Configure access to workspaces | Citrix Workspace
Looking for:
Citrix receiver configurationHow to Manually Install and Configure Citrix Receiver for Pass-Through Authentication
Current Release. About this release. System requirements and compatibility. Install and Uninstall. Get started. Configuring Single sign-on. Domain pass-through access matrix. Secure communications. Storebrowse for Workspace. Citrix Workspace app Desktop Lock. ICA settings reference. Aviso legal. Este texto foi traduzido automaticamente. Este artigo foi traduzido automaticamente.
When using the Citrix Workspace app for Windows, the following configurations allow you to access their hosted applications and desktops. This article discusses the tasks and considerations that are relevant for administrators of Citrix Workspace app for Windows.
If an issue occurs with Citrix Workspace app in production, we can disable an affected feature dynamically in Citrix Workspace app even after the feature is shipped. To do so, we use feature flags and a third-party service called LaunchDarkly. You do not need to make any configurations to enable traffic to LaunchDarkly, except when you have a firewall or proxy blocking outbound traffic. You can use this list to know that your firewall configurations are updated automatically in keeping with the infrastructure updates.
For details about the status of the infrastructure changes, see the LaunchDarkly Status page. Verify if the apps can communicate with the following services if you have split tunneling on the Citrix ADC set to OFF for the following services:. We recommend that you use the Group Policy Object administrative template to configure rules for:. You can use the receiver. For domain policies, import the template file using the Group Policy Management console.
Importing is useful when applying Citrix Workspace app settings to several different user devices throughout the enterprise.
To modify on a single user device, import the template file using the local Group Policy Editor on the device. The installation directory includes CitrixBase.
See the following table for information about Citrix Workspace app template files and their respective locations. Citrix recommends that you use the GPO template files provided with latest version of Citrix Workspace app. You can use.
Add the CitrixBase. With this capability, administrators can easily deploy and manage required agents from a single management console. Citrix Workspace app ensures to automatically update the agents whenever an update is available in the future. App Protection policies filter the access to required functions of the underlying operating system specific API calls required to capture screens or keyboard presses.
App Protection policies provide protection even against custom and purpose-built hacker tools. However, as operating systems evolve, new ways of capturing screens and logging keys might emerge. While we continue to identify and address them, we cannot guarantee full protection in specific configurations and deployments. The feature restricts the ability of clients to compromise with keylogging and screen capturing malware.
App Protection prevents exfiltration of confidential information such as user credentials and sensitive information on the screen. The feature prevents users and attackers from taking screenshots and from using keyloggers to glean and exploit sensitive information.
App Protection requires that you install an add-on license on your License Server. A Citrix Virtual Desktops license must also be present. Two policies provide anti-keylogging and anti-screen-capturing functionality in a session.
These policies must be configured through PowerShell. No GUI is available for the purpose. App Protection component is now installed by default during the Citrix Workspace app installation. The Enable app protection check box that appears during the installation is replaced with Start App Protection after installation.
If you do not enable this check box, App Protection automatically starts upon the first start of a protected resource or component for customers who have entitled to App Protection. You can take a screenshot of the area outside the protected window. Previously, anti-screen capture and anti-keylogging capabilities were enforced by default for Citrix authentication and Citrix Workspace app screens.
However, starting from , these capabilities are disabled by default and need to be configured using the Group Policy Object. The expected behavior depends upon the method by which users access the StoreFront that has the protected resources. Starting from Citrix Workspace app for Windows release, you can view a notification when a possible attempt of screen capture is made on any protected resources.
The notification appears only once per running instance of the screen capture tool. The notification appears again if you relaunch the tool and attempt screen capture.
For more information about the resources assigned, contact your system administrator. Behavior of apps that have the App Protection feature configured on the Controller:. On an App Protection configured-Controller, if you try to launch an application that is protected, the App Protection starts automatically and protects the app. Starting with Version , the App Protection logs are collected as part of Citrix Workspace app logs. For more information about log collection, see Log collection.
You do not need to install or use a third-party app to collect the App Protection logs specifically. However, DebugView can still be continued to be used for log collection. The App Protection logs are registered to the debug output.
To collect these logs, do the following:. From the example above, you can view the logs in log. To uninstall the App Protection component, you must uninstall Citrix Workspace app from your system.
Restart the system for the changes to take effect. Application Categories allow users to manage collections of applications in Citrix Workspace app. You can create application groups for applications shared across different delivery groups or used by a subset of users within delivery groups.
For more information, see Create application groups in the Citrix Virtual Apps and Desktops documentation. This feature provides enhanced security while handling ICA files during a virtual apps and desktops session launch.
Citrix Workspace app lets you store the ICA file in the system memory instead of the local disk when you launch a virtual apps and desktops session. This feature aims to eliminate surface attacks and any malware that might misuse the ICA file when stored locally. This feature is also applicable on virtual apps and desktops sessions that are launched on workspace for Web. When you sign in to the store through the browser, click Detect Workspace App.
You can take extra measures so that sessions are launched only using the ICA file stored on system memory. Use any of the following methods:. Run the PowerShell module. Log collection simplifies the process of collecting logs for Citrix Workspace app. The logs help Citrix to troubleshoot, and, in cases of complicated issues, provides support. HDX adaptive throughput intelligently fine-tunes the peak throughput of the ICA session by adjusting output buffers.
The number of output buffers is initially set at a high value. This high value allows data to be transmitted to the client more quickly and efficiently, especially in high latency networks.
Provides better interactivity, faster file transfers, smoother video playback, higher framerate, and resolution results in an enhanced user experience. Session interactivity is constantly measured to determine whether any data streams within the ICA session are adversely affecting interactivity. If that occurs, the throughput is decreased to reduce the impact of the large data stream on the session and allow interactivity to recover.
HDX adaptive throughput changes the output buffers by moving the mechanism from the client to the VDA. So, adjusting the number of output buffers on the client as described in CTX has no effect.
For more information, see Adaptive transport section in the Citrix Virtual Apps and Desktops documentation. Doing so ensures that users can apply only administrator-specified settings on their systems.
Specifically, you can:. You can hide specific user-configurable settings from the Advanced Preferences sheet by using the Citrix Workspace app Group Policy Object administrative template.
To hide the settings:. You can hide the Reset Workspace option from the Advanced Preferences sheet only using the Registry editor. The policy path for the Citrix Workspace Updates option is different from the other options present in the Advanced Preferences sheet. This feature is in Technical Preview.
StoreFront to Workspace URL migration enables you to seamlessly migrate your end users from a StoreFront store to Workspace store with minimal user interaction. Consider, all your end users have a StoreFront store storefront.
Comments
Post a Comment