Jump to content
Updated Privacy Statement

Poc Guides

  1. PoC Guide: Microsoft Teams optimization in Citrix Virtual Apps and Desktops environments

    Overview This document serves as a guide to prepare an IT organization for successfully evaluating Unified Communications (UC) in desktop and application virtualization environments using Microsoft Teams. Over 500,000 organizations, including 91 of the Fortune 100 (as of Mar 2019) use Teams in 44 languages across 181 markets. Without proper consideration and design for optimization, virtual desktop and virtual application users will likely find the Microsoft Teams experience to be subpar. Citri
  2. POC Guide: Migrating Applications from NetScaler ADC to the App Delivery and Security Service

    Introduction This document provides an overview of the steps, tools, architecture, and considerations for migrating Citrix ADC traffic management and security solutions to the new Citrix App Delivery and Security (CADS) service. This guide is intended for technical engineering and architectural teams who want to migrate applications to AWS. The scope of this guide is limited to Citrix ADC hardware or software-based appliances on product version 13 and later. What is CADS Service - Citr
  3. POC Guide: Native OTP Registration and OTP Validation for NetScaler Gateway (using Single unified LoginSchema)

    Introduction NetScaler supports one-time passwords (OTPs) without using a third-party server. OTPs are a highly secure option for authenticating to secure servers as the number or passcode generated is random. Previously, specialized firms, such as RSA, with specific devices that generate random numbers, offered OTPs. In addition to reducing capital and operating expenses, this feature enhances the administrator’s control by keeping the entire configuration on the NetScaler appliance.
  4. PoC Guide: nFactor for Citrix Gateway Authentication with Device Certificate

    Introduction Large Enterprise environments require flexible authentication options to meet the needs of various user personas. With Device Certificate, coupled with LDAP credentials, Enterprises get “something you have” and “something you know” multifactor authentication. This allows users to seamlessly verify their identity and securely access their applications and data.   Overview This guide demonstrates how to implement a Proof of Concept environment using two factor auth
  5. PoC Guide: nFactor for Citrix Gateway Authentication with Email OTP

    Introduction Implementing multifactor authentication is one of the best ways to verify identity and improve security posture. Email OTP is a convenient way to implement another factor using the readily available email system. It allows users to receive, copy, and paste authentication validation codes, into their gateway authentication form, from their email client on any device. Citrix Gateway supports Email OTP authentication, and can provide authentication for various services includ
  6. PoC Guide: nFactor for Citrix Gateway Authentication with Group Extraction

    Introduction Large Enterprise environments require flexible authentication options to meet the needs of a variety of user personas. With Group Extraction user AD group membership determines the number, and type of nFactor authentication methods users are required to complete to verify their identity and access their applications and data. Examples of user groups include: normal-security-group for individuals that may have lower security requirements by the nature of their job o
  7. PoC Guide: nFactor for Citrix Gateway Authentication with Native OTP

    Introduction Implementing multifactor authentication is one of the best ways to verify identity, and improve security posture. Native (time-based) One Time Password (OTP) is a convenient way to implement another factor using readily available authenticator applications. It allows users to enter validation codes from their authenticator application, into a gateway form, to authenticate. Citrix Gateway supports Native OTP, and can provide authentication for various services including web
  8. PoC Guide: nFactor for Citrix Gateway Authentication with Push Token

    Introduction Time Based One Time Passwords (TOTP) are an increasingly common method to provide an authentication that can increase security posture with other factors. TOTP with PUSH takes advantage of mobile devices by allowing users to receive and accept authentication validation requests at their fingertips. The exchange is secured by applying a hash to a shared key, distributed during setup. Citrix Gateway supports push notifications for OTP and, can provide authentication for vari
  9. PoC Guide: POC Guide Citrix Analytics for Security

    Overview Citrix Analytics for Security continuously assesses the behavior of Citrix Virtual Apps and Desktops users and Citrix DaaS users and applies actions to protect sensitive corporate information. The aggregation and correlation of data across networks, virtualized applications and desktops, and content collaboration tools enables the generation of valuable insights and more focused actions to address user security threats. More information on Citrix Analytics for Security can be found
  10. PoC Guide: Protecting Gateway Virtual Servers with WAF, Bot, and Advanced Authentication Policies

    Overview Many Citrix ADC appliances host VPN and Citrix Gateway deployments that also provide security protections to other web applications. This PoC guide is designed to help protect VPN and Gateway virtual servers using tools already available on the Citrix ADC appliance. This guide covers protecting the portal login page with Bot security and protecting the credential form submission with WAF capabilities. Also, advanced authentication policies add context to user logons and enable mult
  11. PoC Guide: Remote PC Access with Citrix DaaS

    Overview This Proof of Concept guide is designed to help you quickly configure Citrix DaaS to include Remote PC Access in your environment. At the end of this Proof of Concept guide you are able to give users who are working remotely access to the on-premises physical desktops using Citrix DaaS. You are able to let your users access their on-premises workstations on any device of their choice without having to connect over a VPN. Conceptual Architecture Scope In this Proof of Concept guid
  12. PoC Guide: Secure Access to Azure-managed SaaS Applications and Citrix Secure Private Access

    Overview As users access confidential content within SaaS applications, organizations must be able to simplify user login operations while still enforcing authentication standards. Organizations must be able to secure SaaS applications even though it exists beyond the confines of the data center. Citrix Workspace provides organizations with enhanced security controls for SaaS applications. In this scenario, a user authenticates to Citrix Workspace using Active Directory as the primary user dir
  13. PoC Guide: Secure Access to Office 365 with Citrix Secure Private Access

    Overview As users access confidential content within Microsoft 365 (Office 365), organizations must be able to simplify user login operations while still enforcing authentication standards. Organizations must be able to secure Microsoft 365 even though it exists beyond the confines of the data center. Citrix Workspace provides organizations with enhanced security controls for Microsoft 365. In this scenario, a user authenticates to Citrix Workspace using either Active Directory as the primary
  14. PoC Guide: Secure Access to SaaS Applications with Okta and Citrix Secure Private Access

    Overview As users consume more SaaS-based applications, organizations must be able to unify all sanctioned apps and simplify user login operations while still enforcing authentication standards. Organizations must be able to secure these applications even though they exist beyond the confines of the data center. Citrix Workspace provides organizations with secure access to SaaS apps. In this scenario, a user authenticates to Citrix Workspace using either Active Directory or Okta as the primary
  15. PoC Guide: URL Redirection with Secure Browser and Citrix ADC in Azure

    Overview Here are the configuration steps for setting up an ADC, configuring SSL Forward Proxy, and SSL Interception using the latest Citrix ADC marketplace template. The URL Redirection to Secure Browser capability of the ADC enables administrators to define specific website categories to be redirected from the local browser to Secure Browser automatically. The Citrix ADC acts as an intermediate proxy to do the interception between local browsing and the internet, thus achieving web isolation
  16. PoC Guide: Web Application Firewall Deployment

    Overview This proof of concept (PoC) guide is designed to help you quickly deploy Citrix Web App Firewall (WAF) either standalone or as a part of an existing ADC deployment to protect web applications and services. This guide covers some of the basics of Citrix WAF, deployment best practices, and next steps for your WAF projects. This guide will NOT cover every protection available nor will it cover all web technologies available today. These instructions cover cloning an application o
  17. Quick Start Guide- Citrix DaaS Standard for Azure

    Overview Citrix DaaS Standard for Azure is the quickest and simplest way to deliver Windows virtual apps and desktops from Azure. Citrix DaaS Standard for Azure provides admin simplicity, greater flexibility, increased security, and superior end user experience More information on Citrix DaaS Standard for Azure can be found here Pre-requisites Before getting started make sure to complete the following pre-requisites: Citrix Cloud account Note: you can only have one edition of Citrix Da
×
×
  • Create New...