Workspace ONE Access Design Decisions
Use this design decision list for reference related to a Workspace ONE Access cluster in an environment with a single or multiple VMware Cloud Foundation instances
The deployment and configuration tasks for most design decisions are automated in VMware Cloud Foundation. You must perform the configuration manually only for a limited number of decisions as noted in the design implication.
For full design details, see Workspace ONE Access Design.
Deployment Specification
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-CFG-001 | Deploy Workspace ONE Access by using vRealize Suite Lifecycle Manager in VMware Cloud Foundation mode. |
| None. |
VCF-VRS-WSA-CFG-002 | Use the embedded PostgreSQL database with Workspace ONE Access. | Removes the need for external database services. | None. |
VCF-VRS-WSA-CFG-003 | Protect all Workspace ONE Access nodes using vSphere High Availability (vSphere HA). | Supports high availability for Workspace ONE Access. | None for standard deployments. Clustered Workspace ONE Access deployments might require intervention if an ESXi host failure occurs. |
VCF-VRS-WSA-CFG-005 | Add a VM group for the Workspace ONE Access cluster nodes and set VM rules to restart the Workspace ONE Access VM group before any of the VMs that depend on it for authentication. | You can define the startup order of virtual machines regarding the service dependency. The startup order ensures that vSphere HA powers on the Workspace ONE Access virtual machines in an order that respects product dependencies. | None. |
VCF-VRS-WSA-CFG-005 | Add a VM group for the Workspace ONE Access cluster nodes and set VM rules to restart the Workspace ONE Access VM group before any of the VMs that depend on it for authentication. | You can define the startup order of virtual machines regarding the service dependency. The startup order ensures that vSphere HA powers on the Workspace ONE Access virtual machines in an order that respects product dependencies. | None. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-CFG-006 | Add the Workspace ONE Access appliances to the VM group for the first availability zone. | Ensures that, by default, the Workspace ONE Access cluster nodes are powered on a host in the first availability zone. |
|
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-CFG-007 | Deploy each of the Workspace ONE Access appliances as a medium-size appliance. | Supports scalability for a vRealize Automation cluster deployment. | None. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-CFG-008 | Connect the Workspace ONE Access instance to Active Directory. | You can integrate your enterprise directory with Workspace ONE Access to synchronize users and groups to the Workspace ONE Access identity and access management services. | None. |
VCF-VRS-WSA-CFG-009 | Use Active Directory over LDAP as the Directory Service connection option. | The native (embedded) Workspace ONE Access connector binds to Active Directory over LDAP using a standard bind authentication. |
|
VCF-VRS-WSA-CFG-010 | Use an Active Directory user account with the minimum of read-only access to Base DNs for users and groups as the service account for the Active Directory bind. | Provides the following access control features:
|
|
VCF-VRS-WSA-CFG-011 | Configure the directory synchronization to synchronize only groups required for the integrated SDDC solutions. |
| You must manage the groups from your enterprise directory selected for synchronization to Workspace ONE Access. |
VCF-VRS-WSA-CFG-012 | Enable the synchronization of enterprise directory group members when a group is added to the Workspace ONE Access directory. | When enabled, members of the enterprise directory groups are synchronized to the Workspace ONE Access directory when groups are added. When disabled, group names are synchronized to the directory, but members of the group are not synchronized until the group is entitled to an application or the group name is added to an access policy. | None. |
VCF-VRS-WSA-CFG-013 | Enable Workspace ONE Access to synchronize nested group members by default. | Allows Workspace ONE Access to update and cache the membership of groups without querying your enterprise directory. | Changes to group membership are not reflected until the next synchronization event. |
VCF-VRS-WSA-CFG-014 | Add a filter to the Workspace ONE Access directory settings to exclude users from the directory replication. | Limits the number of replicated users for Workspace ONE Access within the maximum scale. | To ensure that replicated user accounts are managed within the maximums, you must define a filtering schema that works for your organization based on your directory attributes. |
VCF-VRS-WSA-CFG-015 | Configure the mapped attributes included when a user is added to the Workspace ONE Access directory. | You can configure the minimum required and extended user attributes to synchronize directory user accounts for the Workspace ONE Access to be used as an authentication source for cross-instance vRealize Suite solutions. | User accounts in your organization's enterprise directory must have the following required attributes mapped:
|
VCF-VRS-WSA-CFG-016 | Configure the Workspace ONE Access directory synchronization frequency to a reoccurring schedule, for example, 15 minutes. | Ensures that any changes to group memberships in the corporate directory are available for integrated solutions in a timely manner. | Schedule the synchronization interval to be longer than the time to synchronize from the enterprise directory. If users and groups are being synchronized to Workspace ONE Access when the next synchronization is scheduled, the new synchronization starts immediately after the end of the previous iteration. With this schedule, the process is continuous. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-CFG-017 | Configure second and third native connectors that correspond to the second and third Workspace ONE Access cluster nodes to support the high availability of directory services access. | Adding the additional native connectors provides redundancy and improves performance by load-balancing authentication requests. | Each of the Workspace ONE Access cluster nodes must be joined to the Active Directory domain to use Active Directory with Integrated Windows Authentication with the native connector. |
Network Design
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-001 | Place the Workspace ONE Access appliances on an overlay-backed or VLAN-backed NSX network segment. | Provides a consistent deployment model for management applications in an environment with a single or multiple VMware Cloud Foundation instances. | You must use an implementation in NSX-T Data Center to support this network configuration. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-002 | Allocate statically assigned IP addresses for the following:
| Using statically assigned IP addresses ensures stability across the SDDC and makes it simpler to maintain and easier to track. | Requires precise IP address management. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-003 | Configure forward and reverse DNS records for the following components:
| Workspace ONE Access is accessible by using a set of fully qualified domain names instead of by using only IP address. |
|
VCF-VRS-WSA-NET-004 | Configure the DNS settings for Workspace ONE Access to use DNS servers in the first VMware Cloud Foundation instance. | Workspace ONE Access requires DNS resolution to connect to SDDC Components. | None. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-005 | Configure the DNS settings for Workspace ONE Access to use DNS servers in each VMware Cloud Foundation instance. | Improves resiliency if an outage of a DNS server occurs. | None. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-006 | Configure the NTP settings on Workspace ONE Access to use NTP servers in the first VMware Cloud Foundation instance. | Workspace ONE Access depends on time synchronization for all cluster nodes. | None. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-007 | Configure the NTP settings on Workspace ONE Access cluster nodes to use NTP servers in each VMware Cloud Foundation instance. | Improves resiliency in the event of an outage of an NTP server. | If you scale from a deployment with a single VMware Cloud Foundation instance to one with multiple VMware Cloud Foundation instances, the NTP settings on Workspace ONE Access must be updated. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-NET-008 | Use the NSX load balancer that is configured by SDDC Manager on a dedicated Tier-1 gateway to load balance connections across the Workspace ONE Access cluster nodes. |
| You must use the load balancer that is configured by SDDC Manager and the integration with vRealize Suite Lifecycle Manager. |
Life Cycle Management Design
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-LCM-001 | Use vRealize Suite Lifecycle Manager to perform the life cycle management of Workspace ONE Access. | vRealize Suite Lifecycle Manager automates the life cycle of Workspace ONE Access. |
|
Information Security and Access Control Design
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-SEC-001 | Configure the Workspace ONE Access instance as the authentication provider for each supported SDDC component. | Enables authentication through Workspace ONE Access identity and access management services for vRealize Suite solutions that require mobility across VMware Cloud Foundation instances. Required for vRealize Automation authentication. | Workspace ONE Access must be online and operational before you can authenticate to vRealize Automation. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-SEC-002 | Create corresponding security groups in your corporate directory services for these Workspace ONE Access roles:
| Streamlines the management of Workspace ONE Access roles to users. |
|
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-SEC-003 | Rotate the appliance root user password on a schedule post deployment. | The password for the root user account expires 60 days after the initial deployment and after subsequent password changes. | You must manage the password rotation schedule for the root user account in accordance with your corporate policies and regulatory standards, as applicable.You must manage the root password rotation schedule on the Workspace ONE Access nodes by using SDDC Manager. |
VCF-VRS-WSA-SEC-004 | Rotate the appliance sshuser user password on a schedule post deployment. | The password for the sshuser appliance user account expires 60 days after the initial deployment and after subsequent password changes. | You must manage the password rotation schedule for the appliance sshuser user account in accordance with your corporate policies and regulatory standards, as applicable.You must manage the sshuser password rotation schedule on the Workspace ONE Access cluster nodes by using vRealize Suite Lifecycle Manager. |
VCF-VRS-WSA-SEC-005 | Rotate the System Admin (admin user of port 8443) application user password on a schedule post deployment. | The password of System Admin (admin user of port 8443) is initially the same as the password of the admin application user but for password rotation the account is managed by vRealize Suite Lifecycle Manager separately. | You must manage the password rotation schedule for the admin application user account in accordance with your corporate policies and regulatory standards, as applicable.You must manage the admin password rotation schedule on the Workspace ONE Access nodes by using SDDC Manager. |
VCF-VRS-WSA-SEC-006 | Rotate the admin application user password on a schedule post deployment. | The password for the default administrator application user account does not expire after the initial deployment. | You must manage the password rotation schedule for the admin application user account in accordance with your corporate policies and regulatory standards, as applicable.You must manage the admin password rotation schedule on the Workspace ONE Access nodes by using SDDC Manager. |
VCF-VRS-WSA-SEC-007 | Rotate the configadmin application user password on a schedule post deployment. | The password for the configuration administrator application user account does not expire after the initial deployment. | You must manage the password rotation schedule for the configuration administrator application user account in accordance with your corporate policies and regulatory standards, as applicable. You must use a combination of Workspace ONE Access and vRealize Suite Lifecycle Manager to manage the password rotation schedule of the configadmin user. |
VCF-VRS-WSA-SEC-008 | Configure a password policy for Workspace ONE Access local directory users, admin and configadmin . | You can set a policy for Workspace ONE Access local directory users that addresses your corporate policies and regulatory standards. The password policy is applicable only to the local directory users and does not impact your organization directory. | You must set the policy in accordance with your organization policies and regulatory standards, as applicable. You must apply the password policy on the Workspace ONE Access cluster nodes. |
Decision ID | Design Decision | Design Justification | Design Implication |
---|---|---|---|
VCF-VRS-WSA-SEC-009 | Use a CA-signed certificate containing the following in the SAN attributes, when deploying Workspace ONE Access.
| Ensures that all communications to the externally facing Workspace ONE Access browser-based UI, API, and between the components are encrypted. |
|
VCF-VRS-WSA-SEC-010 | Use a SHA-2 or higher algorithm when signing certificates. | The SHA-1 algorithm is considered less secure and has been deprecated. | Not all certificate authorities support SHA-2. |