



When multi-factor authentication is enabled, users are prompted for that second factor first, and they are only prompted for their Active Directory credentials if this authentication is successful. Second, the UAG is not tightly coupled to a connection server, so you can use a load balancer between the UAG and the Connection Server to eliminate single points of failure.Īnd finally, multifactor authentication is validated on the UAG in the DMZ. The UAG is built on Photon, VMware’s lightweight Linux distribution, and it is distributed as an appliance. First, it does not require a Windows license. The UAG has some benefits over the Security Server. The Security Server was a Windows Server running a stripped-down version of the Horizon Connection Server, and this component was deprecated and removed with Horizon 2006. This wasn’t always the case – previous Horizon releases the Horizon Security Server. The appliance is hardened for deployment in a DMZ scenario, and it is designed to only pass authorized traffic from authenticated users into a secure network.Īs of Horizon 2006, the UAG is the primary remote access component for Horizon. The Unified Access Gateway (also abbreviated as UAG) is a purpose built virtual appliance that is designed to be the remote access component for VMware Horizon and Workspace One. And we’re back…this week with the final part of deploying a Horizon 2006 environment – deploying the Unified Access Gateway to enable remote access to desktops.īefore we go into the deployment process, let’s dive into the background on the appliance.
