- Products›
- Amazon WorkSpaces
Getting Started with Amazon WorkSpaces
Typical Using Scenarios
From server-based computing (SBC) to virtual desktop infrastructure (VDI), then to Desktop as a Service like WorkSpaces. The core value of remote desktop is concentrated on three key value points. The most critical one is the "No data landing" feature provided by the remote desktop protocol. By using a remote desktop protocol like PCoIP or WSP, the end user can access enterprise data through a streaming window but cannot download it. The second key value is "Centralized manageability." Some large enterprises have transformed their traditional Desktop PC to thin clients/ zero clients with backend virtual desktops. This infrastructure simplified the IT support mechanism and proved can reduce support budget and improve efficiency. The third point is the "Flexibility" leveraged from the cloud infrastructure. Customer can timely change the desktop resources investment in the cloud to reflect business need and dynamic working environment. Based on the three key value points, Desktop as A Service (WorkSpaces) has widely used in several typical using scenarios and rapidly growing in data security sensitive segments. We will further introduce that in the coming part.
Working from Home
Secure R&D Environment
Call Center
Secure Office
Remote Branch Office
Planning For Deployment
Access Design
To get a better streaming experience on WorkSpaces, we need to use RTT tool to pickup the lowest latency WorkSpaces service region. Then we also need decide the access equipment type and login method and be well prepared on the network infrastructure.
Secure and Quarantine
Once the whole access design has been finished, we need well design network aggregation layer which is VPC part. We need decide the VPC ACL, secure group policy and network firewall detail config.
Active Directory - AD Design
As the core policy and user authorization center, the AD is key to user rights allocation in the WorkSpaces architecture. Enterprise users need to choose whether to directly use managed AD or connect their on-premises AD through AD connector. Either use AD trust relationship methodology to sync AD policy.
Access Equipment & Redirection Design
In the process of desktop cloud migration, the selection of access equipment is a key factor. Among them, Thinclient and Zero clients’ embedded OS like Linux Embedded or Windows IoT should be well addressed on potential redirection issues especially for some vertical peripherals. In addition, the desktop cloud resources redirection to access equipment, for example clip board or disk drive redirection should be carefully designed to follow the company data security rules.
Dashboard and service automation
Besides the WorkSpaces console capability. Customer also can use the cost optimize package to save using cost. IT team can also leverage WorkSpaces API to integrate WorkSpaces into enterprise management system. End users will be benefitted by remote assistant and new client log collection features to improve the trouble shooting efficiency.
BYOL and customized images
In most cases, Customer already have desktop OS license and self-build images. WorkSpaces service support BYOL license usage and self-build image upload to bring in a more customized desktop environment to customers.
Access Design
Open allhttps://clients.amazonworkspaces.com/Health.html (Global) PCoIP: For the best performance of PCoIP, the round-trip time (RTT) from the client network to the region WorkSpaces are located should be less than 100 milliseconds. If the RTT is between 100ms and 200ms, users can access the WorkSpace, but performance will be affected. If the RTT is between 200ms and 375ms, the performance will degrade. Therefore, workSpaces client connections are terminated if the RTT exceeds 375ms. For the best implementation of the WorkSpaces Streaming Protocol (WSP), the RTT should be less than 250ms. If the RTT is between 250ms and 400ms, the user can access the WorkSpace, but performance will be reduced. According to the above standards, if the RTT exceeds 200ms, there will be apparent freezes during use. Therefore, selecting a data center with a network latency of less than 100ms as the access point is recommended, which will have the best experience
Some large enterprises, especially those that have adopted a centralized office model. To ensure that the access link is not exposed on the Internet (here refers to the link that the user's employees log in to the WorkSpaces through the WorkSpaces client), Customers can use a completely private connection such as Direct Connect or a site-to-site VPN to linkage the office and Amazon Web Services datacenter.
Secure and Quarantine
Open allA standardized VPC architecture is used at the bottom layer of WorkSpaces in the cloud, so enterprises can also use the VPC built-in multi-layer network layer and application layer security methodology for data isolation and layering.
- Network ACL can isolate and block the IP level.
- Security Group security policy group design can isolate and block the ip+port level. As a result, access isolation of network applications can be performed on a per-end basis.
- Network Firewall can perform domain allow listing, blocklist isolation, and blocking at the link level. For example, an enterprise needs to write a specific black and white list domain name to control the Internet access part of WorkSpaces.
Through the template policy that comes with the console above and the security policy design at the three levels of Network ACL+Security Group+Network Firewall, it is possible to connect WorkSpaces, and the Internet, WorkSpaces, and the enterprise's server VPC and subordinate servers on the Amazon Web Services managed cloud according to the needs of the enterprise. Appropriate security isolation and blocking between networks, WorkSpaces, and the enterprise's local data network can be implemented to achieve complete data security policy planning.
Active Directory - AD Design
Open allAccess Equipment & Redirection Design
Open all In terms of terminal selection, Amazon WorkSpaces supports various clients, such as windows/Linux/mac/android/iPad/PCoIP zero/web. It has provided an extensive range of terminal device support. Here we mainly give some in-depth introduction to Thinclient (because Thinclient has existed for many years as a VDI access device). The operating systems of Thinclient are mainly Windows embedded and Linux embedded. Each Thinclient manufacturer tailors the operating system, mainly installing VDI or WorkSpaces connection clients. Although these embedded systems do not use applications as the accessing client of VDI or WorkSpaces, there is an important problem of redirection of peripherals. The main problem is that Windows Embedded is much more robust than Linux Embedded in the peripheral redirection. To better access different peripherals, it is recommended to use Windows Embedded as the Thinclient system.
For future access devices, ARM CPU-based notebooks. Its main functions are always-on and long-term use (can be used continuously for 24 hours) brought by low power consumption. A suitable Mobile Thinclient device type also considers some flexibility to use applications locally. After installing the WorkSpaces client, it can be used as a perfect WorkSpaces native access device.
Overall redirection design. When planning the overall redirection design of WorkSpaces, enterprises need to match the technical solutions provided by Amazon according to their own specific needs for "data not landing." For example, an enterprise user needs to avoid the redirection of USB storage devices to prevent data copying and avoid printer outputting drawings. These specific requirements can be controlled by switches in the overall redirection design. More redirection policy control is currently available on the Windows 10 operating system, and there are fewer control options on Linux. In terms of access protocol, PCoIP now has more redirection control policies and fewer WSP protocol control policies. See the table below for details.
For future access devices, ARM CPU-based notebooks. Its main functions are always-on and long-term use (can be used continuously for 24 hours) brought by low power consumption. A suitable Mobile Thinclient device type also considers some flexibility to use applications locally. After installing the WorkSpaces client, it can be used as a perfect WorkSpaces native access device.
Overall redirection design. When planning the overall redirection design of WorkSpaces, enterprises need to match the technical solutions provided by Amazon according to their own specific needs for "data not landing." For example, an enterprise user needs to avoid the redirection of USB storage devices to prevent data copying and avoid printer outputting drawings. These specific requirements can be controlled by switches in the overall redirection design. More redirection policy control is currently available on the Windows 10 operating system, and there are fewer control options on Linux. In terms of access protocol, PCoIP now has more redirection control policies and fewer WSP protocol control policies. See the table below for details.
| PCoIP Group Policy | WSP Group Policy | ||
| Enable/Disable Remote Printer | Support | Enable/Disable Remote Printer | Support |
| Enable/Disable local printer | Base on test result | Enable/Disable local printer | Base on test result |
| Enable/Disable Clipboard | Support | Enable/Disable Clipboard | Support |
| Enable/Disable USB Storage | Base on test result | Enable/Disable USB Storage | Base on test result |
| Config Session Timeout | Support | Config Session Timeout | Support |
| Enable/Disable Video | Support | ||
| Enable/Disable Audio | Support | Enable/Disable Audio | Support |
| Disable TimeZone | Support | Disable TimeZone | Support |
| Config PCoIP Security | Support | ||
| YubiKey U2F USB | Support | Enable/Disable Smart Card | Support |
| Enable/Disable Session Lock Screen | Support |
| Config PCoIP | |
| Enable/Disable local printer | Not Support |
| Enable/Disable Clipboard | Support |
| Enable/Disable Audio | Support |
| Disable TimeZone | Support |
| Enable/Disable SSH login | Support |