How to Set Up 2-Factor Authentication in VMware Horizon View with TOTPRadius
VMware Horizon View enables you to access a virtual desktop from anywhere, anytime. Horizon offers you the possibility to move from one place to another: to work from your office or from a cybercafé, or from any other place, when you have a network connection that lets you connect to the Horizon View infrastructure.
This document describes how to secure your external connections and authorize only specific users or groups of users connecting to Horizon View from outside, using 2-Factor authentication with hardware tokens or mobile apps by integrating our TOTPRadius solution.
Prerequisites
Prerequisites are the following:
• vSphere Infrastructure correctly configured for Horizon View
• Horizon View correctly configured (Connection Server, Security Server and Composer)
• At least one TOTPRadius appliance deployed and configured
• Administrative access to both TOTPRadius and Horizon View
View Connection Server setup
Connect to your Horizon View Connection Server as Administrator
Select the Horizon View Connection Server you want to use:
On Authentication tab, select RADIUS as “Advanced Authentication”:
1. Check : “Enforce 2-Factor and Windows username matching”
2. Select: “Create New Authenticator”
3. Specify the Label : example : TOTPRadius
4. Specify the Hostname/Address : FQDN or IP address of your radius server
5. Specify the Shared Secret : the secret you specified in TOTPRadius settings
The shared secret should match the settings of your TOTPRadius appliance:
Note: For production usage, you can install and configure a secondary TOTPRadius server, in slave mode.
Adding users to RADIUS
At this point, Horizon View is configured 2-Factors authentication using your TOTPRadius server, now you have to add users to TOTPRadius. There are 2 methods: LDAP self-enrollment and creating users using Admin panel.
LDAP self-enrollment
Guide your users to navigate to https://FQDN_of_TOTPRadius//ldap-enroll and follow the instructions. The process will look like shown in the video below:
Creating users via Admin panel
Login to TOTPRadius admin interface, and click on New User button. This will generate a QR code that should be used to provision the TOTP profile on a mobile authenticator app (Google Authenticator, Microsoft Authenticator, Token2 TOTP+ or any other RFC6238-compliant application). If a hardware token is to be used for this user, click on Edit profile or assign hardware token button and paste the secret key of the hardware token in Token key field in base32 format.
If a programmable hardware token is used, you can burn the secret onto the hardware token by scanning the QR code using one of the NFC Burner apps.
Logging in to Horizon View with 2FA enabled
Now you can test and make a connection on your View Connection Server by providing your login name and password in the form of "AD_PASSWORD""Generated Code" (no spaces nor quotes. I.e. if your password is MyP@ssword and the OTP code is 123456, you should enter MyP@ssword123456):
If everything works fine, the second login screen appears and you have to type your AD password only again (this is a hard-coded design by Horizon View whatever 2-Factor authentication method you want to use, and is not caused by TOTPRadius)
About
Installation and configuration
- Installation and initial configuration
- Network configuration
- Migrating from older versions
- LDAP Configuration
- Azure AD Configuration
- Self-service enrollment portal
- Web and LDAPS Certificates
- Syslog configuration
- Single-factor authentication exceptions
- Slave appliance mode
- Dynamic RADIUS Attributes
Integration guides
Blog
22-11-2024
Self-Service for Hardware OATH Tokens in Entra ID with SHA256 Support
A recent update to Microsoft Entra ID now allows end-users to self-service hardware OATH tokens, removing the need for administrators to manually activate them. Admins can upload hardware tokens into a "public repository" via Graph API, allowing users to assign tokens to their accounts through the "My Security Info" page.
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.