Tuesday 25 May 2010

Microsoft UAG Update 1

Microsoft released UAG Update 1 last month, which updates the following areas:
  • Remote Desktop access from Windows Vista and Windows XP: Client endpoints running Windows Vista and Windows XP can now access RemoteApps and Remote Desktops published through Forefront UAG.
  • Support for Microsoft SharePoint Server 2010: Forefront UAG now supports SharePoint Server 2010.
  • Support for MSOFBA: Forefront UAG now supports the Office Forms Based Authentication protocol to allow rich clients to directly access applications published through Forefront UAG.
  • Support for site cookies: Forefront UAG now supports the use of site cookies for non-alternate access mapping applications, in addition to domain cookies.
  • Support for large CustomUpdate files: Forefront UAG now supports CustomUpdate files up to 1.5 GB in size.
  • Changes in Group Policy Object (GPO) provisioning for DirectAccess clients: Update 1 fixes an issue that caused the export script that creates GPO objects to fail, and an issue that caused the GPO to be applied to all authenticated users in the domain (including computer accounts), instead of to DirectAccess clients only.

More information regarding this update can be downloaded from here

Cyberoam Version X is here!

Cyberoam, the identity based UTM manufacturer, has revamped their multi award winning product, which can now run the new version of the firmware, Version X.

The older graphical user interface was criticised with being a little cluttered and not intuitive.  Version X is a visual treat, with a very crisp and modern.  The interface and components are well laid out and very intuitive within Version X.

More information regarding this major update can be found here: http://cyberoam.com/versionx/

Contact e92plus, if you would like to see or evaluate the Cyberoam product range.

Friday 7 May 2010

VMWare View on Microsoft IAG

VMWare View has been a bit of a pain to a number of people, but here what I have done in the past to get it to work.  (Thanks to Andrew Button for helping to remind me of some of these bits!!)

Let me be clear, I am not a VMWare expert in any fashion, and I have little knowledge of VMWare View!
  1. Ensure VMWare View works internally first
  2. Ensure a VMWare Security Server has been deployed (this tip was thanks to my  friend, Google)
  3. On IAG, publish a "Enchanced Generic Client App (hosts optional)"
  4. Give the application a name and the right access policy
  5. Give the server name that is hosting the VMWare View server, with the correct port (probably 443, if you are using HTTPS), iexplore as the executable, and the argument is the full URL for the service
  6. Finish the wizard
  7. Go into the properies and ensure that the Socket Forwarding Mode is set to VPN
  8. Publish and test
I have been struggling with making this SSO, but no joy.  If this changes, I will update this post!