
There are several advantages of using UAG over using the traditional VPN way of connecting to the network. Why Use Unified Access Gateway Instead of VPN?

The secondary protocol details are as follows after an authentication attempt is successful: This is used during the authentication phase of the connection process.The primary protocol details are as follows: Horizon access is comprised of primary and secondary protocols for accessing the Horizon environment. High-level architecture of the Unified Access Gateway UAG appliance in the Horizon infrastructure Horizon Protocols Used in Accessing

By designing access to your Horizon environment using the Unified Access Gateway (UAG), you are able to provide an extra layer of security for your end user computing environment which can include virtual machines, application hosts, and even physical workloads. Think of the UAG appliance as a proxy to your Horizon Connection Server which resides inside your company’s network. It inspects the desktop protocols being used and coordinates access based on the policies and network addresses used for access. The UAG appliance also bolsters security from the standpoint the user is only directed to desktops and applications to which they are entitled to use. When directed through the UAG, users can access only the resources they have been given access to use. The UAG is an appliance that directs authentication requests to the appropriate server and discards unauthenticated requests. What is the Unified Access Gateway (UAG)?

In this post, we will take a look at VMware Unified Access Gateway UAG 3.8 installation and configuration to see how to stand up this security appliance in front of your VMware Horizon infrastructure. The UAG is the replacement for the legacy Horizon Security Server and has many advantages to the older technology.

VMware has provided a way to do this with the Unified Access Gateway (UAG). When building out how your clients are going to access a VMware Horizon environment, you want to enable secure access. Considering the security of your end user computing environment that is accessed via remote connections is extremely important.
