Citrix Access Gateway For Mac Sierra

admin

Citrix Receiver for Mac product software. Citrix Workspace App Workspace app for Mac Subscribe to RSS notifications of new downloads. Trusted Mac download Citrix Access Gateway 1.1. Virus-free and 100% clean download. Get Citrix Access Gateway alternative downloads. Solution Issue is fixed in gateway plugin version 4.2.3. Deploying Citrix Gateway plug-ins for User Access. Selecting the Citrix Gateway plug-in for Users. Configuring the Virtual MAC Address. Configuring IPv4 Virtual MAC Addresses. The user receives a prompt to download. Citrix Files for Mac allows you to access your files directly through a mapped drive, providing a native Finder experience. Files are downloaded only when accessed, and temporarily stored on your computer. Changes made to the files are automatically saved back to the cloud. This release of Citrix Receiver for Mac contains a single installation package, CitrixReceiver.dmg, and supports remote access through NetScaler Gateway, Access Gateway, and Secure Gateway.

downloadWhy can't I download this file?

Applicable Products

  • NetScaler Gateway
  • XenMobile
  • StoreFront

Objective

This article describes how to configure NetScaler Gateway domain only authentication with StoreFront and App Controller for end users using Citrix Secure Hub, Citrix Receiver, or a web browser.

Requirements

The following components are required to allow users to connect to StoreFront and App Controller through a NetScaler Gateway:

  • Citrix StoreFront 2.0

  • App Controller 2.8

  • NetScaler 10.1 with Universal Licenses

  • Secure Hub for iOS or Android 8.5

  • Citrix Receiver for Windows 4.0

  • Citrix Receiver for Mac 11.8

  • Web browser (Receiver for Web)

Citrix Access Gateway Remote Desktop

Background

With the introduction of XenMobile App Edition and XenMobile Enterprise Edition product lines and the new Secure Hub client for iOS and Android devices, it is recommended to implement one of the following solutions:

  • Create two NetScaler Gateway virtual servers:

    Note: Though there are two NetScaler Gateway external URLs that need to be published with the first option, the End User does not have to be aware. The user can utilize the following methods to connect to the NetScaler Gateways:

    1. The first virtual server is dedicated for End Users using the Secure Hub app to communicate directly with App Controller after authenticating at the NetScaler Gateway virtual server.
    2. The second virtual server is dedicated for End Users using a web browser or Citrix Receiver for Windows/Mac and will communicate directly with StoreFront, instead of the App Controller, after authenticating the user at the NetScaler Gateway virtual server. Each NetScaler gateway virtual server has its own URL for external access.
    3. In a XenMobile Enterprise implementation, where the App Controller and MDM components are integrated, the MDM solution can push the NetScaler Gateway external URL to Secure Hub during the enrollment process of an iOS or Android device. For more information, refer to Citrix Documentation - Configuring Device Manager to Connect to App Controller.
    4. End users using Citrix Receiver for Windows or Mac can take advantage of the Email Based Discovery feature that allows users to add their Citrix Store account using their own email address. For more information, refer to Citrix Documentation - Connecting to StoreFront by Using Email-Based Discovery.

OR

  • Combine NetScaler session policies and profiles into a single NetScaler Gateway virtual server:
    Combine NetScaler session policies and profiles into a single NetScaler Gateway virtual server so that the same external URL is used for the Secure Hub app and Citrix Receiver for Windows or Mac clients. Bizagi modeler mac download.

Instructions

Configuration on NetScaler

Citrix Gateway Va

  1. Create the clientless access policies required:

    • Create the clientless access policy and profile for Citrix Receiver and Secure Hub. For more information refer to Citrix Documentation - Configuring Custom Clientless Access Policies for Receiver.
    • Create the clientless access policy and profile for Receiver for Web. For more information, refer to Citrix Documentation - Configuring Custom Clientless Access Policies for Receiver for Web.
  2. Create the session policy/profile for Secure Hub on iOS and Android.

    Session Policy

    Session Profile

    Network Configuration Tab

    Client Experience Tab

    Security Tab

    Published Applications Tab

    Note: The URL entered in the Account Services Address field in the Published Applications tab must match the App Controller’s configured Host name available in the App Controller’s Control Point > Settings > Network Connectivity section.

  3. Create the session policy/profile for Citrix Receiver for Windows/Mac.

    Session Policy

    Session Profile

    Network Configuration Tab

    Client Experience Tab

    Security Tab

    Published Applications Tab

    Note: The Web Interface Address and Account Services Address in the Published Applications tab must match the StoreFront Base URL which can be found on the StoreFront server’s management console. Ensure that a forward slash “/” is not added at the end of the URL.

  4. Create the session policy/profile for web browsers.

    Session Policy

    Session Profile

    Network Configuration Tab

    Client Experience Tab

    Security Tab

    Published Applications Tab

    Note: Use the Receiver for Web URL on the StoreFront Management console for the Web Interface Address field in the Published Applications tab and for the Home Page field, under the Client Experience tab.

  5. Select one of the following options (explained in the Background section of this article). With either option, the clientless access policies created in Step 1 must be bound to all NetScaler Gateway virtual servers.

  • Option 1: Create two NetScaler Gateway virtual servers in Smart Access mode and bind the following session policies with their associated profiles:

    Virtual Server 1 for Secure Hub

    • Bind the clientless access policy created for Secure Hub in Step 1.
    • Bind the Secure Hub session policy created in Step 2.

    Virtual Server 2 for Citrix Receiver and Web Browser

    • Bind both clientless access policies created in Step 1 – the Receiver clientless access policy must have a higher priority than the web browser clientless access policy .
    • Bind the Citrix Receiver session policy created in Step 3.
    • Bind the web browser session policy created in Step 4.

    OR

  • Option 2: Bind all the session policies created to a single NetScaler Gateway virtual server in Smart Access mode.

    Virtual Server for Secure Hub, Citrix Receiver, and Web Browser

    • Bind both clientless access policies created in Step 1.
    • Bind the Secure Hub session policy from Step 2 – this must have the highest priority.
    • Bind the Citrix Receiver session policy from Step 3 – this must have the second highest priority.
    • Bind the web browser session policy from Step 4 – this must have the third highest priority.

      Clientless Access Policies

      Note:The clientless access policy for Citrix Receiver/Secure Hub must have a higher priority. These clientless policies must be bound directly to the NetScaler Gateway virtual servers.

Configuration on StoreFront

  1. Enable access to Web/SaaS apps to Citrix Receiver or Receiver for Web by adding App Controller as a Delivery Controller on StoreFront. For more information, refer to Citrix Documentation - To manage the resources made available in stores.
    Note:Use the host name of the App Controller in the Server field when configuring the StoreFront Delivery Controller. The StoreFront server must trust the issuer of the App Controller’s server certificate (Root and/or Intermediate certificates) because the protocol used by StoreFront to communicate to the App Controller is HTTPS.

  2. Establish the trust between StoreFront and App Controller. For more information, refer to Citrix Documentation - To configure App Controller to connect to StoreFront.
    Note: Set the StoreFront as an auth server option to OFF. Set the Use the StoreFront Base URL on the Web Address field. At this point, you can access Web/SaaS apps through StoreFront, without the NetScaler Gateway. Test this before proceeding to integrate the NetScaler Gateway.

  3. Enable Pass-through from NetScaler Gateway on StoreFront. For more information, refer to Citrix Documentation - Configure the authentication service.
    Note:StoreFront must trust the issuer of the NetScaler Gateway virtual server’s bound certificate (Root and/or Intermediate certificates) for the Authentication Callback service.

  4. Add NetScaler Gateway to StoreFront. For more information, refer to Citrix Documentation - To add a NetScaler Gateway connection.
    Note: The Gateway URL must match exactly what the users are typing into the web browser address bar.

  5. Enable remote access on the StoreFront store. For more information, refer to Citrix Documentation - To manage remote access to stores through NetScaler Gateway.

Configuration on App Controller

  1. Enable access to Windows based apps for Secure Hub on the App Controller. For more information, refer to Citrix Documentation - Enabling Access to Windows-Based Apps from Secure Hub or Receiver.

  2. Configure the trust settings for NetScaler Gateway on App Controller. For more information, refer to Citrix Documentation - Configuring Applications and Trust Settings for NetScaler Gateway.
    Note: The NetScaler Gateway URL must match exactly what the users are typing into the web browser address bar.

Additional Configuration Steps

  1. To use MicroVPN with MDX wrapped apps, refer to CTX136914 - FAQ: Secure Hub for Mobile Devices and MicroVPN Technology for the list of requirements.

  2. On the NetScaler, the App Controller host name and StoreFront Base URL must be included in the Allow Domains list found in NetScaler Gateway > Global Settings > Configure Domains for Clientless Access. For more information, refer to Citrix Documentation - Configuring Domains for Clientless Access for Access Gateway and StoreFront.

  3. A DNS server must be configured on the NetScaler that can resolve the App Controller and StoreFront FQDNs to their respective IP address.

  4. On the NetScaler, if Citrix Secure Mail is being deployed from the App Controller, add the App Controller as an STA. For more information, refer Citrix Blog - Improving Battery Life with Secure Mail – STA to the Rescue! and Citrix Documentation - Configuring App Controller to Provide STA Tickets for Secure Mail.

  5. (Optional) If you plan to deploy internal websites through the App Controller, ensure to add the following VPN Session policy and profile for Windows/Mac Receiver clients. This will only apply for Citrix Receiver, mobile devices will use MicroVPN.

    Session Policy

    Session Profile

    Network Configuration Tab

    Client Experience Tab

    Security Tab

    Published Applications Tab

    Note:The Home Page field in the Client Experience tab must have the full path to the Receiver for website on StoreFront.

Additional Resources

For assistance with the initial configuration of NetScaler, including licensing, SSL certificates, authentication, and an overview of how the component works, see NetScaler for the XenDesktopXenApp Dummy. Though this blog refers to an older version of the NetScaler, all of the basic concepts still apply to version 10.1.

Citrix Access Gateway For Mac Sierra 10.12

Refer to the following links for configuration utility changes in NetScaler 10.1 and NetScaler 10.5:

Citrix Access Gateway For Mac Sierra Leone

  • Citrix Documentation - NetScaler 10.1 Configuration Utility Changes

  • Citrix Documentation - NetScaler 10.5 Configuration Utility Changes