- Products
- Amazon WorkSpaces
Getting Started with Amazon WorkSpaces
Typical Using Scenarios
From server-based computing (SBC) to virtual desktop infrastructure (VDI), then to Desktop as a Service like WorkSpaces. The core value of remote desktop is concentrated on three key value points. The most critical one is the "No data landing" feature provided by the remote desktop protocol. By using a remote desktop protocol like PCoIP or WSP, the end user can access enterprise data through a streaming window but cannot download it. The second key value is "Centralized manageability." Some large enterprises have transformed their traditional Desktop PC to thin clients/ zero clients with backend virtual desktops. This infrastructure simplified the IT support mechanism and proved can reduce support budget and improve efficiency. The third point is the "Flexibility" leveraged from the cloud infrastructure. Customer can timely change the desktop resources investment in the cloud to reflect business need and dynamic working environment. Based on the three key value points, Desktop as A Service (WorkSpaces) has widely used in several typical using scenarios and rapidly growing in data security sensitive segments. We will further introduce that in the coming part.
Working from Home
Secure R&D Environment
Call Center
Secure Office
Remote Branch Office
Planning For Deployment
Access Design
To get a better streaming experience on WorkSpaces, we need to use RTT tool to pickup the lowest latency WorkSpaces service region. Then we also need decide the access equipment type and login method and be well prepared on the network infrastructure.
Secure and Quarantine
Once the whole access design has been finished, we need well design network aggregation layer which is VPC part. We need decide the VPC ACL, secure group policy and network firewall detail config.
Active Directory - AD Design
As the core policy and user authorization center, the AD is key to user rights allocation in the WorkSpaces architecture. Enterprise users need to choose whether to directly use managed AD or connect their on-premises AD through AD connector. Either use AD trust relationship methodology to sync AD policy.
Access Equipment & Redirection Design
In the process of desktop cloud migration, the selection of access equipment is a key factor. Among them, Thinclient and Zero clients’ embedded OS like Linux Embedded or Windows IoT should be well addressed on potential redirection issues especially for some vertical peripherals. In addition, the desktop cloud resources redirection to access equipment, for example clip board or disk drive redirection should be carefully designed to follow the company data security rules.
Dashboard and service automation
Besides the WorkSpaces console capability. Customer also can use the cost optimize package to save using cost. IT team can also leverage WorkSpaces API to integrate WorkSpaces into enterprise management system. End users will be benefitted by remote assistant and new client log collection features to improve the trouble shooting efficiency.
BYOL and customized images
In most cases, Customer already have desktop OS license and self-build images. WorkSpaces service support BYOL license usage and self-build image upload to bring in a more customized desktop environment to customers.
Access Design
Open all-
The network latency tests the WorkSpace RTT (round-trip delay) from the access equipment (employee PC) to each region of WorkSpaces. The primary purpose of this round-trip test is to verify if the WorkSpaces using experience is quick enough to serve the end user input and output. This indicator is the key to choosing the best experience region. If the delay is slight, the operation will be smoother, and the user will not perceive it. On the other hand, the screen may become stuck if the delay is significant, and the employees will feel obvious. The recommendations are as follows:
- RTT<100ms Fast
- RTT<200ms Acceptable
- RTT<375ms Slow
- RTT>375ms N/A
https://clients.amazonworkspaces.com/Health.html (Global) PCoIP: For the best performance of PCoIP, the round-trip time (RTT) from the client network to the region WorkSpaces are located should be less than 100 milliseconds. If the RTT is between 100ms and 200ms, users can access the WorkSpace, but performance will be affected. If the RTT is between 200ms and 375ms, the performance will degrade. Therefore, workSpaces client connections are terminated if the RTT exceeds 375ms. For the best implementation of the WorkSpaces Streaming Protocol (WSP), the RTT should be less than 250ms. If the RTT is between 250ms and 400ms, the user can access the WorkSpace, but performance will be reduced. According to the above standards, if the RTT exceeds 200ms, there will be apparent freezes during use. Therefore, selecting a data center with a network latency of less than 100ms as the access point is recommended, which will have the best experience
-
The WorkSpaces console has two functions: IP Access Control and Access Control. Customers can use these two functions to control the access equipment IP address and the Operating system (OS) of the access equipment. At the same time, you can also enable the TLS/FIPS encryption to build a more secure login path. Note 1: The remote desktop protocol only transmits the refreshed pixels of the screen and does not transmit any data on the net. Note 2: WorkSpaces access also supports enabling TLS and FIPS 140-2 encryption methods to encrypt the data of the Login link and improve link security. Customers can turn on this function in the console.
- Direct Connect+Public VIF. Amazon S3, Glacier, WorkSpaces, and other services all support public VIF access so that we can establish a private channel between the enterprise office and the Amazon Web Services through the Direct Connect dedicated link. And use the public VIF as the endpoint to allow access to equipment log-in from the enterprise office site.
- If there is no Direct Connect dedicated link, a third-party IPSec tunnel can be used as an alternative. Note: Amazon Web Services China (Ningxia) Region, Operated operated by NWCD does not support Site-to-Site VPN or Client VPN. If you want to use the VPN method, you can refer to using IPSEC to establish a tunnel.
Some large enterprises, especially those that have adopted a centralized office model. To ensure that the access link is not exposed on the Internet (here refers to the link that the user's employees log in to the WorkSpaces through the WorkSpaces client), Customers can use a completely private connection such as Direct Connect or a site-to-site VPN to linkage the office and Amazon Web Services datacenter.
-
As a cloud desktop, access to WorkSpaces mainly includes the following three aspects.
- WorkSpace access to the Internet: WorkSpaces use the internet gateway (IGW) for external access by default. At the same time, you can also create a new NAT gateway to initiate external access. This method is suitable for accessing some specific third-party application platforms on the Internet-based application or data.
- WorkSpaces access to on-premise enterprise data: This link is mainly used for WorkSpaces to access local services such as applications, data, or domain control hosted in the enterprise's local data center. In addition, this link can be used as a secure access link to ensure that critical enterprise data is not exposed on the Internet.
- Data access from WorkSpaces to the enterprise system hosted in the Amazon Web Services: VPC peering and VPC routing are used to access the enterprise data hosted in the Amazon Web Services. Note: WorkSpaces have two ENI NICs. NIC 1 is used for front-end access and external access. After that, it was production traffic NICs. The three data links mentioned above are based on the production traffic NIC 1. The second network card 2 is not exposed and is only used for the built-in process for WorkSpaces management, such as image creation and distribution, application distribution, etc.
Secure and Quarantine
Open all- Network ACL can isolate and block the IP level.
- Security Group security policy group design can isolate and block the ip+port level. As a result, access isolation of network applications can be performed on a per-end basis.
- Network Firewall can perform domain allow listing, blocklist isolation, and blocking at the link level. For example, an enterprise needs to write a specific black and white list domain name to control the Internet access part of WorkSpaces.
A standardized VPC architecture is used at the bottom layer of WorkSpaces in the cloud, so enterprises can also use the VPC built-in multi-layer network layer and application layer security methodology for data isolation and layering.
Through the template policy that comes with the console above and the security policy design at the three levels of Network ACL+Security Group+Network Firewall, it is possible to connect WorkSpaces, and the Internet, WorkSpaces, and the enterprise's server VPC and subordinate servers on the Amazon Web Services managed cloud according to the needs of the enterprise. Appropriate security isolation and blocking between networks, WorkSpaces, and the enterprise's local data network can be implemented to achieve complete data security policy planning.
Active Directory - AD Design
Open all-
Using Amazon Managed AD is our primary recommended method. Customers can enable Managed AD directly on the Amazon Web Services and directly use the Managed AD to create and manage WorkSpaces users. The domain controller is created using the WorkSpaces policy template, and the security policy template has been preset in it, which can implement policy control for WorkSpaces. The policies here include whether to allow logged-in users to modify WorkSpaces configuration and install software, whether to allow WorkSpaces, logged-in users, to access the Internet, whether to allow access to local USB read-write devices and so on.
-
For many middle and large-size enterprises, AD domain control is already being used for user and device policy management. WorkSpaces can also connect to the user's domain controller in the local data center through the ADC (AD Connector) domain controller connector. After China Unicom is connected, the ADC will synchronize all domain policies from the local AD domain controller of the enterprise, automatically use the enterprise users connected to the domain controller, and apply the device management policy to the WorkSpace instance. Using ADC is an excellent way to integrate with the company's existing IT structure and can fully comply with the company's existing management strategy template.
-
Another way is to use Amazon Managed AD and establish a trust domain relationship between the Amazon Managed AD and the enterprise's on-premises AD. After the trust relationship is established, the Amazon Managed AD and the enterprise local AD can establish the domain policy parent-child trust and tree root trust synchronization relationship according to the same forest, two-way trust, or transit trust relationship. This method is more suitable for the complex domain structure of some vast enterprises and builds a more complex domain control relationship.
Access Equipment & Redirection Design
Open allIn terms of terminal selection, Amazon WorkSpaces supports various clients, such as windows/Linux/mac/android/iPad/PCoIP zero/web. It has provided an extensive range of terminal device support. Here we mainly give some in-depth introduction to Thinclient (because Thinclient has existed for many years as a VDI access device). The operating systems of Thinclient are mainly Windows embedded and Linux embedded. Each Thinclient manufacturer tailors the operating system, mainly installing VDI or WorkSpaces connection clients. Although these embedded systems do not use applications as the accessing client of VDI or WorkSpaces, there is an important problem of redirection of peripherals. The main problem is that Windows Embedded is much more robust than Linux Embedded in the peripheral redirection. To better access different peripherals, it is recommended to use Windows Embedded as the Thinclient system.
For future access devices, ARM CPU-based notebooks. Its main functions are always-on and long-term use (can be used continuously for 24 hours) brought by low power consumption. A suitable Mobile Thinclient device type also considers some flexibility to use applications locally. After installing the WorkSpaces client, it can be used as a perfect WorkSpaces native access device.
Overall redirection design. When planning the overall redirection design of WorkSpaces, enterprises need to match the technical solutions provided by Amazon according to their own specific needs for "data not landing." For example, an enterprise user needs to avoid the redirection of USB storage devices to prevent data copying and avoid printer outputting drawings. These specific requirements can be controlled by switches in the overall redirection design. More redirection policy control is currently available on the Windows 10 operating system, and there are fewer control options on Linux. In terms of access protocol, PCoIP now has more redirection control policies and fewer WSP protocol control policies. See the table below for details.
For future access devices, ARM CPU-based notebooks. Its main functions are always-on and long-term use (can be used continuously for 24 hours) brought by low power consumption. A suitable Mobile Thinclient device type also considers some flexibility to use applications locally. After installing the WorkSpaces client, it can be used as a perfect WorkSpaces native access device.
Overall redirection design. When planning the overall redirection design of WorkSpaces, enterprises need to match the technical solutions provided by Amazon according to their own specific needs for "data not landing." For example, an enterprise user needs to avoid the redirection of USB storage devices to prevent data copying and avoid printer outputting drawings. These specific requirements can be controlled by switches in the overall redirection design. More redirection policy control is currently available on the Windows 10 operating system, and there are fewer control options on Linux. In terms of access protocol, PCoIP now has more redirection control policies and fewer WSP protocol control policies. See the table below for details.
| PCoIP Group Policy | WSP Group Policy | ||
| Enable/Disable Remote Printer | Support | Enable/Disable Remote Printer | Support |
| Enable/Disable local printer | Base on test result | Enable/Disable local printer | Base on test result |
| Enable/Disable Clipboard | Support | Enable/Disable Clipboard | Support |
| Enable/Disable USB Storage | Base on test result | Enable/Disable USB Storage | Base on test result |
| Config Session Timeout | Support | Config Session Timeout | Support |
| Enable/Disable Video | Support | ||
| Enable/Disable Audio | Support | Enable/Disable Audio | Support |
| Disable TimeZone | Support | Disable TimeZone | Support |
| Config PCoIP Security | Support | ||
| YubiKey U2F USB | Support | Enable/Disable Smart Card | Support |
| Enable/Disable Session Lock Screen | Support |
| Config PCoIP | |
| Enable/Disable local printer | Not Support |
| Enable/Disable Clipboard | Support |
| Enable/Disable Audio | Support |
| Disable TimeZone | Support |
| Enable/Disable SSH login | Support |
Dashboard and service automation
Open all-
Large enterprises can use the WorkSpaces API to integrate WorkSpaces management capability into their internal management platform. For example, when enterprises need to activate employee accounts automatically, automatically activate WorkSpaces, then assign application authorities, or they need automatically back up employee data and release resources after employees leave. Because Amazon Web Services provides modular services, customers can rely on WorkSpaces API calls to integrate that into a streamlined process within their platform. Please refers to the API reference documentation .
-
Besides central management capability in WorkSpaces Console. Customer also can enable remote assistant capability to diagnose single WorkSpaces issues or help employee solve complex personal WorkSpaces problem. It can be installed via a solution package as below. Please refers to the Blog .
BYOL and customized images
Open all-
Large and middle-sized enterprises may need to bring their own Windows desktop licenses (BYOL) to implement in WorkSpaces. For BYOL permission applications, please get in touch with your Amazon Web Services account manager or sales representative, or contact Amazon Web Services Support Center. The re-customized release process is relatively complicated, and it is recommended to follow the BYOL manual strictly.