Configure SSL connections to satisfy Security Tools

Specifies how SSL session negotiation connections are established.

In order to satisfy port scanners, enable this 'Configure SSL connections' setting and on a View Agent, do the following:

1. In Microsoft Management Console, store a correctly named and signed certificate into the Personal store for the Local Machine's computer account. Make sure to mark it exportable.
2. Store the certificate for the Certificate Authority that signed it in the Trusted Root certificate store.
3. Disable connections to VMware View 5.1 and earlier.
4. Configure the agent to load certificates only from the Certificate Store. If the Personal store for the Local Machine is used, leave the certificate store names unchanged as "MY" and "ROOT" (without the quotes), unless a different store location was used in steps 1 and 2.

The resulting PCoIP Server will satisfy Security Tools such as port scanners.

Checking the box to enforce AES-256 or stronger ciphers will prevent the use of AES-128 ciphers suites during SSL negotiation.

If this 'Configure SSL connections' setting is disabled or not configured:

1. This endpoint will connect to VMware View 5.1 and earlier endpoints as well as newer ones.
2. The endpoint will use certificates from the machine account's "MY" store and Certification Authority certificates from the "ROOT" store.
3. An agent will try to load a certificate but generate a unique self-signed certificate if none is found.
4. The minimum key size will be 1024
5. The Server's certificate will be its own, not that of the View Connection Server.
6. The AES-128 cipher suite will be available.

Supported on: Undefined

Disable connections from VMware View 5.1 and earlier
Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
Value Namepcoip.ssl_cert_deny_legacy_connections
Value TypeREG_DWORD
Default Value0
True Value1
False Value0
How a Server chooses the certificate it presents to post-VMware View 5.1 components:


  1. From the Certificate Store
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_type
    Value TypeREG_DWORD
    Value1
  2. Generate a unique self-signed certificate
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_type
    Value TypeREG_DWORD
    Value2
  3. From the Certificate Store if possible, otherwise generate
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_type
    Value TypeREG_DWORD
    Value0

Name of the Machine account's Certificate Store to search for a certificate:

Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
Value Namepcoip.cert_store_name
Value TypeREG_SZ
Default ValueMY
The minimum keylength enforced when validating the certificate (1024, 2048 or 4096):


  1. 1024
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_min_key_length
    Value TypeREG_DWORD
    Value1024
  2. 2048
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_min_key_length
    Value TypeREG_DWORD
    Value2048
  3. 4096
    Registry HiveHKEY_LOCAL_MACHINE
    Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
    Value Namepcoip.ssl_cert_min_key_length
    Value TypeREG_DWORD
    Value4096

Name of the Machine account's Certificate Store to search for a Certificate Authority's certificate:

Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
Value Namepcoip.ca_cert_store_name
Value TypeREG_SZ
Default ValueROOT
Server instructs client to request the View Connection Server's certificate
Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
Value Namepcoip.ask_clients_to_use_vcs_sni
Value TypeREG_DWORD
Default Value0
True Value1
False Value0
Enforce AES-256 or stronger ciphers for SSL connection negotiation
Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Teradici\PCoIP\pcoip_admin_defaults
Value Namepcoip.ssl_disable_aes_128
Value TypeREG_DWORD
Default Value0
True Value1
False Value0

pcoip.admx

Administrative Templates (Computers)

Administrative Templates (Users)