control Panel" overlay, which lets them disconnect the current session on the workstation or power off the workstation.

Note: Before users can use this disconnect hotkey sequence, certain other configuration options must be in place. See Disconnecting from a Session for details.

Enable RDS Application Access

When enabled and users connect to a VMware Horizon View Connection Server that offers applications, a list of available applications will be presented.

Note: Applications open in full-screen mode, but can be re-sized once users are in session.

PCoIP Utility Bar Mode (Tera2 zero clients only)

When enabled, the PCoIP Utility Bar appears at the top of the primary display when a user is in session and moves the cursor directly under the bar. The utility bar can be used to disconnect a session or to shut down a remote workstation. For Direct to Host session connection types, Local Cursor and Keyboard must be enabled in order for the zero client to process mouse events for the utility bar. For all connection types, the mouse must be locally connected (i.e., not bridged).

  • Disabled: Disables the PCoIP Utility Bar. Note: (By default, the utility bar is disabled.)
  • Enabled: Enables and auto-hides the PCoIP Utility Bar. Users can show the utility bar by pointing the mouse at the top of the screen directly under the utility bar. Users can slide the utility bar to the right and left at the top of the screen.
  • Enabled and Pinned: Enables and pins the PCoIP Utility Bar at the top of the screen. Users cannot hide the utility bar, but they can slide it to the right and left at the top of the screen.

Note: This feature is configurable from the MC and AWI only. It requires firmware version 4.2.0 or newer.

Pre-session Reader Beep

Configure whether the proximity card reader beeps when a valid card is tapped on the reader in OneSign mode:

  • Disabled: Disables the feature.
  • Enabled: Enables the feature.
  • Use Existing Setting: Uses the existing setting (affects only devices running firmware 4.1.0 or greater)

Invert Wiegand Data

Configure whether or not the RF IDeas proximity reader will invert the Wiegand bits that are read from a user's ID token. This feature is useful when some of the RF IDeas readers in your system are programmed to invert the Wiegand data and others are not. It lets you configure all readers to read the bits in a consistent manner (whether inverted or not inverted), so that all the readers behave the same way from a user's point of view.

  • Disabled: Disables the feature. Wiegand data are not inverted.
  • Enabled: Enables the feature. Wiegand data are inverted.
  • Use Existing Setting: Uses the existing setting (affects only devices running firmware 4.2.0 or greater).

Note: This feature is configurable from the MC and AWI only. It requires firmware version 4.2.0 or newer.

Restrict Proximity Cards

Configure whether or not proximity cards are restricted to tap-in/tap-out only.

When this feature is enabled, the proximity card reader is locally terminated (i.e., it uses drivers in the client's firmware), and proximity cards can only be used for tap-in/tap-out.

When this feature is disabled, the proximity card reader is bridged by default (i.e., it uses drivers in the host OS), and proximity cards are not restricted. They can be used for tap-in/tap-out and also during a session—for example, when an application requires in-session authentication.

  • Only use proximity cards for tap-in/tap-out: Enables/disables the feature.

Note: This feature is configurable from the MC and AWI only. It requires firmware version 4.2.0 or newer.

Session Negotiation Cipher

Important: In release 4.8.0, the security cipher features listed below are supported on Tera2 zero clients only. In order to use a non-SHA-1 cipher, both the client and host endpoints must support it.

Note: For sessions with software hosts, the zero client should be configured to use the Maximum Compatibility option.

For Tera2 zero clients:

Configure the Transport Layer Security (TLS) cipher to use for negotiating the TLS session between the PCoIP client and the PCoIP host.

  • Maximum Compatibility: TLS 1.0 or higher with RSA keys including ciphers that use SHA-1: This option provides maximum compatibility.
  • Suite B: TLS 1.2 with Suite B-compliant 192-bit elliptic curve encryption. This option provides a higher level of security.
  • Disable SHA-1: TLS 1.2 with RSA keys and strong ciphers using only SHA-256 or SHA-384: When selected, only devices running firmware 4.8.0 or greater are affected.
    Note: Currently this option can only be used with Amazon WorkSpaces hosts.

For Tera1 zero clients:

Configure the Transport Layer Security (TLS) cipher to use for negotiating the TLS session between the PCoIP client and the PCoIP host.

  • Maximum Compatibility: TLS 1.0 with RSA keys and AES-256 or AES-128 encryption: This option provides maximum compatibility.
  • Suite B: TLS 1.2 with Suite B-compliant 192-bit elliptic curve encryption. This option provides a higher level of security.

Enabled Session Ciphers

Enable or disable an encryption mode for the device. By default, all encryption modes that pertain to a device are enabled.

  • AES-128-GCM (Tera1 and Tera2): An encryption method implemented in first-generation Tera1 and second-generation Tera2 processors. This method offers the best performance between hardware endpoints for Tera1 devices. AES-128-GCM also may offer improved performance for Tera2 clients when connecting to VMware 4 or newer if there is more than about 7 Mbps available on the network.
  • AES-256-GCM (Tera2 only): A more secure encryption method implemented in second-generation Tera2 processors that offers the best performance between hardware endpoints. When connecting to VMware 4 or newer, AES-128-GCM is recommended.
  • Salsa20-256-Round12 (Tera1 only): A lighter encryption method implemented in firmware that may offer improved performance for Tera1 clients when connecting to VMware View 4 or newer if there is more than about 7 Mbps available on the network.

Note: For more information about connecting to VMware Horizon virtual desktops, see “Using PCoIP® Zero Clients with VMware View User Guide” (TER0904005) in the Teradici Support Documentation Center.

Note: The enabled encryption mode must match between the host and client for a session to be established. If more than one mode is enabled, the firmware selects the following:

  • Host to Tera1 or Tera2 clients: AES-128-GCM or AES-256-GCM for the PCoIP session.
  • VMware View 4.5 and later to Tera1 client: SALSA20-256-Round12 for the PCoIP session.
  • VMware View 4.5 and later to Tera2 client: AES-128-GCM for the PCoIP session.

Disconnect Message Filter

This field lets you control what type of messages appear when a session is disconnected. There are three categories:

Information: User- or administrator-initiated actions affecting the session:

  • You have been disconnected because you logged in from another location or your host was shut down or restarted.
  • You have been disconnected because an administrator disconnected you.
  • You have been disconnected because you logged in from another location.
  • You have been disconnected because you disconnected from your workstation.

Warning: System-initiated, but expected actions affecting the session:

  • You have been disconnected because your session timed out.

Error: Unexpected system-initiated actions causing session to fail:

  • You have been disconnected.
  • Unable to connect (0x1001). Please contact your IT administrator.
  • Unable to connect (0x1002). Please contact your IT administrator.
  • Session closed remotely.
  • Session closed remotely (unknown cause).
  • You have been disconnected due to a configuration error (0x100). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x201). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x300). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x301). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x302). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x303). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x305). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x400). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x401). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x402). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x403). Please contact your IT administrator for assistance.
  • You have been disconnected due to a configuration error (0x404). Please contact your IT administrator for assistance.

Note: For detailed information about the above session disconnect codes, please see KB 15134-872 in the Teradici Support Site.

You can choose to display:

  1. Show All messages – This option shows all disconnect messages including Info, Warning, and Error messages.
  2. Show Error and Warnings Only – This option hides info messages and displays only error and warning messages.
  3. Show Error Only – This option hides Info and Warning messages and displays only Error messages.
  4. Show None – Don’t show any disconnect messages.

Custom Session SNI

When enabled, sets a customized Server Name Indication (SNI) string on authorized man-in-the-middle-enabled clients. The SNI string is appended to the SSL/TLS HELLO when the client initates an SSL connection with the host.

Enable DSCP

When enabled, the device populates the Differentiated Services Code Point (DSCP) field in the IP header, allowing intermediate network nodes to prioritize PCoIP traffic accordingly.

Enable Transport Congestion Notification

When enabled, transport congestion notification is enabled to allow PCoIP endpoints to react accordingly if an intermediate network node sets the congestion notification bit in either the IP header or PCoIP transport header.

Note: For more information about the PCoIP transport header, see PCoIP Packet Format.