-
Install and configure the NetScaler Gateway appliance
-
Maintain and monitor NetScaler Gateway systems
-
Configure DTLS VPN virtual server using SSL VPN virtual server
-
Integrate NetScaler Gateway with Citrix products
-
Integrate NetScaler Gateway with Citrix Virtual Apps and Desktops
-
Configure settings for your Citrix Endpoint Management Environment
-
Configure load balancing servers for Citrix Endpoint Management
-
Configure load balancing servers for Microsoft Exchange with Email Security Filtering
-
Configure Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
-
Allow Access from mobile devices with Citrix Mobile Productivity Apps
-
Configure domain and security token authentication for Citrix Endpoint Management
-
Configure client certificate or client certificate and domain authentication
-
-
-
Configuring a NetScaler Gateway application on the Azure portal
-
Configuring NetScaler Gateway Virtual Server for MSAL Token Authentication
-
Set up NetScaler Gateway for using micro VPN with Microsoft Endpoint Manager
-
NetScaler Gateway Enabled PCoIP Proxy Support for VMware Horizon View
-
Proxy Auto Configuration for Outbound Proxy support for NetScaler Gateway
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Configuring NetScaler Gateway Virtual Server for MSAL Token Authentication
To configure a NetScaler Gateway virtual server for monitoring MSAL token authentication, you need the following information:
-
authorizationEndpoint: The URL of the endpoint to which the unauthenticated user must be redirected. NetScaler Gateway redirects the user to this URL by adding query parameters including client id. If this parameter is not specified, by default the user is redirected to the URL configured in tokenEndpoint.
-
tokenEndpoint: The URL of the endpoint to which NetScaler Gateway posts the OAuth token to verify its authenticity. The user can get the OAuth token from the authorization server upon successful authentication.
-
GraphEndpoint: The URL of the Graph API service to learn Enterprise Mobility Services (EMS) endpoints.
-
certEndpoint: The URL of the endpoint that contains the JSON Web Key (JWK) for MSAL token verification.
-
Audience: FQDN of the NetScaler virtual server to which the app sends the MSAL token.
-
Issuer: Name of the Microsoft Entra ID issuer. Gets populated by default.
-
TenantID: Tenant ID for MSAL registration.
-
ClientID: A unique ID given to the Gateway app as part of MSAL registration.
-
ClientSecret: A secret key given to the Gateway app as part of MSAL registration.
-
ResourceURI: An optional parameter to capture the resource URI. If not configured, NetScaler uses Azure commercial resource URI.
Perform the following steps using the CLI:
-
Create an OAuth action.
add authentication OAuthAction <oauth_action_name> -OAuthType <INTUNE> -authorizationEndpoint <authorization_endpoint_fqdn> -tokenEndpoint <token_endpoint_fqdn> -clientID <client_id_val> -clientSecret <client_secret_val> -tenantID <tenant_id_value> -GraphEndpoint <graph_endpoint_fqdn> -CertEndpoint <cert_endpoint_fqdn> <!--NeedCopy-->
-
Add an authentication policy label to the OAuth action.
add authentication policylabel <policy_label_name> <!--NeedCopy-->
-
Create an authentication policy to associate with the newly created OAuth action.
add authentication Policy <policy_name> -rule <true> -action <oauth_intune_action> <!--NeedCopy-->
-
Bind the authentication policy to the policy label.
bind authentication policylabel <policy_label_name> -policyName <policy_name> -priority 100 <!--NeedCopy-->
-
Configure the authentication virtual server.
add authentication vserver <authvserver> SSL <0.0.0.0> bind ssl vserver <authvserver> -certkeyName <cert_key_file_name> bind authentication vserver <authvserver> -policy <ldap_policy_name> -priority 100 -nextFactor <policy_label_name> <!--NeedCopy-->
-
Configure the VPN virtual server.
add authentication authnProfile <vpn_profile_name> -authnVsName <authvserver> add vpn vserver <vserver_name> SSL <vpn_ip_address> -authnProfile <vpn_profile_name> <!--NeedCopy-->
Sample configuration:
add authentication OAuthAction oauth_action_for_NAC -OAuthType INTUNE -authorizationEndpoint "https://login.microsoftonline.com/ed10c531-5d7b-4a5c-bb29-564c20480754/oauth2/v2.0/authorize" -tokenEndpoint "https://login.microsoftonline.com/ed10c531-5d7b-4a5c-bb29-564c20480754/oauth2/v2.0/token" -clientID 1dc2adc3-0298-4ff5-9bf5-b98852ff58ba -clientSecret 6zM8Q~b4Hr9wwHEGFla.VDsiMWjvG~PS6PKv7c2m -tenantID ed10c531-5d7b-4a5c-bb29-564c20480754
add authentication policylabel intune_oauth_pol_label
add authentication Policy oauth_intune_pol -rule true -action oauth_action_for_NAC
bind authentication policylabel intune_oauth_pol_label -policyName oauth_intune_pol -priority 100
add authentication vserver av_vs SSL 0.0.0.0
bind ssl vserver av_vs -certkeyName crt_key_file_name
bind authentication vserver av_vs -policy ldap_policy_name -priority 100 -nextFactor intune_oauth_pol_label
add authentication authnProfile vpn_authnprofile -authnVsName av_vs
add vpn vserver vpn_sp SSL VPN_IP_Address 443 -authnProfile vpn_authnprofile
<!--NeedCopy-->
Note:
The parameters in the sample configuration must be modified as per the requirement. In the sample configuration:
-
OAuthType
,clientID
,clientSecret
, andtenantID
are mandatory parameters. -
The following parameters are populated with the default values if the user did not configure it while creating the OAuth action:
-
GraphEndpoint
: https://graph.microsoft.com/ -
AllowedTokenAlgorithms
: HS256, RS256, RS512 -
TokenEndpointAuthMethod
: client_secret_post -
GrantType
: Code
-
-
The
tenantID
used inauthorizationEndpoint
andtokenEndpoint
ised10c531-5d7b-4a5c-bb29-564c20480754
. -
The
loginSchema
used is the default schema. Depending on the use case, an appropriate login schema must be chosen. -
LDAP
is selected as the first factor of authentication andOAuth
as the next factor, bound to the authentication virtual server. This can be modified as per the usage.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.