Help Center > > User Guide (Administrators)> Getting Started> Applying for the Workspace Service

Applying for the Workspace Service

Updated at: Aug 01, 2019 17:56


Apply for the Workspace service. After you apply for Workspace, a secure and exclusive Workspace infrastructure will be deployed and a dedicated elastic IP address used for accessing Workspace will be allocated to you. The AD is a necessary component used for managing users and desktops. You can create an AD on the cloud or use an existing AD. After you apply for the Workspace service, you can purchase Workspace desktops.


When applying for Workspace, if the existing enterprise AD domain is used, refer to Interconnect Workspace with Microsoft AD to enable related ports on the AD server and prepare the following data:

  • Domain name
  • Domain administrator's account and password
  • Active domain controller IP address
  • (Optional) Standby domain controller IP address
  • Active DNS server IP address
  • (Optional) Standby DNS server IP address


  1. Log in to the Workspace management console.
  2. On the Dashboard page, click Click here to complete real-name authentication and complete real-name authentication as prompted.
  3. On the Dashboard page, click Apply for Workspace.

    The Apply for Workspace page is displayed.

  4. Select an AZ based on actual conditions.


    An AZ is a physical region where resources use independent power supplies and networks. AZs are physically isolated but interconnected through an internal network, improving HA of applications.

  5. Click View VPC to create a VPC and a subnet.

    For details about how to create a VPC, see the Virtual Private Cloud User Guide.


    You are advised to use 16-bit subnet gateways during VPC creation. After you apply for the Workspace service, do not modify the VPC configuration.

  6. Click to refresh the drop-down list.
  7. Configure the VPC.

    Select the VPC and Service Subnet created in 5 and enter Management Subnet.

    • You can select multiple subnets to support more desktops.
    • Use the subnet that is created in 5 and dedicated to Workspace. Do not use the subnet dedicated to other services.
    • The service subnet is used by desktops to access applications and resources on ECSs or enterprises internets.
    • The management subnet is used for internal communication among desktops.

  8. Configure the AD domain.

    Check whether your enterprise has an AD domain.

    • If yes, go to 10.
    • If no, go to 9.

  9. Create an AD domain.

    Set the Domain Name, Domain Administrator Account, Domain Administrator Password, and Confirm Password parameters of the new AD domain.

    After an AD domain is created, go to 11.


    To ensure system security, you need to change the password periodically. You are advised to change the password every three months.

  10. Connect to the existing domain.

    Set the Domain, Domain Administrator Account, Domain Administrator Password, Primary domain controller IP address, Backup domain controller IP address (optional), Active DNS IP address, and Standby DNS IP address (optional) parameters of the existing domain.


    When you use an existing AD domain, ensure that the related ports of the firewall are enabled. For details, see Interconnect Workspace with Microsoft AD.

  11. Specify the network access mode. By default, Internet access is selected. You can select multiple options.

    If the network quality does not meet requirements, you can select DirectConnect access. For details about the network quality requirements, see What Are the Network Requirements for Accessing the Desktop?.


    The DirectConnect access mode provides the load balancing capability. Therefore, enterprises do not need to deploy third-party load balancers before access addresses.

  12. Read the Huawei Workspace Service Agreement.
  13. Select I have read and agree to the Huawei Workspace Service Agreement.
  14. Click Apply Now. The Workspace service application is complete.

    • The application process takes about 40 minutes.
    • The system creates WorkspaceManagerSecurityGroup and WorkspaceUserSecurityGroup security groups in the VPC during the application. WorkspaceManagerSecurityGroup is used for management components, and WorkspaceUserSecurityGroup is used for user desktops. By default, only virtual desktops in the WorkspaceUserSecurityGroup security group can access each other. If you want to access a virtual desktop in the security group from an external desktop, choose VPC > Security Groups to modify the configurations.

Did you find this page helpful?

Submit successfully!

Thank you for your feedback. Your feedback helps make our documentation better.

Failed to submit the feedback. Please try again later.

Which of the following issues have you encountered?

Please complete at least one feedback item.

Content most length 200 character

Content is empty.

OK Cancel