Securing Virtual Desktop Environment - Part 2
As outlined in my previous blog, securing a VDI environment needs focused attention.
One of the key advantages to desktop virtualization is the ability to create on-demand dynamic desktops specific to the user's role within the organisation. The users are authenticated and connected to desktop sessions via a software component called Connection broker.
The way in which IT departments manage user identities, authenticate systems and enforce access policies across the corporate network, all need to be thought through in the context of a new VDI environment. Having a centralised point of management for user identities, access rights, IT policies and auditing is vitally important.
The connection broker controls the access permissions to specific desktop and applications. Organizations should have the capability to ensure that the Connection broker is not compromised, by making use of strong authentication factors, such as biometrics authentication, password or token, etc. This ensures that the employee logging in has the rights and permissions to access the virtual desktop.
Have you come across or defined any specific strategies for identify management for VDI.? Share your thoughts on this...