Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Citrix XenDesktop Cookbook-Third Edition

You're reading from   Citrix XenDesktop Cookbook-Third Edition Over 40 engaging recipes that will help you implement a full-featured XenDesktop 7.6 architecture and its main satellite components

Arrow left icon
Product type Paperback
Published in Aug 2015
Publisher
ISBN-13 9781782175179
Length 430 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Gaspare Silvestri Gaspare Silvestri
Author Profile Icon Gaspare Silvestri
Gaspare Silvestri
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. XenDesktop® 7.6 – Upgrading, Installation, and Configuration FREE CHAPTER 2. Configuring and Deploying Virtual Machines for XenDesktop® 7.6 3. Master Image Configuration and Tuning 4. User Experience – Planning and Configuring 5. Creating and Configuring a Desktop Environment 6. Deploying Applications 7. XenDesktop® Infrastructure Tuning 8. XenDesktop® Component Integration 9. Working with PowerShell 10. Configuring the XenDesktop® Advanced Logon Index

Introduction


The Infrastructure Security is an IT area that involves a lot of different technologies and implementation techniques. The same thing can be applied to the XenDesktop architectures. As seen earlier, secure connections can be realized using a secure gateway located in front of the entire VDI architecture. The implementation of a strong authentication method is another important step to perform. In this chapter, we will discuss the use of hardware devices (such as Smart Cards or PKI tokens and special USB keys used to authenticate users), in order to perform the login phase through the use of a valid certificate. Then, we will discuss how to configure a two-factor authentication with software tokens. At the end of this chapter, we will discuss the implementation of the strong authentication logon method, a more robust and secure way to manage the user logon phase, by the use of the Radius platform.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime