Jump to content
Updated Privacy Statement

James Kindon

Moderators
  • Posts

    1,342
  • Joined

  • Last visited

  • Days Won

    66

Posts posted by James Kindon

  1. That would imply (I would think) that you have an underlying issue if that evaluation cannot apply - In all my years of doing Citrix work, I have never touched that setting, and would be dubious on doing so given that typically policy is there to lockdown/secure/control and environment, and if it cannot be guaranteed/evaluated to say "all is ok" then I wouldn't want people in those sessions

  2. SetUserFTA can be used but you will need to pay

    WEM can also do the job

    But to your point, this should be working fine with the tools Microsoft give you - is it just one application failing to apply or are no extensions being honored?

    It might be worth applying to the local machine policy in the first instance to see if it's a GPO failure or an XML failure etc

  3. Ah, there is a gap in the documentation here.

     

    The Stage and De-Stage scripts need to be executed as machine-based scripted tasks at startup and shutdown respectively (web console). 

     

    Then the register and de-register tasks can be executed in the user context

     

    The (awesome) lads in the WEM team are going to get that documentation updated ASAP

  4. 1. You need to register the CC to a Resource Location but no need to add anything in the DaaS service for hosting etc - You can use the appliances for this use case.

    2. You can install the current release VDA in your base image, or you can upgrade the provisioned VDA after the install if Citrix is deploying it.

    3. You can prep the VM per Win 365 requirements, there is no form of traditional MCS style provisioning at play, so the standard MS generalisation process should be followed.

  5. The Cloud Connector appliance doesn't help in your scenario - you already have achieved what it would achieve via Cloud Connectors in each forest

     

    Your easiest path is to put the PKI into the same domain as they users and VDA's, it's likely a far smaller ask to do that, than change the Trust Levels

     

    It's really a PKI architecture challenge at the end of the day. I have done cross forest deployments with PKI and FAS, and as long as the trusts and Domain Controller certs etc are all trusted across forests, it was fine - but quite a few moving parts on the PKI front vs colocation. Might be a nice time for a dedicated FAS only CA local to the users/VDA

  6. You don't need to do anything with ADMX on the endpoint - they ADMX is the frontend for Admins to configure and play with, ultimately, policy settings are written as reg keys on end the endpoint.

     

    I would not put your BIS-F config in via WEM, BIS-F will help with resetting the WEM cache, which in turn could remove your configurations - I am not sure how well that would pan out.

     

    You could use BIS-F locally ADMX on the base image (I know you want to avoid that), or you could use BIS-F shared configuration instead.

    • Like 1
  7. A standard Cloud connection flow does this assuming you are using the Gateway Service:

     

    Citrix Workspace handles Authentication and Resource Enumeration -> The user launches a desktop -> The connection is tunneled via the Gateway Service -> through the Cloud Connector -> To the VDA

     

    If you turn on Rendezvous Protocol, the following occurs:

     

    Citrix Workspace handles Authentication and Resource Enumeration -> The user launches a desktop -> The connection is tunneled via the Gateway Service directly to the VDA. The Cloud Connector is no longer in the connection path. The VDA reaches out to the Gateway Service on 443 to make this happen

     

    Direct Workload Connection changes things again:

     

    Citrix Workspace handles Authentication and Resource Enumeration -> The user launches a desktop -> IF the network where the user lives has been defined as a network location in Citrix Cloud AND that location has direct line of sight to the VDA -> The Gateway Service is bypassed entirely, and the user connects straight to the VDA

     

    This makes it very similar to a traditional storefront flow on-prem. You now have a single connection from endpoint to VDA

     

    HDX Direct is the future of Direct Workload Connection, it will effectively do the same thing, but you will not need to define network locations for the behavior to occur. It uses the Gateway Service to establish a connection, and then learns if there is a direct connection to the VDA possible. There are certs and other info passed around along with some use of STUN etc to make this secure a bit more robust

     

    • Like 1
  8. Citrix direction is that the product sets should be effectively on par - it's just the Cloud will likely get new features first due to the release pipelines etc

     

    If you want to compare being on prem to Citrix Cloud from a feature standpoint, you probably need to shift the thinking to more of a Current Release strategy. The next LTSR is going to have a load more stuff, but like any LTSR, it will be static capability whilst the CR and Cloud streams run ahead with new stuff so you will end up watching features arrive that you won't have in LTSR - Autoscale for example is something that has features added to it fairly regularly

×
×
  • Create New...