Jump to content

Tech Briefs

  1. Tech Brief: Global App Configuration Service Settings and Behaviors FAQ

    Overview The Global App Configuration Service (GACS) provides a centralized mechanism for enterprise IT admins to easily configure, distribute, and manage user settings for Citrix Workspace app across all devices - managed and unmanaged devices. The service can be used to manage settings on both cloud and on-premises environments, that is, Citrix Workspace and Citrix StoreFront settings via the GACS User Interface on Citrix Cloud portal or the GACS APIs. For more details on the service, read
  2. Tech Brief: Local Host Cache

    Overview Local Host Cache (LHC) is a Citrix technology that can maintain user access to resources during potential service disruptions. Local Host Cache leverages Site configurations cached locally on Delivery Controllers or Cloud Connectors to continue brokering operations when services may be unhealthy. Local Host Cache is a combination of several services and components which come together to take over the brokering responsibilities until the connection to the Cloud Broker or SQL databas
  3. Tech Brief: Mobile SSO

    As users consume more SaaS-based applications, organizations must be able to unify all sanctioned apps and this fact is true on the traditional mobile device. With many SaaS-based applications originally written for a web browser, this unification does not offer the best user experience. So, many of these SaaS service providers decided to go with native applications on the iOS and Android platform. Mobile SSO provides organizations the ability to simplify login operations while still enforcing a
  4. Tech Brief: Multifactor Authentication with Citrix nFactor

    Introduction Weak or stolen passwords are a leading cause of breaches in Enterprise networks. They can lead to loss of Intellectual Property, loss of Personally identifiable information (PII) and result in a significant impact on the business. Multifactor Authentication (MFA) is one of the best security measures to guard against identity vulnerabilities. Typically there are three types of authentication used to identify users: 1) Something you know (for example, password) - this t
  5. Tech Brief: Optimizations for Citrix DaaS and Citrix Virtual Apps and Desktops - Cost

    Overview Citrix has enabled and released features allowing IT admins and end-users to reduce costs for your organization. Learn about how to configure these features to allow the right balance between delivering a great end-user experience and optimizing costs. Summary of the components and features available in Citrix DaaS and Citrix Virtual Apps and Desktops: Component Citrix DaaS Citrix Virtual Apps and Desktops LTSR (2203) Citrix Virtual Apps and Desktops CR (2308) Autoscale -
  6. Tech Brief: Seamless Authentication Options on Citrix Workspace app

    Overview Citrix Workspace app (CWA) provides users a personalized interface that enables instant access to virtual applications, desktops, SaaS, and web apps. Users get seamless and secure access to all the apps needed to stay productive, including features like embedded browsing and single sign-on. CWA provides several authentication options administrators can enable in line with the identity provider enabled in your organization across on-premises and cloud environments. Force Login Prompt
  7. Tech Brief: Secure Private Access

    Overview Citrix Secure Private Access is a cloud delivered Zero Trust Network Access (ZTNA) solution that delivers adaptive access to IT sanctioned applications whether they are deployed on-prem or in the cloud. Traditional VPN solutions provide access at the network level and are: Prone to network level attacks Require backhauling of all traffic Often requires device management to capture the state of the end user device Citrix Secure Private Access helps avoid
  8. Tech Brief: Secure Private Access - Use Cases

    Introduction In today's world, facing cyberattacks day by day, it is even more necessary to secure remote access to applications, documents, or whatever in a granular way. A Zero-Trust architecture makes it possible and allows you to narrow down application access based on context. The term "context" here refers to: Users and groups (users and user groups) Devices (desktop or mobile devices) Location (geo-location or network location) Device posture (device
  9. Tech Brief: User Layer Management Utility - Converting VHD to VHDX

    Overview The User Layer Repair Utility is a tool created by Rob Zylowski. It enables administrators to select an OS layer, list all the app layers created with that layer, and match the layers to their associated repair JSON file. VHDX Conversion Feature The new feature to convert VHDs to VHDX and works similarly to the other features of the utility. The user interface is shown in the following image. After opening the utility, you click the Convert tab. Then, if you have not run it alrea
  10. Tech Brief: Workspace app

    As users access their resources -- SaaS apps, web apps, Windows apps, Linux apps, and desktops-- from numerous corporate and personal devices, they need a simple and unified experience that enables them to seamlessly gain access to everything. Organizations also must make it easy for users to onboard new devices while ensuring that centralizing security controls do not negatively impact the users’ experiences. Overview Workspace app gives users a personalized interface enabling instant access
  11. Tech Brief: Workspace Environment Management

    Introduction Workspace Environment Management (WEM) uses intelligent resource management and Profile Management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops(CVAD) deployments. WEM has several security features that bolster the security posture of the deployment. It is a software-only, driver-free solution. Architecture Workspace Environment Management can be installed on-premises or accessed as a ser
  12. Tech Brief: Workspace Identity

    A user’s primary workspace identity authorizes access to all workspace resource feeds including mobile apps, virtual apps, and virtual desktops. Citrix Workspace provides organizations with a choice in selecting the user’s primary identity provider. Identity Provider (IdP) An identity provider is the final authority of the user’s identity. The identity provider is responsible for the policies to protect and secure the user’s identity, which includes password policies, multifactor authenticatio
  13. Tech Brief: Workspace Single Sign-On

    A user’s primary Workspace identity authorizes them to access SaaS, mobile, web, virtual apps, and virtual desktops. Many authorized resources require another authentication, often with an identity different from the user’s primary workspace identity. Citrix Workspace provides users with a seamless experience by providing single sign-on to secondary resources. Primary Identity Understanding the differences between a user’s primary and secondary identities provides a foundation for understandin
  14. Tech Brief: Zero Trust

    Overview Traditional, perimeter-based approaches to protecting information systems and data are inadequate. For many years, the cybersecurity paradigm has emulated a familiar form of physical security from the middle ages: the castle and the moat. It’s an approach many enterprises have adopted and are finding insufficient in the world of cloud. In this classic defense model, multiple layers of protection with tightly secured checkpoints and gateways surround and protect the crown jewels. All
  15. Unified Communications SDK

    Overview Over the past few years, the need for real-time communications has sparked numerous vendors to adopt and build WebRTC-based applications. With WebRTC, vendors can build real-time communications within browsers that are accessible from anywhere.  This anywhere accessibility reduces costs by replacing hardware endpoints with softphones and increases scalability and flexibility for enterprises. Many enterprises have adopted these WebRTC-based applications within their call centers, wh
  16. Workspace Environment Management - Security

    Overview This Tech Brief explores the pivotal security features embedded within Citrix Workspace Environment Management (WEM). In today’s rapidly evolving digital landscape, robust application security within WEM is not just a luxury. It is a necessity. By harnessing the power of WEM, organizations can bolster their security posture, seamlessly navigate the complexities of application management, and protect their environment against many threats. This Tech Brief provides an overview of WEM
  17. Workspace Environment Manager Tool Hub

    Overview The Citrix Workspace Environment Management (WEM) Tool Hub is a versatile suite designed to streamline the configuration and management of Citrix environments for administrators. This comprehensive toolkit enhances administrative efficiency by offering a range of user-friendly tools, such as the Application Assistant, File Type Association Assistant, and Start Menu Configuration. These tools are engineered to simplify the setup and optimization processes, ensuring a seamless experi
×
×
  • Create New...