

This level of protection involves specific inspection of desktop protocols and coordination of potentially rapid changing policies and network addresses, and so on, to be able to accurately control access. UAG virtual appliances also ensure that the traffic for an authenticated user can be directed only to desktop and application resources to which the user is actually entitled. UAG virtual appliances are typically deployed in a network demilitarized zone (DMZ), and they ensure that all traffic entering the data center to desktop and application resources is traffic on behalf of a strongly authenticated user. An enterprise needs strong assurance of the identity of the user, and also needs to precisely control access to their entitled desktops and applications.įigure 1: A Single Access-Point Appliance Deployed in a DMZįor those of you who are familiar with Horizon security server, UAG provides similar but enhanced functionality. UAG provides this secure connectivity to desktops and applications that are either cloud-hosted through VMware Horizon Cloud or on-premises in a customer data center through Horizon 7.Ī connection from a Horizon Client or browser on the internet, whether to on-premises or cloud-hosted end-user computing resources, presents a security challenge. UAG supports VMware Horizon, VMware Identity Manager and VMware AirWatch use cases but this post focuses just on the Horizon functionality.

Unified Access Gateway (UAG) is a virtual appliance primarily designed to allow secure remote access to VMware end-user computing resources from authorized users connecting from the internet. I will describe the main features and then drill down a little into deployment, security, high availability (HA) and scalability. In this post I will give an overview of Unified Access Gateway, the VMware virtual appliance used with End-User Computing products.
