Skip to content
Menu
Know Citrix
  • About me
  • Miscellaneous
    • SSL certificates
Know Citrix

Category: Architecture – XA and XD

Sample Citrix GSLB site

Posted on May 6, 2021May 27, 2022

Let’s look at steps on configuring a Citrix high available site for applications. These are high level steps only. Not a step by step article. Based on your user count and how critical is the application, create 4 DDCs. Two in North India Datacenter, and two in south India datacenter (or you can create 1…

Read More

Tools I came across

Posted on September 14, 2018October 2, 2018

Tools that I came across in my day to day troubleshooting: Autoruns – shows you what programs are configured to run during system bootup or login, and when you start various built-in Windows applications like Internet Explorer, Explorer and media players. CDFControl – CDFControl utility is an event tracing controller or consumer for capturing CDF trace messages…

Read More

Authentication methods

Posted on August 18, 2018August 18, 2018

AAA Authentication methods: Netscaler supports 7 methods of authentication. Local: user account should be created locally on the netscaler. Authentication takes place without contacting external authentication server. LDAP: LDAP often uses Microsoft AD to validate users. It has 3 authentication types: Plaintext, SSL and TLS. Plaintext uses 389 for communication. Sends credentials in plain text….

Read More

AAA Policies

Posted on August 17, 2018August 17, 2018

Authentication Virtual Server: AAA TM(traffic management) virtual server acts as an authentication portal for content switching and load balancing virtual servers prompting users through form based or 401 login page before they can access their resources. AAA Process: User is redirected to form based or 401 login page using SSL. It then gathers user’s creds…

Read More

Configure LDAP authentication on netscaler

Posted on August 15, 2018August 15, 2018

some or all steps are required to add external authentication on netscaler 12 and above: Create LDAP Server (authentication server). Create LDAP policy. Bind the LDAP policy globally. Add AD groups to netscaler to restrict access to management access. Optional Restrict normal users to netscaler gateway. Optional Create LDAP Server (authentication server):  To create LDAP…

Read More

XenApp/XenDesktop 7.X Services list

Posted on July 26, 2018November 26, 2019

XenDesktop 7.x Controller Services There are overall 11 core FMA services in every citrix site. Service Name Executable Logon Account / Startup Type Description Dependencies Citrix AD Identity Service Citrix.ADIdentity.exe NT AUTHORITY\NetworkService Automatic Manages Active Directory Computer Accounts for machines within the xenapp/xendesktop deployment. Workstation Citrix Analytics Citrix.Analytics.exe NT AUTHORITY\NetworkService Automatic Collects analytical data regarding…

Read More

Double Hop

Posted on July 24, 2018July 24, 2018

HDX Double-Hop: This is formerly known as ICA Pass-Through. User logs into first storefront store on end point device receiver and initiates connection to desktop or server virtual delivery agent. This Citrix desktop or server virtual delivery agent has receiver installed in it and has second storefront details. When user launches an application from Citrix…

Read More

Session Reliability

Posted on July 24, 2018February 20, 2019

Session reliability is a XenApp and XenDesktop feature designed to keep sessions active when there is a network interruptions. This is for users who work from unreliable network like a mobile device, with no wifi. User on wireless device who enters a tunnel may lose connectivity, under normal scenario, session would disconnect and user has…

Read More

Seamless Applications

Posted on July 24, 2018July 24, 2018

Seamless mode: Applications delivered by XenApp and XenDesktop without a desktop are referred as seamless applications. Seamless mode allows remote applications to appear as though they are installed locally i.e., applications appear integrated with local operating system. Seamless applications gives look and feel like applications are installed locally. Without seamless applications, all applications are shown…

Read More

Application and Desktop Launch process

Posted on July 23, 2018March 18, 2022

Accessing resources can be broken down to 4 steps: Authentication Enumeration Resource launch Session initialization. Authentication: Check out below links for authentication while user is on netscaler, storefront or web interface. Authentication at Storefront, web interface or storefront delegation: http://knowcitrix.com/logon-process/ Authentication at netscaler: http://knowcitrix.com/xendesktop-7-x-app-vda-login-process/ Internal component communication: http://knowcitrix.com/component-communications/ Enumeration: Assuming user is already authenticated, storefront sends request over…

Read More
  • 1
  • 2
  • 3
  • Next

Categories

  • About Home Lab (2)
  • Ansible (1)
  • Architecture – XA and XD (21)
    • Netscaler Architecture (9)
  • AWS (2)
  • Azure (10)
    • Azure Definitions (7)
  • Best Practices (14)
  • Citrix Cloud (6)
    • Workspace Environment Management WEM (1)
  • Citrix Managed Desktops (1)
  • citrix ports (1)
  • Citrix Provisioning (18)
  • Citrix Provisioning Issues (4)
  • Citrix Tools and Scripts (15)
  • Definitions (9)
  • Downloads (1)
  • General Citrix Information (29)
  • Get Started (19)
  • IMP Posts (15)
  • Legacy Citrix Software (1)
  • My TroubleShooting (62)
  • NetScaler (57)
    • GSLB (2)
  • Other Citrix softwares (1)
  • PowerShell (2)
  • Prerequisites (6)
  • Scripts/Automation (7)
  • Tech Articles (13)
  • Terminology (4)
  • Version Differences (5)
  • Why Prerequisites (1)
  • XenApp 5 (38)
  • XenApp 6 (22)
  • XenApp 6.5 (32)
  • XenApp and XenDesktop 7.X (88)
  • XenApp Installation Scripts (3)
  • XenApp Migration (5)
  • XenApp5 Issues (1)
  • XenDesktop 5.X (27)
  • XenDesktop 7.X Issues and troubleshooting (10)
  • XenMobile (1)
  • XenServer 6 (57)

RSS Updates from Citrix Blogs

  • Overcoming observed challenges when adopting a zero trust architecture January 25, 2023
    Zero trust has become a crucial component in the cybersecurity strategy of organizations everywhere. More and more enterprises are finding themselves turning toward zero trust architecture to keep their data, infrastructure, and other assets safe. As a result, this concept … The post Overcoming observed challenges when adopting a zero trust architecture first appeared on […]
    James Schulman
  • Citrix Endpoint Management now supports IdP enrollment for MAM January 20, 2023
    At the start of every year, many people make resolutions to help them reach personal and professional goals. This year, the Citrix Endpoint Management team is focusing on enhancing our agility and regularly providing new features for our customers. We … The post Citrix Endpoint Management now supports IdP enrollment for MAM first appeared on […]
    Chetan Thakker
©2023 Know Citrix | Powered by WordPress and Superb Themes!