Configure Certificate Based Authentication for VMware Identity Manager (Workspace ONE) in a DMZ Deployment

posted

In this blog post we focus on Identity Manager Workspace ONE Certificate Authentication and will walk through the process of setting up certificate based authentication for VMware Identity Manager (Workspace ONE) for DMZ deployments. Certificate based authentication has requirements which for the purposes of this blog we assume already exist in the environment. To take Read more...

VCDXs Around the World: Where’s your nearest VMware Certified Design Expert?

posted

  VMware Certified Design Expert (VCDX) represents the highest level of certification offered by VMware. With four possible areas of certification, including Data Center Virtualization, Cloud Management and Automation, Desktop and Mobility, and Network Virtualization, this elite group is in charge of solving some of the most important cloud and virtualization challenges facing companies today. Read more...

Automated Secure Desktop Solution

posted

TAI RATCLIFF Senior Solutions Architect Many security breaches occur in the desktop environments. In some cases, admins and users make unauthorized changes in order to “get their jobs done”. It is easy enough to lock down a desktop so that end-users only have minimal access rights but the more you lock down the desktop the Read more...

Steps for monitoring App Volumes with Log Insight Manager

posted

  JEREMY WHEELER Consulting Architect End User Computing In this blog post we will walk through the process of setting up vRealize Log Insight Manager to monitor your App Volumes environment. This blog is going to make some assumptions. We’re assuming you have already deployed App Volumes. We also assume you have deployed and configured Read more...

Configuring Identity Manager in a DMZ with Internal Connector

posted

JEFFREY DAVIDSON Consulting Architect In this blog post we will walk through the process of setting up VMware Identity Manager (Workspace One) in a DMZ and use a connector appliance on the internal (trusted) network for secure active directory sync and authentication. This blog is going to make some assumptions. We’re assuming you have already Read more...