Desktop and Application Streaming
Category: End User Computing
Generate logon messages for security and compliance in Amazon WorkSpaces
Customers can require that users be prompted with a security or legal notice upon logon to restricted systems. For example, the notice might indicate that the system is for “official use only,” restricted to access by “authorized personnel,” or highlight that activity may be audited. Microsoft Windows provides a mechanism to generate these message prompts […]
How to use Okta claims with application entitlements for Amazon AppStream 2.0
This blog post shows you how to use Okta claims to configure application entitlements for your Amazon AppStream 2.0 stacks. Customers use Amazon AppStream 2.0 to manage applications centrally, and stream them to their end users. With , you control access to specific applications in the AppStream 2.0 application catalog with SAML assertions. In addition, […]
Use Amazon AppStream 2.0 application entitlements with Azure AD
This blog post shows you how to use application entitlements with Azure Active Directory (Azure AD) for your AppStream 2.0 stacks. Customers use Amazon AppStream 2.0 to manage applications centrally, and stream them to their end users. With application entitlements, you can control access to specific applications in the AppStream 2.0 application catalog based on […]
Automated Alerting on Amazon WorkSpaces Service Limits
Amazon Web Services (AWS) recently announced the addition of Amazon WorkSpaces Service Limits within Service Quotas. This now allows customers to have visibility into what their current limits are for the various types of WorkSpaces in a given AWS Region. Combined with the API operations to query deployed WorkSpaces, customers now have the tools at […]
Your guide to End User Computing at re:Invent 2021
re:Invent 2021 is back in person! After our first virtual re:Invent in 2020 we are excited to be with our customers both in person and virtually. Our End User Computing (EUC) speakers are excited to present live and cover EUC this year’s launches, best practices, and more. Start building out your re:Invent calendar and secure […]
Stream applications at a lower cost with Amazon AppStream 2.0 Elastic fleets and Linux compatibility
You can use Amazon AppStream 2.0 to stream Linux applications at a lower cost than Microsoft Windows apps. AppStream 2.0 is an application and desktop streaming service for securely accessing applications, data, and resources through an HTML5 browser or AppStream 2.0 client. With Elastic fleets, AWS manages the capacity users stream from, eliminating the need […]
OneLogin SSO with Amazon AppStream 2.0
Amazon AppStream 2.0 supports identity federation to AppStream 2.0 stacks through Security Assertion Markup Language 2.0 (SAML 2.0). This feature offers your users the convenience of access to their AppStream 2.0 applications using their existing identity credentials. You also have the security benefit of identity authentication by your IdP. By using your IdP, you can […]
Automate Amazon WorkSpaces custom images across AWS Regions
Customers ask how they can automate copying Amazon WorkSpaces custom images between AWS Regions. Common use cases for synchronizing custom Amazon WorkSpaces images between Regions include: Consistency for multi-Region deployments: Multi-region deployments of Amazon WorkSpaces allow WorkSpaces to be deployed for user who need low-latency connection to a specific geographic area. One custom image with […]
Set up multi-factor authentication with OneLogin for Amazon WorkSpaces
In this blog, I walk you through configuring Amazon WorkSpaces multi-factor authentication (MFA) with OneLogin. Solution overview The steps to work through this blog are: Configure OneLogin RADIUS for use with Amazon WorkSpaces. Configure Active Directory Connector for MFA. Test logon. Prerequisites: This post assumes you have the following. A OneLogin account. OneLogin Active Directory […]
Create a Single Identity Provider for all your Amazon AppStream 2.0 Stacks with Azure AD
Customers use Amazon AppStream 2.0 to centrally manage applications and stream them to their end users. Organizations have multiple stacks associated with different fleets to separate workloads based on underlying resources, applications, or different user permissions. Administrators want a way to manage permissions for multiple stacks without having to create an IAM identity provider for […]