Desktop and Application Streaming
Category: End User Computing
Reimagining End User Computing
We recently completed re:Invent 2020 and the End User Computing team presented six different sessions designed to help you understand why and how to get started and scale deployments of Amazon WorkSpaces and Amazon AppStream 2.0. I presented a session called “Reimagine your workforce with AWS End User Computing Services” where we shared some of […]
Adding SAML authentication to an Amazon AppStream 2.0 SaaS Portal
The Amazon AppStream 2.0 team released a workshop aimed at helping independent software vendors (ISV) move their Windows applications to a software as a service (SaaS) model. Some ISVs have reported that their customers would like to use their own identity provider with the SaaS to provide easier access to a large user base. This […]
Your guide to End User Computing at re:Invent 2020
re:Invent 2020 will be looking a little different this year, and has gone fully virtual! Our End User Computing (EUC) speakers are excited to present in this new format and share EUC launches, best practices, and more. Registration for re:Invent this year is free and you can explore the session catalogue for our sessions and […]
Enabling Identity Federation with Shibboleth and Amazon AppStream 2.0
Shibboleth is an open-source project that provides single sign-on capabilities and identity federation solution used by research and education communities worldwide. If you are already using Shibboleth IdP, this post shows you how to configure it for Security Assertion Markup Language 2.0 (SAML 2.0) identity federation with Amazon AppStream 2.0. Overview The AppStream 2.0 SAML […]
Analyze access patterns in Amazon WorkSpaces
Customers regularly ask how to analyze access patterns in Amazon WorkSpaces. Administrators seek to understand how users are accessing Amazon WorkSpaces so they can provide an outstanding overall experience. For example, granular information about access patterns helps plan maintenance windows, forecast network capacity requirements, and set priorities of WorkSpaces client updates. Centrally collecting WorkSpaces events […]
Manage Amazon WorkSpaces lifecycle automatically with users in Active Directory
Customers use Amazon WorkSpaces to launch highly performant, scalable, and cost effective managed virtual desktops in the cloud. Amazon WorkSpaces reduces the operational overhead of having to manage traditional VDI infrastructure and complex licensing agreements. You can further reduce this operational overhead using automation. There are Amazon WorkSpaces API operations that you can use to […]
Solving common Amazon WorkSpaces connection issues to on-premises setups
Frequently we get questions about establishing a connection to on-premises Active Directory through an AD Connector for Amazon WorkSpaces setup on Amazon Web Services (AWS). In this post, we look at the most common issues customers have with on premises connection setup in addition to what should be kept in mind when trying to resolve […]
Amazon AppStream 2.0 and Amazon WorkSpaces announcements and launches – August
Our team has been hard at work and we have launched new technical documents, webinars, and more. This blog post focuses on our recent documentation, webinars, and resources that we think you can get the most out of: Documentation Best Practices for Deploying Amazon WorkSpaces This whitepaper outlines a set of best practices for the […]
Application Online Trial Expiration Control with Amazon AppStream 2.0
Many customers use Amazon AppStream 2.0 to provide online trials of their desktop applications. Our ISV Workshop Series shows you how to make your applications available through your website, delivered by AppStream 2.0. However, some customers need that access to be for a limited time. Based on their requirements, there will be different expiration periods […]
Network Separation and Data Sanitization using Amazon WorkSpaces, Amazon AppStream 2.0, and Amazon Macie
Data security and privacy are the top priorities of most organizations. Most of the data leakage happens not at the data center, but outside it. Most common reasons of data theft are unpatched desktops, malware attacks, and accidental data sharing. Network separation is a common way to secure desktop environments. Most organizations achieve this by […]