Citrix Workspace And Receiver



The Citrix Workspace app (formerly known as Citrix Receiver) allows users to securely access applications, services, and data from several desktop and mobile devices. By using this app, you can get access to all your Software as a Service (SaaS) and web applications, files, and mobile apps instantly. This workspace can be accessed from various endpoint devices and operating systems, such as Windows, Windows Mobile, macOS, iPad, iPhone, Android, BlackBerry, and more.

The Workspace app (along with Citrix Virtual Apps and Desktops) is the front-end of the Workspace platform. Users have a single entry to their enterprise applications, desktops, and data by using any device from any network. The Citrix Workspace Platform is a single point of entry that allows unified administration of services like Virtual Apps and Desktops, Endpoint Management, Secure Browser, Analytics, Gateway etc. The Workspace Platform allows customers to subscribe to these services and is managed by Citrix, thus reducing the need for deployment and system update by administrators.

Deprecated features

The Citrix Workspace app allows for secure, unified access to all of your SaaS apps, web apps, virtual apps, files, and desktops. If your company uses Citrix, simply login with your company credentials to access all of the resources you need to be productive from anywhere. The Citrix Workspace app (formerly known as Citrix Receiver) allows users to securely access applications, services, and data from several desktop and mobile devices. By using this app, you can get access to all your Software as a Service (SaaS) and web applications, files, and mobile apps instantly. Logging will be enabled for subsequent session launches, and not for the current active session (if any) For Receiver for HTML5 version 2.2 and above a tool bar menu “Logging” has been added to enable and view the logs for Receiver for HTML5. On the Network Interruption Receiver notifies end-user that connectivity is lost with the counter starting from 5 Mins. Where first 3 mins is Session Reliability during this period we can still see the session with a transparency layer been applied and next 2 mins is Auto Reconnect Timeout in which applications gets disconnected but Desktop session becomes grey with a timer running. As of August 2018, Citrix Workspace app has replaced Citrix Receiver. Citrix Workspace app is a new client from Citrix that works similar to Citrix Receiver and is fully backward-compatible with your organization’s Citrix infrastructure. Citrix Work-space app provides the full capabilities of Citrix Receiver, as well as new capabilities.

To help you make timely business decisions this section indicates the deprecated features of the Citrix Workspace app. The deprecated items are not immediately removed but will be removed in the future.

Item

Date Announced

Date Removed

Alternative Solution

Remember the password
button in the Workspace app logon screen

2008

2008

Enable or disable stores option in the Add or Remove Accounts dialog

2006.1 Mac text to speech software, free download.

Add or remove descriptions for stores in the Add or Remove Accounts dialog.

2006.1

It is possible to add or remove store account details
without adding descriptions

Windows 7 Support

2002

2006.1

Windows 7 is supported in version 2002, use the supported
operating system indicated in the System Requirements
section.

Citrix Receiver for Universal Windows Platform

2008

How useful is the Citrix Workspace app?

Use it to access all applications through a single sign-on. Files that are stored centrally are dynamically updated across all devices that can access them. Personal and work-related applications can both exist on any device, without any threat of data breach for a company. Additionally, the app redirects any browsing-related activities to a cloud-hosted web browser, which is isolated from the corporate network. Hence, browsers are more or less secured from a possible cyber-security breach.

Does Citrix Workspace app have any drawbacks?

To use the app, you must have Citrix Virtual Apps—and that is quite expensive. Owing to this dependency, spending a considerable amount on Software does not make much sense for a medium-scale organization. Apart from the cost, Citrix has set the minimum number of users to 25. Hence, if your organization has just 15 members, you are still required to pay the same amount as you would for 25 users’ license.

Common Issues with the Citrix Workspace App

While the security and application delivery of Citrix are useful, its user interface is difficult to maneuver. The user experience is designed for highly skilled IT professionals with in-depth technical knowledge.

Citrix makes it difficult for a user to combine typing, basic clicking, and zooming all at once. It also encounters issues when users try to change the screen resolution. Another common issue with Citrix Workspace App is that organizations need to install Citrix Virtual apps to use Citrix Workspace which is, in fact, expensive. A medium scale organization would most likely not be able to incur the costs associated with it. The minimum number of users available is 25, so an organization that only has 15 users would still have to pay the fee for 25 users.

These limited functionalities of Citrix make it difficult for normal users to effectively reap the benefits of security and application delivery offered by Citrix

Parallels RAS: a better alternative

Parallels® Remote Application Server (RAS) is a virtualization solution that offers high-end features in a single license scheme. Parallels RAS allows you to publish virtual applications and desktops from a centralized location—at an affordable price. With Parallels RAS, you can get all components in a single package for a price that is far more reasonable. Another significant advantage of Parallels RAS is that IT admins can quickly deploy and manage this solution from a single pane of glass.

References

TechTarget | https://searchenterprisedesktop.techtarget.com/tip/Weigh-the-Citrix-Workspace-cost-against-its-benefits

Citrix | https://www.citrix.com/blogs/2018/06/12/citrix-workspace-app-everything-you-need-to-know/

TechTarget |https://searchvirtualdesktop.techtarget.com/definition/Citrix-Receiver

Citrix | https://www.citrix.com/blogs/2018/07/03/your-citrix-workspace-app-journey-begins/

A Xendc | http://axendatacentre.com/blog/

SSO Overview

There are to ways you can use SSO in a Citrix 7.5+ environment using built-in Citrix technologies:

  1. SSO via Citrix Receiver for Web
  2. SSO via the Citrix Receiver client

Depending on which method you choose the prerequisites differ, however not by much. Below are the prerequisites that are required for either method, meaning it doesn’t matter which method you choose the same prerequisites exist:

  1. Citrx Receiver must be installed on the client device with the SSON component installed
  2. Receiver for Web website must be in the Local Intranet Zone
  3. If using the Trusted Sites zone instead, Automatic logon with current username and password must be set in Trusted Sites zone (I will talk no further about using the Trusted Sites zone)
  4. Domain pass-through must be enabled on Receiver for Web via StoreFront console
  5. Requests sent to the XML service port on your DDCs must be trusted

Now below are the remaining unique prerequisites/differences for each method.

Receiver for Web

  1. Always use Receiver for HTML5 must not be selected in StoreFront
  2. Internet Explorer must be used when accessing Receiver for Web
  3. Group Policies do not need created for Receiver for Web SSO
  4. The User Name and Password Receiver for Web authentication method should be disabled to avoid extra prompts which will later be explained

Receiver client

  1. Group Policies do need created for Receiver client SSO

Installing and configuring SSO (Receiver for Web):

  1. Citrix Receiver client must be installed on the end device. The SSO component is not required so a simple GUI or command line interface command can be used to install the client.
  2. Using StoreFront MMC, enable Domain pass-through on Receiver for Web
  3. Using StoreFront MMC, disable User Name and Password authentication against Receiver for Web
  4. Launch Internet Explorer on logon by placing a shortcut in the Startup folder C:ProgramDataMicrosoftWindowsStart MenuProgramsStartup. This should be done on the base/gold image
  5. Set Internet Explorers homepage to the Receiver for Web website address
  6. Create a GPO linked to all machnes participating in Citrix Receiver for Web SSO or use an existing policy
  7. Using the above created policy, edit the setting Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel to include the Receiver for Web website address in the Local Intranet zone

Decision: To get rid of the first-time logon prompt which will be shown later in this post, you need to disable User Name and Password authentication. Doing so partly reduces functionality:

  1. Non domain machines cannot authenticate to this Receiver for Web website
  2. Usrs can not log on using a set of credentials different than those they used to log on to their domain joined client device

Keeping the above restrictions in mind, a decision must be made to bring true SSO experience at the expense of reduced authentication ability, or accept that a prompt will be given to users on first log on to Receiver for Web in favour of keeping maximum authentication abilities. It is also possible to create a seperate Receiver for Web website for SSO users only, or create sites for non-SSO participants. This means you can configure seperate devices/users to point to specific Receiver for Web websites based on authentication needs.

Installing and configuring SSO (Receiver client)

  1. Citrix Receiver client must be installed on the end-device. The SSO component is required so a simple GUI or command line interface command can be used to install the client. A command line install if preferred because you can automate Citrix Store configuration. The following command at minimum is required to install Receiver client: CitrixReceiver.exe /includeSSON (tested on Receiver 4.3)
  2. Using StoreFront MMC, enable Domain pass-through on Receiver for Web
  3. Download and copy receiver.admx and receiver.adml template files to the PolicyDefinitions folder on a Domain Controller
  4. Create a GPO linked to all machines participating in Citrix Receiver client SSO or use an existing one
  5. Using the above created policy, edit the setting Computer Configuration -> Policies -> Administrative Templates -> Citrix -> Components -> Citrix Receiver -> Local User Name and Password enabling Enable pass-through authentication
  6. Using the above created policy, edit the setting Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel to include the Receiver for Web website address in the Local Intranet zone

The Receiver for Web logon prompt

Now that we have discussed the prompt and the advantages/disadvantages with enabling/disabling this feature, here below is a picture of what the prompt actually is and looks like.

When you have enabled Domain pass-through and User name and Password authentication on Receiver for Web, the first time a user logs on they get this prompt to either log on using the account used to sign on to the computer or to switch to the username and password logon screen. The user name and password logon screen gives the user the ability to authenticate with any set of credentials they have. Since I mention “first time” above, first time means the first time a user logs on to Receiver for Web on a device that they have never used before. The next time they use the same machine the same prompt does not appear. If you log off, you may also get the below message.

If the device is a thin-client with a write-based restrictive filter, the profiles may not be stored and as such the user is using that machine for the first time every time as far as the device is concerned after said device is restarted. This reduces the SSO experience, as the prompt requires manual input. Users wanting true SSO experience must disable User name and Password authentication. User name and Password authentication conflicts with SSO and is not required. A seperate Receiver for Web site must be created for users who do require the User name and Password authentication method. User name and Password is enabled by default when you install Citrix StoreFront.

The User Name and Password authentication method

Configuring SSO for Receiver client

Now that we have covered the theory, I will walk through configuring SSO for Receiver client. I won’t go through SSO with Receiver for Web but it is just as similar to configure.

Install Citrix Receiver on the client device with SSON component included. I am using a command to install. The command automatically configures the store.

You could also enable SSO by checking the box on newer versions (4.3+) if you prefer however you will have to manually configure the store or use the Receiver ADMX templates with Group Policy.

Insert the Receiver for Web site in the Local Intranet Zone. If using the Trusted Sites zone instead, Automatic logon with current username and password must be set in the Trusted Sites zone. In most cases you will use the Local Intranet zone. This is best done via GPO.

Values:

  1. Intranet Zone = 1
  2. Trusted Sites = 2

If using the Trusted Sites zone, enable Automatic logon with current username and password.

Citrix receiver download

Enable Domain pass-through on Receiver for Web via StoreFront console and remove other authentication method(s). Pass-through from NetScaler Gateway can be enabled, however User name and password should not.

On your DDCs requests sent to the XML service port on your DDCs must be trusted, so run the following command:

Configure Group Policy to enable pass-through authentication on Receiver. Kodak printer esp 5250 software download mac. You will need to have imported the Receiver.admx and Receiver.adml files to the Group Policy Central Store.

Outcome

Now if you open the Citrix Receiver client on your device, it should not ask to configure the store or ask for credentials. Instead, you will be passed through to StoreFront and presented with your subscribed applications and desktops.

Be aware after installing Receiver you must log off/on to your client device for the SSONSVR.EXE process to start and capture your credentials.

Additional feature – Desktop Lock

You can also turn your PC/Thin Clients in to kiosk type machines using what is called Citrix Desktop Lock. When a user logs on to their device the Citrix desktop automatically launches in full-screen mode and if the user disconnects or logs off the Citrix desktop the user is automatically logged off the local device. This is great in a VDI environment if you want to bring a true no-touch experience to your users. You can download Desktop Lock from the Citrix website.

Once downloaded launch the Citrix Desktop Lock software on an SSON configured client device.

Click Close once the software has installed.

Restart the client device.

Now log on as a standard user who has one Citrix desktop assigned to them.

Desktop Lock automatically launches the desktop in full screen.

The Desktop Viewer toolbar has some missing buttons to prevent the user from minimizing the desktop for example.

When the user disonnects or logs off, the local client device is also logged off. This helps secure the device and not leave any unattended workstations logged on.

If you need to control the local device yourself, log on as a user who is a Local Administrator of that machine and you will be presented with the below prompt.

After clicking OK you can access the local desktop to perform management tasks.

Troubleshooting SSO

  • The SSONSVR.EXE process must be running on your client device
  • Ensure you have met all the prerequisites stated above for your SSO method (Receiver client/Receiver for Web)
  • Using an SSO configured device go to https://yourstorefrontserver.domain.com/citrix/storename/domainpassthroughauth/test.aspx. The web address I would go to is https://storefront.citrixpro.co.uk/citrix/cpsweb/domainpassthroughauth/test.aspx and if SSO is correctly configured you should see results similar to the below. (Included in StoreFront 2.5)
  • Restart the client device (requirement after Receiver install with SSON)

Receiver 4.5 (released September 2016):

New with Citrix Receiver for Windows 4.5 is the Configuration Checker tool which performs various checks against the prerequisites needed for SSO to work. Open Advanced Preferences by right-clicking the Receiver icon in the system tray. Click Configuration Checker.

Tick SSONChecker and click Run.

As you can see a number of checks have been performed with one failure.

Looking closer at the failure alert we can see the Single Sign-on process is not running. After installing the SSON components you only need to log off/on for the process to run. In this case, I deliberately left out the SSON component so it is not installed at all. Click on Save Report to save the results to .TXT.

Pop up download mac flash virus. Heres a look at the results .TXT file.

I’ve now ran the SSON Checker on a machine that is properly configured for SSO. As expected, all checks have passed.

Receiver SSON logging:

You can enable SSON logging which may be help in identifying an issue.

Add a the following values to HKLMSoftwareCitrixInstallSSON (32bit) or HKLMSoftwareWOW6432NodeCitrixInstallSSON (64bit).

REG_SZ DebugEnabled = true

REG_SZ LogPath = Path location

When you log off and on again log files will be created relating to SSON.

Citrix Workspace And Receiver Privileged Escalation Vulnerability

The trace-pnsson.log file shows information such as the credentials captured and packaged by SSON.





Comments are closed.