-
Configuring the VPN User Experience
-
How to Configure Full VPN Setup on a Citrix Gateway Appliance
-
AlwaysOn VPN before Windows logon (Formally AlwaysOn service)
-
Maintaining and Monitoring the System
-
Deploying with Citrix Endpoint Management, Citrix Virtual Apps, and Citrix Virtual Desktops
-
Accessing Citrix Virtual Apps and Desktops Resources with the Web Interface
-
Integrating Citrix Gateway with Citrix Virtual Apps and Desktops
-
Configuring Additional Web Interface Settings on Citrix Gateway
-
Configuring Access to Applications and Virtual Desktops in the Web Interface
-
Configuring Single Sign-On to the Web Interface
-
To configure single sign-on to Web applications by using a session policy
-
To define the HTTP port for single sign-on to web applications
-
Configuring Single Sign-On to the Web Interface by Using a Smart Card
-
To configure single sign-on for Citrix Virtual Apps and file shares
-
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
-
Configuring Settings for Your Citrix Endpoint Management Environment
-
Configuring Load Balancing Servers for Citrix Endpoint Management
-
Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
-
Configuring Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
-
Allowing Access from Mobile Devices with Citrix Mobile Productivity Apps
-
Configuring Domain and Security Token Authentication for Citrix Endpoint Management
-
Configuring Client Certificate or Client Certificate and Domain Authentication
-
-
Citrix Gateway Enabled PCoIP Proxy Support for VMware Horizon View
-
Proxy Auto Configuration for Outbound Proxy support for Citrix Gateway
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Configuring Single Sign-On to the Web Interface by Using a Smart Card
If you use smart cards for user logon, you can configure single sign-on to the Web Interface. You configure settings on Citrix Gateway, and then you configure the Web Interface to accept single sign-on with a smartcard. Single sign-on is also called pass-through authentication.
Web Interface Versions 5.3 and 5.4 support single sign-on to the Web Interface using a smart card. If you enable the Web Interface on Citrix ADC feature available in NetScaler version 10, you can also use single sign-on with a smartcard. For more information about configuring this feature, see Using Smart Card Authentication for Web Interface through Citrix Gateway.
Users can be in multiple CN groups in Active Directory for single sign-on to work, as long as the user name extraction in the certificate action is SubjectAltName:PrincipalName. If you use the parameter Subject:CN, users cannot be part of multiple CN groups.
To configure Citrix Gateway for single sign-on to the Web Interface by using a smart card, you need to do the following:
- Install a signed server certificate from a Certificate Authority (CA). For more information, see Installing the Signed Certificate on Citrix Gateway.
- Install a root certificate on Citrix Gateway and the user device.
- Create a virtual server as the logon point for the Web Interface. When you configure the virtual server, you must set the client certificate SSL parameter to Optional. For more information about configuring a virtual server, see Creating Virtual Servers.
- Create a secondary virtual server in which client authentication is disabled in the SSL parameters. This configuration prevents users receiving a secondary request for their personal identification number (PIN).
- Create a client certificate authentication policy. In the User Name Field, use the parameter SubjectAltName:PrincipalName to extract users from multiple groups. Leave the Group Name Field blank.
- Create a session policy and profile on Citrix Gateway. Within the session profile, you enable ICA proxy and specify the Web Interface and domain that you use for single sign-on.
You can use the following procedure to create a session profile for single sign-on with a smart card.
To create a session profile for single sign-on by using a smart card
- In the configuration utility, on the Configuration tab, in the navigation pane, expand Citrix Gateway Policies and then click Session.
- In the details pane, click the Profiles tab and then click Add.
3.On the Client Experience tab, next to Home Page, click Override Global and then clear Display Home Page.
- Next to Single sign-on to Web Applications, click Override Global and then click Single sign-on to Web Applications.
- Click the Published Applications tab.
- Next to ICA Proxy, click Override Global and then select ON.
- In Web Interface Address, click Override Global and then type the fully qualified domain name (FQDN) or the Web Interface.
- In Single Sign-on Domain, click Override Global and then type the domain name.
Note: You must use the format domain and not the format domain.com.
- Click Create and then click Close.
After you have completed the session profile, configure the session policy and use the profile as part of the policy. You can then bind the session policy to the virtual server.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.