Horizon Cloud Next-Gen Service TrueSSO with Microsoft Enterprise Certificate Authority

VMware Horizon Cloud Service Next-gen (aka Horizon Cloud Service v2) has added a new TrueSSO feature with Microsoft Enterprise Certificate Authority (CA) in September, 2023 release. Similar feature is available in Horizon Cloud service first-gen (aka v1) as well. But the key difference here is, in first-gen, there is a requirement of Horizon Enrollment Server has to be installed and configured within customer`s environment to handles the cert requests during the users logon. In Next-gen, Horizon Enrollment Server is no more required. The Enrollment Server like capability is hosted within the Horizon Cloud Next-gen control plane as a part of service. Hence, this reduces the burden on admin as well as reduces cost which occurs to host the Enrollment Servers.

In this post, I will guide you through the steps for configuring the TrueSSO with Microsoft CA.

Prerequisite:
  • You have access to Horizon Cloud Next-gen environment.
  • Verify that you have the Microsoft Enterprise Certificate Authority (AD CS) instances that the TrueSSO feature requires. If you don’t have one, you can follow my previous blog post “Configuration of Certificate Authority” section.
  • Configure your firewall to allow the deployed Horizon Edges to communicate with the Certificate Authority instances with the required protocol and ports combination as described in Horizon Cloud Port and Protocol Requirements for Your Horizon Cloud Deployment in Microsoft Azure.
Tasks:

A. Registration of domain enrollment service accounts

B. Create an AD security group for TrueSSO and register domain service accounts

C. Create TrueSSO certificate templates. (Enrollment Agent and Smart Logon)

D. Issuance of templates

E. Configure SSO with Microsoft CA in Horizon Cloud Universal Console

A. Register domain enrollment service accounts.

1. Log into Horizon Cloud Universal Console and navigate to [Integration] tab in left pane > [Manage] > [Domains] > [Add].

Complete domain bind and domain join account registration > [Next] > turn the toggle [User Enrolment Service Account] on > define the primary and secondary domain enrollment service accounts > [Save].

In my case I am utilizing the bind accounts as domain enrollment server account as well.

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

A screenshot of a computer

Description automatically generated

B. Create an AD security group for TrueSSO and register domain service accounts.

2. Open [Active Directory Users and Group] wizard in your AD server and create a security group with the group scope as “Universal” and group type as “Security”. You can name it with whatever the name of your choice. In my case, I name it as “TrueSSOEnrollmentAccounts”.

3. Add the service accounts as member of security group (created in step#2) which you have added as domain service account in step#1.

.

C. Create TrueSSO certificate template.

4. Open Certification Authority console and follow the steps to create certificate templates.

A screenshot of a computer

Description automatically generated

Right click on [Certificate Template] > select [Manage].

A screenshot of a computer

Description automatically generated

4.1 Create Enrollment Agent template.

Right click on [Enrollment Agent] > select [Duplicate template].

In properties window, go to [Security] tab and [Add] > find the group which you have created in your Active Directory server for TrueSSO purpose > [OK]

A screenshot of a computer

Description automatically generated

Select the group name you added and in permission section put the check in [Read] and [Enroll] > select [OK].

A screenshot of a computer

Description automatically generated

Confirm that your Enrollment Agent template is in the list now.

A screenshot of a computer

Description automatically generated

4.2 Create Smart Logon template.

Right click on [Smart Logon] template > select [Duplicate Template].

A screenshot of a computer

Description automatically generated

Navigate to [Compatibility] tab > in compatibility settings, select [Windows Server 2008 R2] as Certification Authority and [Windows7 / Server 2008 R2] as Certificate recipient.

A screenshot of a computer program

Description automatically generated

In [General] tab, give the name of your choice to you template and set validity period as [1 hour].

A screenshot of a computer

Description automatically generated with medium confidence

In [Cryptography], configure as below

A screenshot of a computer

Description automatically generated

In [Request Handling], configure as below

A screenshot of a computer screen

Description automatically generated

In [Subject Name], configure as below

A screenshot of a computer screen

Description automatically generated

In [Server] tab, configure as below.

A screenshot of a computer screen

Description automatically generated

In [Issuance Requirements], configure as below.

A screenshot of a computer screen

Description automatically generated

In [Security] tab, configure as below.

Note: Add the same AD security group which you have added for Enrollment Agent template and set the permission.

A screenshot of a computer

Description automatically generated

Confirm the template for TrueSSO Smartcard Logon is in the list now.

A screenshot of a computer

Description automatically generated

D. Issuance of templates for TrueSSO

5. Follow the below steps to configure certificate template to issue. This need to be done for both Smartcard Logon and Enrollment Agent templates.

A screenshot of a computer

Description automatically generated with medium confidence

A screenshot of a certificate

Description automatically generated with medium confidence

Confirm that you have configured both templates to issue.

A screenshot of a computer

Description automatically generated with medium confidence

E. Configure SSO with Microsoft CA in Horizon Cloud universal console

6. Login to Horizon Cloud Service universal console > navigate to [Integrations] > [Manage]

A screenshot of a computer

Description automatically generated

Select [SSO Configuration] > [Add] > [Microsoft CA]

Give the name of your choice to your TrueSSO configuration > Select the appropriate Horizon Edge which you want to apply the TrueSSO > Select the appropriate domain if you have multiple domains in your environment and select [DISCOVER].

A screenshot of a computer

Description automatically generated

If you have configured the templates correctly, system automatically finds the templates and populate in UI as below. Select [ADD].

A screenshot of a computer

Description automatically generated

Confirm that you have configured the TrueSSO successfully.

[Identity & Access] > [SSO Configuration]

You can also confirm the SSO status from capacity in Edge detail page.

Navigate to [Capacity] > click in [Edge] name hyperlink > [SSO Configuration] section and confirm the SSO status as [Ready] with green ticked.

A screenshot of a computer

Description automatically generated