Securing Your PCoIP Remote Workstation Card¶
The security needs of your deployment are driven by your specific environment. You can configure PCoIP Remote Workstation Cards to meet security requirements for a range of scenarios, from high-security environments to trusted environments.
Securing your PCoIP Remote Workstation Card involves some or all of these tasks, depending on your deployment needs:
-
Peering to your PCoIP Zero Client: Adding a peer-to-peer certificate allows for a secure connection between dedicated Remote Workstation Cards and PCoIP Zero Clients. See Peering Remote Workstation Cards to PCoIP Zero Clients
Best Security Practices
We highly recommend using custom peer-to-peer certificates to create a more secure environment when connecting to your Remote Workstation Card. Contact your IT department to ensure your deployment is in accordance with your Company's security policy.
-
Uploading certificates to the PCoIP Remote Workstation Card: Depending on the certificate checking mode you choose, you may have to upload server certificates to the PCoIP Remote Workstation Card's certificate store. See Uploading Certificates.
-
Configuring the PCoIP Remote Workstation Card with an endpoint manager: Configure your PCoIP Remote Workstation Card for either automatic or manual discovery by an endpoint manager. See About PCoIP Remote Workstation Card Management Security Levels.
-
Configuring 802.1X Network Device Authentication: Configure 802.1X network device authentication for enhanced security. See Configuring 802.1X Network Device Authentication.
-
Configuring Access to Management Tools: Configure a PCoIP device management tool from managing the PCoIP Remote Workstation Card, disable administrative access to the PCoIP Remote Workstation Card's AWI, or force an administrative password change the next time someone accesses the AWI. See Configuring Access Settings.
You can access additional security functionality from the PCoIP Management Console
You can configure security settings for multiple devices from the PCoIP Management Console, as well as access additional AWI security settings such as disabling the AWI. For more information, see the PCoIP Management Console Administrators’ Guide.