With a specific focus on virtual desktop infrastructure (VDI) initiatives, smart organizations must see applications as the starting point for the overall design. Think about what makes an organization productive. It is reliable access to a specific set of corporate-sanctioned applications. In the end, it’s all about the application. Of course, you will need to design and build a robust virtual infrastructure with all the bells and whistles to support your virtual desktop initiative, but if you do not consider the applications in the design, the entire initiative may fail.
Probable reasons for application incompatibility Installation: Some apps doesnt work on terminal services enviornment.
Concurrent Resource use: When application is used by multiple users simultaneously, changes made by one user can impact the application performance/settings for the other users. Hence, a proper testing is needed before an application is published in citrix.
Privacy Issues: There might be an organizational confidential application which needs more privacy for every individual user who is accessing the application, and in that case we might encounter privacy issues when that application is published.
How to Configure Auto Launch for a Single Published Application on Web Interface 5.x Summary
This article describes how to configure Auto Launch for a single published application on Web Interface 5.x.
Background
By default, Citrix Web Interface 5.x Auto Launch feature only works for a single published desktop (through either XenApp, XenDesktop, or both). By modifying the code, you can allow a single published application to be auto launched when users log on.
Change client changes the current disk drive, COM port, and LPT port mapping settings for a client device.
Syntax change client [/view | /flush | /current] change client [{/default | [/default_drives] | [/default_printers]} [/ascending]] [/noremap] [/persistent] [/force_prt_todef] change client [{/default | [/default_drives] | [/default_printers]} [/ascending]] [/noremap] [/persistent] [/force_prt_todef] change client [/delete host_device] [host_device client_device] [/?]
Parameters host_device
The name of a device on the host server to be mapped to a client device.
The CHANGE command replaces CHGLOGON, CHGUSER, and CHGPORT from Citrix Winframe.
The change utilities are used to change current settings. The change command can invoke any one of the change utilities.
change [logon | port | user] [/?]
/? (help): Displays the syntax for the command and information about the command’s options.
CHANGE LOGON Disables all logons for system maintenance.
Syntax:
change logon [/enable] [/disable] [/query] [/?]
Parameters:
none
/enable
A cipher suite is a named combination of authentication, encryption, and message authentication code (MAC) algorithms used to negotiate the security settings for a network connection using the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) network protocol. The structure and use of the cipher suite concept is defined in the documents that define the protocol (RFC 5246 standard for TLS version 1.2). A reference for named cipher suites is provided in RFC 2434, the TLS Cipher Suite Registry.
Getting Started with Citrix Licensing
Welcome to Citrix Licensing. This section provides details about how to license your Citrix product quickly and easily. It introduces you to the two major components that are part of the Citrix Licensing process: The Citrix License Server for Windows and the License Management Console. It provides you with a simplified overview of the licensing process and details the types of licenses available for Citrix products.
License Manager Daemon (lmgrd.exe)
The License Manager daemon handles the initial contact with the Citrix product, passing the connection to the Citrix vendor daemon. It also starts the Citrix vendor daemon. The License Manager daemon uses TCP/IP port 27000 by default.
Citrix Vendor Daemon (Citrix.exe)
Licenses are granted by the Citrix vendor daemon, a process that runs on the license server. The Citrix vendor daemon tracks the number of licenses that are checked out and which product has them.
To control user access or session environments, configure a Citrix policy. Citrix policies are the most efficient method of controlling connection, security, and bandwidth settings. You can create policies for specific groups of users, devices, or connection types. Each policy can contain multiple settings. For example, you can configure settings to:
Configure farm settings such as Virtual IP, Health Monitoring and Recovery, and multimedia acceleration Control sound quality for client devices Allow users to access the Documents folder on their local client device Allow or prevent remote users from being able to save to their hard drives from a session Allow or prevent users from accessing the Windows clipboard Set a required encryption level for Citrix plug-ins Set the session importance level, which, along with the application importance level, determines resource allotment for Preferential Load Balancing You can work with policies through the Group Policy Editor in Windows or the Delivery Services Console in XenApp.
Citrix most used port list:
License Manager Daemon(lmgrd.exe) 27000 Handles initial point of contact for license request. Citrix Vendor Daemon(Citrix.exe) 7279 Check-in/check-out of Citrix licenses License Management Console 8082 Web-based administration console Citrix Receiver 80/443 Communication with Merchandising Server ICA 1494 Access to applications and virtual desktops Session Reliability 2598 Access to applications and virtual desktops IMA 2512 Communication between Xenapp Servers. Management Console 2513 Citrix Management Consoles Application / Desktop Request 80/8080/443 XML Service STA 80/8080/443 Secure Ticketing Authority (embedded into XML Service) RDP 3389 To access the windows desktop remotely SQL Server Port 1433 Used for Data Store.