To meet the requirement of high availability for Kerberos integrated windows authentication in a Workspace ONE deployment, it is essential to have connectors deployed behind a load-balancer. This ensures redundancy and load distribution. Additionally, the IdP Hostname needs to be set to the load-balancer FQDN to ensure that authentication requests are properly routed and distributed across the available connectors.
To configure VMware Horizon View to connect to VMware Identity Manager, it is required to add a SAML authenticator. SAML (Security Assertion Markup Language) is widely used for single sign-on (SSO) and identity federation, making it the appropriate choice for authenticating and authorizing users in this environment.
To configure Identity Bridging for an SAML application on the VMware UAG, the following steps need to be completed: First, an identity provider must be configured and the SAML metadata of the identity provider saved. Second, you need to configure a Web Reverse Proxy for Identity Bridging from Certificate to Kerberos. Finally, the UAG certificate must be pinned to the SAML provider to establish a secure connection. These steps are essential for setting up Identity Bridging which enables SAML assertions to be correctly processed and verified by the UAG.