-
Overview
The Global App Configuration Service (GACS) provides a centralized mechanism for enterprise IT admins to easily configure, distribute, and manage user settings for Citrix Workspace app across all devices - managed and unmanaged devices.
The service can be used to manage settings on both cloud and on-premises environments, that is, Citrix Workspace and Citrix StoreFront settings via the GACS User Interface on Citrix Cloud portal or the GACS APIs.
For more details on the service, read
-
Overview
Local Host Cache (LHC) is a Citrix technology that can maintain user access to resources during potential service disruptions. Local Host Cache leverages Site configurations cached locally on Delivery Controllers or Cloud Connectors to continue brokering operations when services may be unhealthy. Local Host Cache is a combination of several services and components which come together to take over the brokering responsibilities until the connection to the Cloud Broker or SQL databas
-
As users consume more SaaS-based applications, organizations must be able to unify all sanctioned apps and this fact is true on the traditional mobile device. With many SaaS-based applications originally written for a web browser, this unification does not offer the best user experience. So, many of these SaaS service providers decided to go with native applications on the iOS and Android platform. Mobile SSO provides organizations the ability to simplify login operations while still enforcing a
-
Introduction
Weak or stolen passwords are a leading cause of breaches in Enterprise networks. They can lead to loss of Intellectual Property, loss of Personally identifiable information (PII) and result in a significant impact on the business. Multifactor Authentication (MFA) is one of the best security measures to guard against identity vulnerabilities.
Typically there are three types of authentication used to identify users:
1) Something you know (for example, password) - this t
-
Overview
Citrix has enabled and released features allowing IT admins and end-users to reduce costs for your organization. Learn about how to configure these features to allow the right balance between delivering a great end-user experience and optimizing costs.
Summary of the components and features available in Citrix DaaS and Citrix Virtual Apps and Desktops:
Component
Citrix DaaS
Citrix Virtual Apps and Desktops LTSR (2203)
Citrix Virtual Apps and Desktops CR (2308)
Autoscale
-
-
Overview
Citrix Workspace app (CWA) provides users a personalized interface that enables instant access to virtual applications, desktops, SaaS, and web apps. Users get seamless and secure access to all the apps needed to stay productive, including features like embedded browsing and single sign-on.
CWA provides several authentication options administrators can enable in line with the identity provider enabled in your organization across on-premises and cloud environments.
Force Login Prompt
-
Overview
Citrix Secure Private Access is a cloud delivered Zero Trust Network Access (ZTNA) solution that delivers adaptive access to IT sanctioned applications whether they are deployed on-prem or in the cloud. Traditional VPN solutions provide access at the network level and are:
Prone to network level attacks
Require backhauling of all traffic
Often requires device management to capture the state of the end user device
Citrix Secure Private Access helps avoid
-
Introduction
In today's world, facing cyberattacks day by day, it is even more necessary to secure remote access to applications, documents, or whatever in a granular way. A Zero-Trust architecture makes it possible and allows you to narrow down application access based on context.
The term "context" here refers to:
Users and groups (users and user groups)
Devices (desktop or mobile devices)
Location (geo-location or network location)
Device posture (device
-
Overview
The User Layer Repair Utility is a tool created by Rob Zylowski. It enables administrators to select an OS layer, list all the app layers created with that layer, and match the layers to their associated repair JSON file.
VHDX Conversion Feature
The new feature to convert VHDs to VHDX and works similarly to the other features of the utility. The user interface is shown in the following image.
After opening the utility, you click the Convert tab. Then, if you have not run it alrea
-
As users access their resources -- SaaS apps, web apps, Windows apps, Linux apps, and desktops-- from numerous corporate and personal devices, they need a simple and unified experience that enables them to seamlessly gain access to everything. Organizations also must make it easy for users to onboard new devices while ensuring that centralizing security controls do not negatively impact the users’ experiences.
Overview
Workspace app gives users a personalized interface enabling instant access
-
Introduction
Workspace Environment Management (WEM) uses intelligent resource management and Profile Management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops(CVAD) deployments.
WEM has several security features that bolster the security posture of the deployment. It is a software-only, driver-free solution.
Architecture
Workspace Environment Management can be installed on-premises or accessed as a ser
-
A user’s primary workspace identity authorizes access to all workspace resource feeds including mobile apps, virtual apps, and virtual desktops. Citrix Workspace provides organizations with a choice in selecting the user’s primary identity provider.
Identity Provider (IdP)
An identity provider is the final authority of the user’s identity. The identity provider is responsible for the policies to protect and secure the user’s identity, which includes password policies, multifactor authenticatio
-
A user’s primary Workspace identity authorizes them to access SaaS, mobile, web, virtual apps, and virtual desktops. Many authorized resources require another authentication, often with an identity different from the user’s primary workspace identity. Citrix Workspace provides users with a seamless experience by providing single sign-on to secondary resources.
Primary Identity
Understanding the differences between a user’s primary and secondary identities provides a foundation for understandin
-
Overview
Traditional, perimeter-based approaches to protecting information systems and data are inadequate.
For many years, the cybersecurity paradigm has emulated a familiar form of physical security from the middle ages: the castle and the moat. It’s an approach many enterprises have adopted and are finding insufficient in the world of cloud.
In this classic defense model, multiple layers of protection with tightly secured checkpoints and gateways surround and protect the crown jewels. All
-
Overview
Over the past few years, the need for real-time communications has sparked numerous vendors to adopt and build WebRTC-based applications. With WebRTC, vendors can build real-time communications within browsers that are accessible from anywhere. This anywhere accessibility reduces costs by replacing hardware endpoints with softphones and increases scalability and flexibility for enterprises. Many enterprises have adopted these WebRTC-based applications within their call centers, wh
-
Overview
This Tech Brief explores the pivotal security features embedded within Citrix Workspace Environment Management (WEM). In today’s rapidly evolving digital landscape, robust application security within WEM is not just a luxury. It is a necessity. By harnessing the power of WEM, organizations can bolster their security posture, seamlessly navigate the complexities of application management, and protect their environment against many threats. This Tech Brief provides an overview of WEM
-
Overview
The Citrix Workspace Environment Management (WEM) Tool Hub is a versatile suite designed to streamline the configuration and management of Citrix environments for administrators. This comprehensive toolkit enhances administrative efficiency by offering a range of user-friendly tools, such as the Application Assistant, File Type Association Assistant, and Start Menu Configuration. These tools are engineered to simplify the setup and optimization processes, ensuring a seamless experi