

We need to offer access to 4 types of users: How would we have dealt with this situation in an older environment including a Windows based Security Server? Since the Security Server required a 1:1 pairing between a Connection & a Security Server we would easily hit the maximum number of 7 Connection Server in case that we want to offer multiple accesses from different locations. Constraints to always use tunneled connections (because of network-simplicity or security constraints).


Offering access to internal users coming from a not so trust-worthy site/location (including a second-factor authentication for those users).There might be use cases where we want to design our horizon environment in a way that we use the UAGs not just for external unsecure access, but internally as well. Keep in mind the UAG is not just a replacement for the old Windows based Security Sever, it is also offering much more functionality (Edge Services for Airwatch / Workspace One, reverse proxy, 2nd-factor authentication integration, etc.). Over the last months I gathered more and more experience about VMware’s secure Linux appliance that allows secure access to a virtual Desktop (and more) over an unsecure network (e.g.) the Internet: Unified Access Gateway (UAG).
