agee xa xd integration

Upload: mjbtrash

Post on 06-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 AGEE XA XD Integration

    1/70

    Citrix Access Gateway 9.1, Enterprise Edition

    Citrix Access Gateway Enterprise EditionIntegration Guide for Citrix XenApp andCitrix XenDesktop

  • 8/2/2019 AGEE XA XD Integration

    2/70

    Copyright and Trademark Notice

    Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement. A printable copy of

    the End User License Agreement is included with the installation media.

    Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

    unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or

    mechanical, for any purpose, without the express written permission of Citrix Systems, Inc.

    2009 Citrix Systems, Inc. All rights reserved.

    Citrix and ICA (Independent Computing Architecture) are registered trademarks and Citrix Access Gateway is a trademark of Citrix

    Systems, Inc. in the United States and other countries.

    All other trademarks and registered trademarks are the property of their respective owners.

    Document Code: June 3, 2009 (KKW)

  • 8/2/2019 AGEE XA XD Integration

    3/70

    Contents

    Chapter 1 Welcome

    How to Use this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

    Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

    Getting Service and Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

    Additional Maintenance Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

    Subscription Advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

    Knowledge Center Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

    Education and Training. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

    Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

    Chapter 2 Providing Access to Published Applications

    Integrating Access Gateway with XenApp or XenDesktop . . . . . . . . . . . . . . . . . .12

    Establishing a Secure Connection to the Server Farm. . . . . . . . . . . . . . . . . . . . . . .12

    Chapter 3 Deployment Options for the Web Interface

    Deploying the Web Interface in the Secure Network . . . . . . . . . . . . . . . . . . . . . . .15

    Deploying the Web Interface Parallel to the Access Gateway in the DMZ . . . . . .16

    Configuring Smart Card Access with the Web Interface . . . . . . . . . . . . . . . . . .17

    Deploying the Web Interface Behind the Access Gateway in the DMZ. . . . . . . . .17

    Configuring Web Interface Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

    Chapter 4 Setting Up a Web Interface Site to Work with the Access Gateway

    Web Interface Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19XenApp Web Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

    XenApp Services Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

    Setting Up a Web Interface Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

    Creating a Web Interface 4.5 Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

    Configuring Web Interface 4.5 Settings for the Access Gateway . . . . . . . . . . .22

    Creating a Web Interface Site in XenApp 5.0 or Citrix XenDesktop 2.1 . . . . . . . .23

    Configuring the Web Interface for the Access Gateway . . . . . . . . . . . . . . . . . . . . .24

    http://-/?-http://../document_center.pdfhttp://../document_center.pdfhttp://-/?-
  • 8/2/2019 AGEE XA XD Integration

    4/70

    4 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Adding a XenApp and XenDesktop Farm to a Single Site. . . . . . . . . . . . . . . . . . . 25

    Routing Client Connections Through the Access Gateway . . . . . . . . . . . . . . . . . . 26

    Chapter 5 Configuring the Access Gateway to Communicate with the Web Interface

    Using the Access Gateway Policy Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Creating and Configuring a Virtual Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Configuring Policies for Published Applications and Desktops. . . . . . . . . . . . . . . 29

    Using the Published Applications Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Configuring the Secure Ticket Authority on the Access Gateway. . . . . . . . . . . . . 31

    Chapter 6 Configuring SmartAccess

    How SmartAccess Works for XenApp and XenDesktop . . . . . . . . . . . . . . . . . . . . 34

    Configuring XenApp Policies and Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Configuring Client Device Mapping on XenApp . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    Enabling XenApp as a Quarantine Access Method . . . . . . . . . . . . . . . . . . . . . . . . 40

    Configuring XenDesktop 2.1 for SmartAccess. . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    Configuring SmartAccess in XenDesktop 2.1. . . . . . . . . . . . . . . . . . . . . . . . . . 42

    Configuring SmartAccess on the Access Gateway . . . . . . . . . . . . . . . . . . . . . . 42

    Adding the Desktop Delivery Controller as the Secure Ticket Authority . . . . 43

    Monitoring ICA Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    Chapter 7 Configuring Single Sign-On

    Configuring Single Sign-On to the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . 45

    Configuring Ports for Single Sign-On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Additional Configuration Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Testing Single Sign-On to the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Configuring Single Sign-On for Citrix XenApp and File Shares. . . . . . . . . . . . . . 48

    Chapter 8 Deploying the Access Gateway in a Double-Hop Demilitarized Zone

    How a Double-Hop Deployment Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

    Client Connection Process in a Double-Hop DMZ Deployment . . . . . . . . . . . . . . 51

    Authenticating the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

    Creating a Session Ticket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    Starting the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Completing the Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

    Preparing for a Double-Hop DMZ Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

    Components Required to begin the Deployment. . . . . . . . . . . . . . . . . . . . . . . . 55

  • 8/2/2019 AGEE XA XD Integration

    5/70

    Contents 5

    Installing the Access Gateway in a Double-Hop DMZ. . . . . . . . . . . . . . . . . . . . . .55

    Step 1: Installing an Access Gateway in the First DMZ . . . . . . . . . . . . . . . . . .56Step 2: Configuring the First Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . .56

    Step 3: Installing an Access Gateway in the Second DMZ . . . . . . . . . . . . . . . .56

    Step 4: Configuring a Virtual Server on the Access Gateway Proxy. . . . . . . . .57

    Step 5: Configuring the Access Gateway to Communicate with the Access Gate-way Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

    Step 6: Binding the Access Gateway in the Second DMZ Globally or to a Virtual

    Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

    Step 7: Configuring the Access Gateway to Handle the STA and ICA Traffic 58

    Step 8: Opening the Appropriate Ports on the Firewalls . . . . . . . . . . . . . . . . . .59

    Step 9: Managing SSL Certificates in a Double-Hop DMZ Deployment . . . . .61

    Chapter 9 Replacing the Secure Gateway with Citrix Access Gateway

    Secure Gateway and Access Gateway Deployment . . . . . . . . . . . . . . . . . . . . . . . .65

    Preparing to Migrate to the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

    Migrating from the Secure Gateway to the Access Gateway . . . . . . . . . . . . . . . . .68

    Performing an In-Place Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

    Performing a Parallel Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

  • 8/2/2019 AGEE XA XD Integration

    6/70

    6 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

  • 8/2/2019 AGEE XA XD Integration

    7/70

    CHAPTER 1

    Welcome

    This chapter describes who should read the CitrixAccess Gateway Enterprise

    Edition Integration Guide for Citrix XenApp and Citrix XenDesktop, how it is

    organized, and its document conventions.

    How to Use this GuideThis guide is intended for system administrators responsible for installing and

    configuring the Access Gateway for use with Citrix XenApp and Citrix

    XenDesktop. This document assumes that the Access Gateway is connected to an

    existing network and that the administrator has experience configuring that

    network

    The configuration steps in this document assume that the Access Gateway is

    deployed as a standalone appliance and that users connect directly to the Access

    Gateway.

    Document ConventionsAccess Gateway documentation uses the following typographic conventions for

    menus, commands, keyboard keys, and items in the program interface:

    Convention Meaning

    Boldface Commands, names of interface items such as text boxes, optionbuttons, and user input.

    Italics Placeholders for information or parameters that you provide. For

    example,filename in a procedure means you type the actual name ofa file. Italics also are used for new terms and the titles of books.

    %SystemRoot% The Windows system directory, which can be WTSRV, WINNT,WINDOWS, or other name you specify when you install Windows.

    Monospace Text displayed in a text file or command-line interface.

    { braces } A series of items, one of which is required in command statements.For example, { yes | no} means you must type yes or no. Do not typethe braces themselves.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    8/70

    8 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Getting Service and SupportCitrix provides technical support primarily through the Citrix Solutions Network

    (CSN). Our CSN partners are trained and authorized to provide a high level of

    support to our customers. Contact your supplier for first-line support, or check for

    your nearest CSN partner at http://www.citrix.com/support/.

    In addition to the CSN channel program, Citrix offers a variety of self-service,

    Web-based technical support tools from its Knowledge Center at

    http://support.citrix.com/. Knowledge Center features include:

    A knowledge base containing thousands of technical solutions to support

    your Citrix environment

    An online product documentation library

    Interactive support forums for every Citrix product

    Access to the latest hotfixes and service packs

    Security bulletins

    Online problem reporting and tracking (for organizations with valid support

    contracts)

    Another source of support, Citrix Preferred Support Services, provides a range of

    options that allows you to customize the level and type of support for your

    organizations Citrix products.

    Additional Maintenance SupportIn addition to the support options provided by Citrix, all Access Gateway

    Enterprise Edition appliances are available with Silver and Gold maintenance

    options. If you purchased either of these options, documentation is provided with

    the appropriate Citrix Technical Support numbers if you need to call.

    [ brackets ] Optional items in command statements. For example, [/ping] meansthat you can type/ping with the command. Do not type the bracketsthemselves.

    | (vertical bar) A separator between items in braces or brackets in commandstatements. For example, { /hold | /release | /delete} means you type

    /hold or/release or/delete.

    (ellipsis) You can repeat the previous item or items in command statements.For example,/route:devicename[,] means you can type additionaldevicenames separated by commas.

    Convention Meaning

  • 8/2/2019 AGEE XA XD Integration

    9/70

    Chapter 1 Welcome 9

    Silver Maintenance Option

    The Silver maintenance option provides unlimited Access Gateway support forone year. This option provides basic coverage hours, one assigned support

    account manager for non-technical relations management, four named contacts,

    and advanced replacement for materials.

    Technical support is available at the following times:

    North America, Latin America, and the Caribbean: 8 a.m. to 9 p.m. US

    Eastern time, Monday through Friday

    Asia (excluding Japan): 8 a.m. to 6 p.m. Hong Kong time, Monday through

    Friday

    Australia and New Zealand: 8 a.m. to 6 p.m. Australian Eastern Standard

    Time (AEST), Monday through Friday

    Europe, Middle East, and Africa: 8 a.m. to 6 p.m. Coordinated Universal

    Time (Greenwich Mean Time), Monday through Friday

    Gold Maintenance OptionThe Gold maintenance option provides unlimited Access Gateway support for

    one year. Support is available 24 hours a day, 7 days a week. This option provides

    an assigned support account manager for non-technical relations management and

    six named contacts.

    Subscription AdvantageYour product includes a one-year membership in the Citrix SubscriptionAdvantage program. The Subscription Advantage program gives you an easy way

    to stay current with the latest software version and information for your Citrix

    products. Not only do you get automatic access to download the latest feature

    releases, software upgrades, and enhancements that become available during the

    term of your membership, you also get priority access to important Citrix

    technology information.

    You can find more information on the Citrix Web site at http://www.citrix.com.

    You can also contact your sales representative, Citrix Customer Care, or a

    member of the Citrix Solutions Network program for more information.

    Knowledge Center AlertsThe Citrix Knowledge Center allows you to configure alerts, which notify you

    when the topic you are interested in is updated. You can set an alert on product

    categories. When there are updates to the product, you are notified of the update.

  • 8/2/2019 AGEE XA XD Integration

    10/70

    10 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    To set up an alert, log on to the Citrix Support Web site at

    http://support.citrix.com. After you are logged on, under Products, select a

    product. Under Tools, clickAdd to your Hotfix Alerts. To remove an alert, go

    to the Knowledge Center product and clickRemove from your Hotfix Alerts.

    Education and TrainingCitrix offers a variety of instructor-led training and Web-based training solutions.

    Instructor-led courses are offered through Citrix Authorized Learning Centers

    (CALCs). CALCs provide high-quality classroom learning using professional

    courseware developed by Citrix. Many of these courses lead to certification.

    Web-based training courses are available through CALCs, resellers, and from the

    Citrix Web site.

    Information about programs and courseware for Citrix training and certification isavailable from http://www.citrixtraining.com/.

    Related DocumentationFor additional information about the Access Gateway, refer to the following

    guides:

    Getting Started with Citrix Access Gateway Enterprise Edition

    Citrix Access Gateway Enterprise Edition Administrators Guide

    Citrix Access Gateway Enterprise Edition Pre-Installation Checklist

    Citrix XenApp 5.0 for Windows Server 2008 Administrator's Guide

    Citrix XenDesktop Administrator's Guide

    Citrix Web Interface Administrators Guide

    Citrix Access Gateway Enterprise Edition Readme

  • 8/2/2019 AGEE XA XD Integration

    11/70

    CHAPTER 2

    Providing Access to PublishedApplications

    One or more computers running Citrix XenApp or Citrix XenDesktop creates aserver farm. If your enterprise network contains a server farm, you can deploy the

    Access Gateway to provide secure Internet access to published applications or

    published desktops.

    In such deployments, the Access Gateway works with the Web Interface and

    Secure Ticket Authority (STA) to provide authentication, authorization, and

    redirection to published applications hosted on a computer running Citrix

    XenApp or published desktops provided by Citrix XenDesktop.

    This functionality is achieved by integrating Access Gateway Enterprise Edition

    components with the Web Interface, XenApp, or XenDesktop. This provides

    advanced authentication and an access control option to the Web Interface. For

    more information about the Web Interface, see the Web Interface Administrators

    Guide for your version.

    Remote connectivity to a server farm does not require the Access Gateway Plug-

    in. To access published applications, users connect using Citrix XenApp Plug-ins.

    To access published desktops, users connect using Citrix Desktop Receiver.

    Note: Installation of either the Desktop Receiver or the Desktop Receiver

    Embedded Edition on the same computer as XenApp plug-ins (client-side

    software for Citrix XenApp) is not supported. If you want your users to be able to

    access both virtual desktops and virtual applications from the same computer,

    Citrix recommends installing XenApp plug-ins on the virtual desktops that you

    create with XenDesktop. This allows your virtual desktops to receive virtual

    applications.

    In This Chapter

    Integrating Access Gateway with XenApp or XenDesktop

    Establishing a Secure Connection to the Server Farm

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    12/70

    12 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Integrating Access Gateway with XenApp or XenDesktopWhen you configure the Access Gateway for client connections, you can include

    settings for network traffic to XenApp, XenDesktop, or both. To do so, you

    configure the Access Gateway and Web Interface to communicate with each

    other.

    The tasks for integrating these three products include:

    Creating a Web Interface site in the XenApp or XenDesktop farm

    Configuring settings within the Web Interface to route user connections

    through the Access Gateway

    Configuring the Access Gateway to communicate with the Web Interface

    and Secure Ticket AuthorityYou can also configure the Access Gateway to communicate with a XenApp

    server farm using a double-hop DMZ. For more information, see Deploying the

    Access Gateway in a Double-Hop Demilitarized Zone on page 49.

    The Access Gateway and Web Interface use the Secure Ticket Authority and

    Citrix XML Service to establish client connections. The Secure Ticket Authority

    and XML Service runs on the XenApp or XenDesktop server.

    Establishing a Secure Connection to the Server FarmThis section provides one example of how an Access Gateway deployed in the

    DMZ works with the Web Interface to provide a secure, single point-of-access topublished resources available in a secure enterprise network.

    In this example, all of the following conditions exist:

    Client devices from the Internet connect to the Access Gateway using

    XenApp Plug-ins or Citrix Desktop Receiver.

    The Web Interface resides behind the Access Gateway in the secure

    network. The client device makes the initial connection to the Access

    Gateway and the connection is passed to the Web Interface.

    The secure network contains a server farm. One server within this server

    farm runs the STA and the Citrix XML Service. The STA and the XML

    Service can run on either XenApp or XenDesktop.

    Process Overview: User access to published resources by the server farm

    1. A remote user types the address of the Access Gateway; for example,

    https://www.ag.wxyco.com, in the address field of a Web browser. The

  • 8/2/2019 AGEE XA XD Integration

    13/70

    Chapter 2 Providing Access to Published Applications 13

    client device attempts this SSL connection on port 443, which must be open

    through the firewall for this connection to succeed.

    2. The Access Gateway receives the connection request and users are asked

    for their credentials. The credentials are passed back through the Access

    Gateway, users are authenticated, and the connection is passed to the Web

    Interface.

    3. The Web Interface sends the user credentials to the Citrix XML Service

    running in the server farm.

    4. The XML Service authenticates the user credentials and sends the Web

    Interface a list of the published applications or desktops the user is

    authorized to access.

    5. The Web Interface populates a Web page with the list of published

    resources (applications or desktops) that the user is authorized to access andsends this Web page to the client.

    6. The user clicks a published application or desktop link. An HTTP request is

    sent to the Web Interface indicating the published resource that was

    selected.

    7. The Web Interface interacts with the XML Service and receives a ticket

    indicating the server on which the published resource runs.

    8. The Web Interface sends a session ticket request to the STA. This request

    specifies the IP address of the server on which the published resource runs.

    The STA saves this IP address and sends the requested session ticket to the

    Web Interface.

    9. The Web Interface generates an ICA file containing the ticket issued by the

    STA and sends it to the client Web browser.

    The ICA file generated by the Web Interface contains the Fully Qualified

    Domain Name (FQDN) or the Domain Name Server (DNS) name of the

    Access Gateway. Note that the IP address of the server running the

    requested resource is never revealed to users.

    10. The ICA file contains data instructing the Web browser to start the XenApp

    Plug-ins or Citrix Desktop Receiver. The client connects to the Access

    Gateway using the Access Gateway FQDN or DNS name in the ICA file.

    Initial SSL/TLS handshaking occurs to establish the identity of the Access

    Gateway.11. The client device sends the session ticket to the Access Gateway and the

    Access Gateway contacts the STA for ticket validation.

    12. The STA returns the IP address of the server on which the requested

    application resides to the Access Gateway.

    13. The Access Gateway establishes a TCP connection to the server.

  • 8/2/2019 AGEE XA XD Integration

    14/70

    14 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    14. The Access Gateway completes the connection handshake with the client

    device and indicates to the client device that the connection is established

    with the server.

    All further traffic between the client device and the server is simply proxied

    through the Access Gateway.

    The traffic between the client device and Access Gateway is encrypted. The

    traffic between the Access Gateway and the server can be encrypted

    independently but is not encrypted by default.

  • 8/2/2019 AGEE XA XD Integration

    15/70

    CHAPTER 3

    Deployment Options for the WebInterface

    When deploying the Access Gateway with the Web Interface, you can install theWeb Interface in the DMZ or in the secure network. The following is a discussion

    of deployment options for the Web Interface.

    In This Chapter

    Deploying the Web Interface in the Secure Network

    Deploying the Web Interface Parallel to the Access Gateway in the DMZ

    Deploying the Web Interface Behind the Access Gateway in the DMZ

    Configuring Web Interface Failover

    Deploying the Web Interface in the Secure NetworkIn this deployment, the Web Interface resides in the trusted network. The Access

    Gateway is in the DMZ. User requests are authenticated by the Access Gateway

    before being sent to the Web Interface.

    When the Web Interface is deployed in the secure network, authentication must

    be configured on the Access Gateway. Users connect to the Access Gateway, type

    their credentials, and then are connected to the Web Interface.

    Important: When the Web Interface is in the secure network, authentication

    should be enabled on the virtual server in Access Gateway Enterprise Edition.

    When authentication is disabled, unauthenticated HTTP requests are sent directlyto the server running the Web Interface. Disabling authentication on the Access

    Gateway is recommended only when the Web Interface is in the DMZ and users

    are connecting directly to the Web Interface.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    16/70

    16 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    If you are deploying the Web Interface with XenDesktop, placing the Web

    Interface in the secure network is the default deployment scenario. When the

    Desktop Delivery Controller is installed, a custom version of the Web Interface is

    also installed.

    Deploying the Web Interface Parallel to the AccessGateway in the DMZ

    In this deployment, the Web Interface and Access Gateway both reside in the

    DMZ. Users connect directly to the Web Interface using a Web browser. After

    users log on to the Web Interface, they can access published applications or

    desktops in the server farm. When users start an application or desktop, the Web

    Interface sends an ICA file containing instructions for routing ICA traffic throughthe Access Gateway as if it were a server running the Secure Gateway. The ICA

    file delivered by the Web Interface includes a session ticket produced by the

    Secure Ticket Authority.

    When XenApp Plug-ins connect to the Access Gateway, the ticket is presented.

    The Access Gateway contacts the STA to validate the session ticket. If the ticket

    is still valid, the users ICA traffic is relayed to the server in the server farm.

    When the Web Interface runs parallel to the Access Gateway in the DMZ,

    authentication on the Access Gateway does not need to be configured.

    The Web Interface installed parallel to the Access Gateway. Client connections are firstsent to the Web Interface for authentication. After authentication, the connections arerouted through the Access Gateway.

  • 8/2/2019 AGEE XA XD Integration

    17/70

    Chapter 3 Deployment Options for the Web Interface 17

    Configuring Smart Card Access with the Web

    InterfaceIf users are logging on directly to the Web Interface using Citrix XenApp Plug-

    ins and smart card authentication, the Web Interface must be parallel to the

    Access Gateway in the DMZ. The server running the Web Interface must also be

    a domain member.

    If users are logging on using the Access Gateway Plug-in, initial authentication is

    done by the Access Gateway. When the VPN tunnel is established, the user can

    log on to the Web Interface using the smart card. In this scenario, the Web

    Interface can be installed behind the Access Gateway or in the secure network.

    If the Web Interface is configured to use smart card authentication and is installed

    parallel to the Access Gateway, the Access Gateway and the Web Interface each

    perform SSL termination.

    The Web Interface terminates secure HTTP traffic including user authentication,

    display of published applications, and starting published applications.

    Note: Access Gateway Enterprise Edition can also use the smart card for

    authentication using a client certificate.

    Deploying the Web Interface Behind the Access Gateway

    in the DMZTo route all HTTPS and ICA traffic through a single external port and require the

    use of a single SSL certificate, the Access Gateway can act as a reverse Web

    proxy for the Web Interface.

    When the Web Interface is deployed behind the Access Gateway in the DMZ,

    authentication on the appliance can be configured but is not required.

    Configuring Web Interface FailoverYou can configure the Access Gateway to failover to a secondary server running

    the Web Interface using the Published Applications Wizard.

    Web Interface failover allows user connections to stay active in the event the

    primary Web Interface fails. When you configure failover, you define a new IP

    address in addition to the system IP address, mapped IP address, or virtual server

    IP address. The new IP address must be on the same subnet as the system or

    mapped IP address.

  • 8/2/2019 AGEE XA XD Integration

    18/70

    18 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    When Web Interface failover is configured on the Access Gateway, any network

    traffic that is sent to the new IP address is relayed to the primary Web Interface.

    The virtual server that you select in the Published Applications Wizard serves as

    the network address translation IP address and the real IP address is that of the

    Web Interface. If the primary Web Interface fails, network traffic is sent to the

    secondary Web Interface.

    To configure Web Interface failover

    1. In the configuration utility, in the navigation pane, clickAccess Gateway.

    2. In the details pane, under Getting Started, clickPublished applications

    wizard.

    3. Click Next, select a virtual server, and clickNext.

    4. On the Configure Client Connections page, clickConfigure WebInterface Failover.

    5. Under Primary Web Interface, in Virtual Server IP, type the new IP

    address for failover.

    6. Under Backup Web Interface, in Web Interface Server, type the IP

    address of the server running the Web Interface or select a server from the

    list.

    7. In Web Interface Server Port, type the port number of the Web Interface

    and clickOK. ClickNext and follow the instructions in the wizard.

  • 8/2/2019 AGEE XA XD Integration

    19/70

    CHAPTER 4

    Setting Up a Web Interface Site toWork with the Access Gateway

    The Web Interface provides users with access to XenApp applications andcontent and XenDesktop virtual desktops. Users access their published

    applications through a standard Web browser or through the Citrix XenApp plug-

    in (the new name for the Program Neighborhood Agent). Users access published

    desktops using Citrix Desktop Receiver.

    You can configure Web Interface sites created on Windows platforms using the

    Access Management Console. The Access Management Console can be installed

    on Windows platforms only.

    To configure the Web Interface to work with the Access Gateway, create the Web

    Interface site, configure the settings in the Web Interface, and then configure the

    Access Gateway. This chapter explains how to create the Web Interface site.

    In This Chapter

    Web Interface Features

    Setting Up a Web Interface Site

    Creating a Web Interface 4.5 Site

    Creating a Web Interface Site in XenApp 5.0 or Citrix XenDesktop 2.1

    Configuring the Web Interface for the Access Gateway

    Adding a XenApp and XenDesktop Farm to a Single Site

    Routing Client Connections Through the Access Gateway

    Web Interface FeaturesThis section provides information about the features of the Web Interface.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    20/70

    20 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    XenApp Web SitesThe Web Interface provides functionality to create and manage XenApp Websites (the new name for access platform sites). Users access published resources

    and streamed applications remotely using a Web browser and a plug-in.

    XenApp Services SitesCitrix XenApp is a plug-in designed for flexibility and ease of configuration.

    Using Citrix XenApp in conjunction with XenApp Services sites (the new name

    for Program Neighborhood Agent Services sites) on the Web Interface, you can

    integrate published resources with users desktops. Users access remote and

    streamed applications, and remote desktops and content by clicking icons on their

    desktop or the Start menu, or by clicking in the notification area of their

    computer desktop. You can determine what, if any, configuration options yourusers can access and modify, such as audio, display, and logon settings.

    For more information, see the Web Interface Administrators Guide for your

    edition.

    Setting Up a Web Interface SiteIf you deployed the Web Interface in the secure network and configured

    authentication on the Access Gateway, when users connect to the Access

    Gateway, authentication is provided by the appliance. Before configuring the

    Access Gateway, create and configure the Web Interface site.

    The steps for creating a Web Interface site include:

    Select how users log on. This can be through either a Web browser, the

    Access Gateway Plug-in, or Citrix XenApp (the new name for Program

    Neighborhood Agent). For more information, see XenApp Web Sites on

    page 20 or XenApp Services Sites on page 20.

    Identify where users are authenticated from: the Access Gateway or the

    Web Interface.

    Note: When the Web Interface is in the secure network, authentication is

    enabled on the virtual server on the Access Gateway. When authentication

    is disabled, unauthenticated HTTP requests are sent directly to the serverrunning the Web Interface. Disabling authentication on the Access Gateway

    is recommended only when the Web Interface is in the DMZ and users

    connect directly to the Web Interface.

  • 8/2/2019 AGEE XA XD Integration

    21/70

    Chapter 4 Setting Up a Web Interface Site to Work with the Access Gateway 21

    Make sure a valid server certificate is installed on the Access Gateway. For more

    information about working with certificates, see the Citrix Access Gateway

    Enterprise Edition Administrators Guide.

    Important: For the Web Interface to work properly with Access Gateway

    Enterprise Edition, the server running the Web Interface must trust the Access

    Gateway certificate and be able to resolve the virtual server FQDN to the correct

    IP address.

    Creating a Web Interface 4.5 SiteTo create a Web Interface site on Citrix Presentation Server 4.5, you create the

    site and then configure Advanced Access Control settings. You can do this in the

    Access Management Console.

    To create a Web Interface site on Citrix XenApp 4.5

    1. Click Start > All Programs > Citrix > Management Consoles > Access

    Management Console.

    If prompted, configure and run discovery.

    2. Under Citrix Resources > Configuration Tools, clickWeb Interface, and

    under Common Tasks, clickCreate site.

    3. For the site type, select Access Platform site and clickNext.

    4. Keep the default Internet Information Services (IIS) site and path (/Citrix/

    AccessPlatform/) and clickNext.

    Note: The authentication service URL must use HTTPS, point to an

    FQDN and not an IP address, and the FQDN must match the certificate

    bound to the virtual server on the Access Gateway.

    5. Select Local file for the configuration source and clickNext.

    6. Select Use built-in authentication or Advanced Access Control for the

    authentication settings, clickNext twice, and clickFinish.

    When you clickFinish, the Specify Initial Configurationwizard starts. The

    following procedure configures the settings for Advanced Access Control.

    To configure settings for Advanced Access Control

    1. Click Next, enter the settings for the server farm, and clickNext.

  • 8/2/2019 AGEE XA XD Integration

    22/70

    22 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    2. Select Remote and clickNext.

    3. Select Using the Advanced Access Control, type the authenticationservice path, clickNext and clickFinish.

    An example authentication service path is the HTTPS address of the Access

    Gateway virtual server, such as:

    https://access.company.com/CitrixAuthService/AuthService.asmx

    If multiple virtual servers are configured on the Access Gateway, any one of the

    configured virtual servers can provide the authentication service for the Web

    Interface.

    If there is a problem with this configuration, you might need to edit the HOSTS

    file on the server running the Web Interface. The file is located at

    %systemroot%\WINDOWS\system32\drivers\etc\hosts. Add the following for the

    Access Gateway FQDN and IP address using the format:

    IP address FQDN

    For example, type:

    192.168.100.3 access.company.com

    After editing the HOSTS file, save and close the file. To verify that you can reach

    the virtual server by name, at a command prompt on the server running the Web

    Interface, type

    ping FQDN

    You will receive a response from the server.

    After the Web Interface site is created, configure the Web Interface settings inCitrix Presentation Server 4.5.

    Configuring Web Interface 4.5 Settings for theAccess GatewayAfter the Web Interface site is created, configure the Web Interface settings using

    the Access Management Console.

    To configure the Web Interface on Citrix Presentation Server 4.5

    1. Click Start > Programs > Citrix > Management Consoles> Access

    Management Console.

    2. In the left pane of the Access Management Console, clickCitrix

    Resources, clickConfiguration Tools, and then clickWeb Interface.

    3. Right-click the Web Interface site and then clickManage secure client

    access >Edit DMZ settings.

    4. In the Client address table, select the Default entry and then clickEdit.

  • 8/2/2019 AGEE XA XD Integration

    23/70

    Chapter 4 Setting Up a Web Interface Site to Work with the Access Gateway 23

    5. In Access Method, select Gateway Direct and clickOK twice.

    6. Right-click the Web Interface site and select Manage secure client access> Edit Gateway settings.

    7. Under Gateway Server, in Address (FQDN), type the Access Gateway

    FQDN. This must be the same name that is used on the Access Gateway

    certificate.

    8. In Port, type the port number. The default is 443.

    9. To enable session reliability, clickEnable session reliability.

    10. Under Secure Ticket Authority, clickAdd.

    11. In Enter the Secure Ticket Authority URL, type the name of the master

    server running the XML Service and clickOK.

    For example, type http://xenappsrv01/Scripts/CtxSta.dll.

    Creating a Web Interface Site in XenApp 5.0 or CitrixXenDesktop 2.1

    When you create a Web Interface site in XenApp 5.0 or XenDesktop 2.1, you can

    configure user logon using either a Web browser, Citrix XenApp Plug-ins, or

    Citrix Desktop Receiver. You can use the following procedure to create multiple

    Web Interface sites using the Access Management Console.

    To create the Web Interface site on a XenDesktop server, you must install the Web

    Interface Access Management Console on the XenDesktop server.

    To create a Web Interface Site in XenApp 5.0 or XenDesktop 2.1

    1. Click Start > All Programs > Citrix > Management Console > Access

    Management Console.

    If prompted, configure and run discovery.

    2. Under Citrix Resources > Configuration Tools, clickWeb Interface, and

    under Common Tasks, clickCreate site.

    3. Select one of the following and clickNext:

    XenApp Web. Users log on to the Web Interface using a Web

    browser.

    If you are creating a Web Interface site on XenDesktop, select this

    option. Users log on using Citrix Desktop Receiver.

    XenApp Services. Users log on using Citrix XenApp Plug-ins. The

    Desktop Receiver is not supported if this option is selected.

  • 8/2/2019 AGEE XA XD Integration

    24/70

    24 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    4. Keep the default Internet Information Services (IIS) site and path.

    If you selected XenApp Web in Step 3, the site path is /Citrix/XenApp andcontinue with Step 5.

    If you selected XenApp Services, the site path is /Citrix/PNAgent and click

    Next to complete the configuration.

    Note: If there are any pre-existing XenApp Web sites or XenApp

    Services that use the default path, an approporate increment is added to

    distinguish the new site.

    5. In Specify where user authentication takes place, select one of the

    following:

    At Web Interface to have users authenticate using the Web Interface.

    Select this option if the Web Interface is deployed as a standalone

    server parallel to the Access Gateway in the DMZ.

    At Access Gateway to have users authenticate using the Access

    Gateway appliance.

    If you select this option, the Access Gateway authenticates users and

    initiates single sign-on to the Web Interface if it is configured on the

    appliance. In addition, if SmartAccess is configured on the Access

    Gateway, this setting enables it in XenApp or XenDesktop.

    6. In Authentication service URL, type the Web address to the AccessGateway authentication service URL, such as https://access.company.com/

    CitrixAuthService/AuthService.asmx, and clickNext.

    You receive a summary screen showing your settings. ClickNext to create the

    Web Interface site. When the site is successfully created, you are then prompted

    to configure the remaining settings in the Web Interface. Follow the instructions

    in the wizard to complete the configuration.

    Configuring the Web Interface for the Access GatewayAfter you create the Web Interface site, you can use the Access Management

    Console to configure settings for the Access Gateway.

    To configure Access Gateway settings for the Web Interface on XenApp 5.0or XenDesktop 2.1

    1. Click Start > Programs > Citrix > Management Consoles> Access

    Management Console.

  • 8/2/2019 AGEE XA XD Integration

    25/70

    Chapter 4 Setting Up a Web Interface Site to Work with the Access Gateway 25

    2. In the left pane of the Access Management Console, clickCitrix

    Resources, clickConfiguration Tools, clickWeb Interface and then click

    the Web Interface site.

    3. Under Common Tasks, clickManage secure client access and clickEdit

    secure client access settings.

    4. In Specify Access Methods, select the Default entry and clickEdit.

    5. In Access Method, select Gateway direct, clickOK and clickNext.

    6. In Address (FQDN), type the Access Gateway FQDN.

    This must be the same FQDN that is used on the Access Gateway

    certificate.

    7. In Port, type the port number. The default is 443.

    8. To enable session reliability, clickEnable session reliability and click

    Next.

    9. Under Secure Ticket Authority URLs, clickAdd.

    10. In Secure Ticket Authority URL, type the name of the master server

    running the XML Service on XenApp or the Desktop Delivery Controller,

    clickOK and clickFinish.

    For example, type http://xenappsrv01/Scripts/CtxSta.dll.

    After you configure the settings in the Web Interface, configure the Access

    Gateway.

    Adding a XenApp and XenDesktop Farm to a Single SiteIf you are running XenApp and XenDesktop, you can add both to a single Web

    Interface site using the Access Management Console. This allows you to use the

    same Secure Ticket Authority on either the XenApp server or Desktop Delivery

    Controller.

    Note: If the server farms are in different domains, you must establish two-way

    trust between the domains.

  • 8/2/2019 AGEE XA XD Integration

    26/70

    26 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    To add XenApp and Desktop Delivery Controller to the same Web Interfacesite

    1. Click Start > Programs > Citrix > Management Consoles> Access

    Management Console.

    2. Expand Citrix Resources > Configuration Tools > Web Interface.

    3. Click a Web Interface site and under Common Tasks, clickManage

    server farms.

    4. In the Manage Server Farms dialog box, clickAdd.

    5. Complete the settings for the server farm and clickOK twice.

    Routing Client Connections Through the AccessGatewayIn XenApp and XenDesktop, you can configure the servers to only accept

    connections that are routed through the Access Gateway. You use the Access

    Management Console to modify the server properties for XenApp and Desktop

    Delivery Controller.

    To configure Access Gateway-only user connections in XenApp or DesktopDeliver Controller

    1. Click Start > Programs > Citrix > Management Consoles> Access

    Management Console.

    2. Do one of the following:

    In the Desktop Deliver Controller, expand Citrix Resources >

    Desktop Delivery Controller and click a server farm.

    In XenApp 4.5, expand Citrix Resources > Presentation Server and

    click on a server farm.

    In XenApp 5.0, expand Citrix Resources > XenApp and click on a

    server farm.

    3. Under Common Tasks, clickModify farm properties and clickModify

    all properties.

    4. In the Farm Properties dialog box, under Properties > Farm-wide, clickConnection Access Controls.

    5. Click Citrix Access Gateway connections only and clickOK.

  • 8/2/2019 AGEE XA XD Integration

    27/70

    CHAPTER 5

    Configuring the Access Gateway toCommunicate with the WebInterface

    The Access Gateway can be configured to communicate with the Web Interface

    running on Citrix XenApp and Citrix XenDesktop. To do so, configure a virtual

    server on the Access Gateway and bind a signed server certificate and

    authentication, session, preauthentication and post-authentication policies to the

    virtual server. The Access Gateway uses the virtual server IP address to route

    client connections to the Web Interface.

    The Published Applications Wizard allows you to configure the Access Gateway

    to route client connections to the Web Interface. The Secure Ticket Authority

    (STA) is used for client connections.

    In This Chapter Using the Access Gateway Policy Manager

    Creating and Configuring a Virtual Server

    Configuring Policies for Published Applications and Desktops

    Using the Published Applications Wizard

    Configuring the Secure Ticket Authority on the Access Gateway

    Using the Access Gateway Policy ManagerThe Access Gateway Policy Manager is a convenient tool that allows you to

    configure policies and then bind them to entities on the Access Gateway. The

    entities include users, groups, virtual servers and global settings.

    To start the Access Gateway Policy Manager

    1. In the configuration utility, in the navigation pane, clickAccess Gateway.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    28/70

    28 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    2. In the details pane, under Policy Manager, clickChange group settings

    and user permissions.

    In the Access Gateway Policy Manager, there are three panes. The left pane,

    Configured Policies / Resources, contains the configured policies that are bound

    globally and to users, groups, virtual servers. The center pane, Available Policies

    / Resources, is where you configure the policies and profiles. The right pane is a

    task pane that allows you to create, modify, and bind policies.

    Creating and Configuring a Virtual ServerA virtual server consists of a combination of an IP address, port, and protocol that

    accepts incoming traffic.Virtual servers contain the connection settings for when

    users log on to the appliance. Virtual servers can be configured to use the

    following:

    Certificates

    Authentication

    Policies

    Bookmarks

    IP pooling

    You can also configure the Access Gateway in a double-hop DMZ deployment,

    and configure the Secure Ticket Authority.

    If you ran the Access Gateway wizard, a virtual server is configured during the

    wizard. You can configure additional virtual servers using either the Access

    Gateway Policy Manager or the virtual servers node in the navigation pane of the

    configuration utility. If you use the Access Gateway Policy Manager, you can

    create a virtual server and then bind a certificate to the virtual server. When the

    virtual server is created in the Access Gateway Policy Manager, you can also bind

    the following:

    Preauthentication policies

    Authentication policies

    Auditing policies

    Session policies

    Traffic policies

    Clientless access policies

    Bookmarks

  • 8/2/2019 AGEE XA XD Integration

    29/70

    Chapter 5 Configuring the Access Gateway to Communicate with the Web Interface 29

    Intranet applications

    Access Gateway proxy (double-hop configuration)

    IP pooling (also known as intranet IPs)

    Secure Ticket Authority

    If you want users to log on and use a specific authentication type, such as

    RADIUS, you can configure a virtual server and assign it a unique IP address.

    When users log on, they are directed to the virtual server and then are asked for

    their RADIUS credentials.

    You can also configure how users log on to the Access Gateway. You can use a

    session policy to configure the type of client software, the access method, and the

    home page users see after logging on.

    You can add, modify, enable or disable, and remove virtual servers using the

    Access Gateway Policy Manager or the virtual server node in the navigation pane

    of the configuration utility.

    To create a virtual server using the Access Gateway Policy Manager

    1. In the configuration utility, in the navigation pane, clickAccess Gateway.

    2. In the details pane, under Policy Manager, clickChange group settings

    and user permissions.

    3. Under Configured Policies / Resources, clickVirtual Servers.

    4. Under Related Tasks, clickCreate new virtual server.

    5. Configure the settings, clickCreate and clickClose.

    To create a virtual server using the configuration utility

    1. In the configuration utility, in the navigation pane, expand Access Gateway

    and clickVirtual Servers.

    2. In the details pane, clickAdd.

    3. Configure the settings you want, clickCreate and clickClose.

    Configuring Policies for Published Applications and

    DesktopsTo establish communication with XenApp and XenDesktop servers, you need to

    configure the Access Gateway to recognize the servers. You can configure the

    settings globally or using policies that are bound to users, groups, or virtual

    servers.

  • 8/2/2019 AGEE XA XD Integration

    30/70

    30 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    To configure the Web Interface globally on Access Gateway EnterpriseEdition

    1. In the configuration utility, in the navigation pane, expand Access Gateway

    and clickGlobal Settings.

    2. In the details pane, under Settings, clickChange global settings.

    3. In the Global Access Gateway Settings dialog box, on the Published

    Applications tab, next to ICA Proxy, select ON.

    4. Next to Web Interface Address, type the Web address of the Web Interface

    and clickOK.

    You can configure a session policy and bind it to a virtual server to limit access to

    the Web Interface.

    Note: Citrix recommends using the Access Gateway Policy Manager to create a

    session policy for the Web Interface and then bind it to a virtual server.

    To configure a session policy for the Web Interface

    1. In the Access Gateway Policy Manager, under Available Policies /

    Resources, clickSession Policies.

    2. Under Related Tasks, clickCreate new session policy.

    3. In the Create Session Policy dialog box, in Name, type a name for the

    policy.

    4. Next to Request Profile, clickNew.

    5. In the Create Session Profile dialog box, in Name, type a name for the

    profile.

    6. On the Published Applications tab, next to ICA Proxy, clickOverride

    Global and select ON.

    7. Next to Web Interface Address, clickOverride Global, type the Web

    address of the Web Interface and clickCreate.

    8. In the Create Session Policy dialog box, next to Named Expressions,

    select General, select True value, clickAdd Expression, clickCreate,

    and clickClose.

    When the session policy is created, bind the policy to a virtual server.

  • 8/2/2019 AGEE XA XD Integration

    31/70

    Chapter 5 Configuring the Access Gateway to Communicate with the Web Interface 31

    To bind a session policy to a virtual server

    1. In the Access Gateway Policy Manager, under Configured Policies /Resources, expand Virtual Servers and then expand the virtual server

    node.

    2. Under Available Policies / Resources, clickSession Policies, select the

    policy and drag it to Session Policies in the virtual server node.

    Using the Published Applications WizardTo configure the Access Gateway with the Web Interface, you need the following

    information:

    IP addresses of servers running Citrix XenApp or Citrix XenDesktop

    Fully qualified domain name of the server running the Web Interface

    Virtual server configured on the Access Gateway

    Session policy configured for SmartAccess

    IP addresses of additional servers running the Web Interface if you are

    configuring Web Interface failover

    To run the Published Applications Wizard

    1. In the configuration utility, in the navigation pane, clickAccess Gateway.

    2. In the details pane, under Getting Started, clickPublished applicationswizard.

    3. Click Next and follow the instructions in the wizard.

    The Published Applications Wizard also allows you to configure and activate the

    Secure Ticket Authority (STA) from within the wizard. When you complete the

    Published Applications Wizard, the settings are bound globally.

    Configuring the Secure Ticket Authority on the AccessGateway

    The Secure Ticket Authority is responsible for issuing session tickets in responseto connection requests for published applications on XenApp and published

    desktops on XenDesktop. These session tickets form the basis of authentication

    and authorization for access to published resources.

    The STA is configured on the Access Gateway using one of three methods:

  • 8/2/2019 AGEE XA XD Integration

    32/70

    32 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Global settings in the configuration utility

    Published Applications Wizard

    Access Gateway Policy Manager.

    You can bind the STA globally or to virtual servers. You can also add multiple

    servers running the STA when you configure a virtual server.

    If you are securing communications between the Access Gateway and the STA,

    make sure a server certificate is installed on the server running the STA.

    To configure the Secure Ticket Authority globally or with a virtual server

    1. In the Access Gateway Policy Manager, under Configured Policies /

    Resources, expand either Access Gateway Global or Virtual Servers.

    If you selected Virtual Servers, expand a node and select a server.

    2. Click STA Servers.

    3. Under Related Tasks, clickBind new STA server.

    4. In the STA Server dialog box, in URL, type the IP address or FQDN of the

    server running the STA and clickCreate.

    Note: You can add more than one server running the STA to the list. The

    STAs that are listed in the Web Interface must match those that are

    configured on the Access Gateway. If you are configuring multiple STAs,

    do not use load balancing between the Access Gateway and the servers

    running the STA.

    You can remove a STA by unbinding the STA either globally or from a virtual

    server.

    To remove a Secure Ticket Authority server

    1. In the Access Gateway Policy Manager, under Configured Policies /

    Resources, expand either Access Gateway Global or Virtual Servers and

    expand a virtual server node.

    2. Under STA Servers, click a STA and under Related Tasks, clickUnbind

    STA server.

  • 8/2/2019 AGEE XA XD Integration

    33/70

    CHAPTER 6

    Configuring SmartAccess

    You can use SmartAccess with XenApp and XenDesktop to intelligently deliver

    published applications and desktops to users.

    SmartAccess allows you to control access to published applications and desktopson a server through the use of Access Gateway session policies. This permits the

    use of preauthentication and post-authentication checks as a condition for access

    to published resources, along with other factors. These include anything you can

    control with a XenApp or XenDesktop policy, such as printer bandwidth limits,

    client drive mapping, client clipboard, client audio, and client printer mapping.

    Any XenApp or XenDesktop policy can be applied based on whether or not users

    pass an Access Gateway check.

    Access Gateway can deliver XenDesktop using the same options that are

    available with Web Interface, ICA proxy access, clientless access, and Access

    Gateway access.

    This functionality is achieved by integrating Access Gateway Enterprise Editioncomponents with the Web Interface and XenApp or XenDesktop. This provides

    advanced authentication and an access control option to the Web Interface. For

    more information about the Web Interface, see the Web Interface Administrators

    Guide.

    Remote connectivity to a server farm does not require the Access Gateway Plug-

    in. Users connect using Citrix XenApp Plug-ins. For connections to published

    desktops, users can use Citrix Desktop Receiver. Users can use the Access

    Gateway Plug-in to log on and receive their published applications and desktops

    using the Access Interface, which is the default home page for the Access

    Gateway.

    Note: Installation of either the Desktop Receiver or the Desktop ReceiverEmbedded Edition on the same computer as Citrix XenApp Plug-ins (client-side

    software for XenApp) is not supported. If you want your users to be able to access

    both virtual desktops and virtual applications from the same computer, Citrix

    recommends installing XenApp Plug-ins on the virtual desktops that you create

    with XenDesktop. This allows your virtual desktops to receive virtual

    applications.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    34/70

    34 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    In This Chapter

    How SmartAccess Works for XenApp and XenDesktop

    Configuring XenApp Policies and Filters

    Configuring Client Device Mapping on XenApp

    Enabling XenApp as a Quarantine Access Method

    Configuring XenDesktop 2.1 for SmartAccess

    Monitoring ICA Connections

    How SmartAccess Works for XenApp and XenDesktopTo configure SmartAccess, you need to configure Access Gateway settings on the

    Web Interface and configure session policies on the Access Gateway. When you

    run the Published Applications Wizard, you can select the session policies you

    created for SmartAccess.

    When a user types the Web address of a virtual server in a Web browser, any

    preauthentication policies that are configured are downloaded to the client device.

    The Access Gateway sends the preauthentication and session policy names to the

    Web Interface as filters. If the policy condition is set to true, the policy is always

    sent as a filter name. If the policy condition is not met, the filter name is not set.

    This allows you to differentiate the list of published applications and desktops

    and the effective policies on a computer running XenApp or XenDesktop based

    on the results of the endpoint analysis.

    The Web Interface contacts the XenApp or XenDesktop server and returns the

    published resource list to the user. Any resources that have filters applied do not

    appear in the users list unless the condition of the filter is met.

    Smart Access endpoint analysis can be configured on the Access Gateway. To

    configure endpoint analysis, create a session policy that enables the ICA proxy

    setting and then configure a client security string. When the session policy is

    configured, you can bind the policy globally and to users, groups, and virtual

    servers.

    When the user logs on, the endpoint analysis policy runs a security check of the

    client device with the client security strings configured on the Access Gateway.

    For example, you want to check for a specific version of Sophos Antivirus. In the

    expression editor, the client security strings appears as:

    client.application.av(sophos).version == 10.0.2

  • 8/2/2019 AGEE XA XD Integration

    35/70

    Chapter 6 Configur ing SmartAccess 35

    After the policy is configured, bind it to a user, group, virtual server, or globally.

    When users log on, the SmartAccess policy check starts and verifies whether or

    not the client device has Version 10.0.2 or higher of Sophos Antivirus installed.

    When the SmartAccess endpoint analysis check is successful, the Web Interface

    portal appears in case of a clientless session; otherwise, the Access Interface

    appears.

    When you are creating a session policy for SmartAccess, the session profile does

    not have any settings configured, creating a null profile. The Access Gateway

    uses the Web Interface URL configured globally for SmartAccess.

    To configure a session policy for SmartAccess

    1. In the Access Gateway Policy Manager, under Available Resource /

    Policies, clickSession Policies.

    2. Under Related Tasks, clickCreate new session policy.

    3. In the Create Session Policy dialog box, in Name, type a name for the

    policy, such as ValidEndpoint.

    4. In Request Profile, clickNew and in Name, type a name for the profile,

    such as Null and clickCreate.

    5. In the Create Session Policy dialog box, create a client security expression,

    clickCreate and clickClose.

    The client security expression is used to differentiate between valid and invalid

    endpoints. This provides different levels of access to published applications or

    desktops based on the results of endpoint analysis.After you create the session policy, bind it either globally or to a virtual server.

    Configuring XenApp Policies and FiltersAfter creating the session policy on the Access Gateway, configure policies on

    the computer running XenApp that are applied to users according to configured

    endpoint analysis.

    To configure Presentation Server 4.5 policies and filters

    1. On the server running XenApp, clickStart > All Programs > Citrix >

    Management Consoles > Access Management Console.

    If prompted, configure and run discovery.

    2. In the left pane, clickPresentation Server > Server Farm > Applications.

    3. Right-click an application, point to Modify application properties, and

    clickModify All Properties.

  • 8/2/2019 AGEE XA XD Integration

    36/70

    36 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    4. Under Properties, clickAdvanced > Access Control.

    5. In the right pane, clickAny connection that meets the following filtersand clickAdd.

    6. In Access Gateway farm, type the name of the Access Gateway virtual

    server.

    7. In Access Gateway filter, type the name of the endpoint session policy and

    clickOK.

    8. In the Application Properties dialog box, clear Allow all other

    connections and clickOK.

    Note: You might receive a warning about enabling the Trust requests

    sent to the XML Service setting. If this occurs, edit the properties ofXenApp and under Properties, clickXML Service. Under XML Service,

    clickTrust requests sent to the XML Service and clickOK.

    To configure XenApp 5.0 policies and filters

    1. On the server running XenApp, clickStart > All Programs > Citrix >

    Management Consoles > Access Management Console.

    If prompted, configure and run discovery.

    2. In the left pane, clickCitrix Resources > XenApp > Server Farm >

    Applications.

    3. Right-click an application, point to Modify application properties, and

    clickModify All Properties.

    4. Under Properties, clickAdvanced > Access Control.

    5. In the right pane, clickAny connection that meets the following filters

    and clickAdd.

    6. In Access Gateway farm, type the name of the Access Gateway virtual

    server.

    7. In Access Gateway filter, type the name of the endpoint session policy and

    clickOK.

    8. In theApplication Properties

    dialog box, click to clearAllow all other

    connections and clickOK.

  • 8/2/2019 AGEE XA XD Integration

    37/70

    Chapter 6 Configur ing SmartAccess 37

    Configuring Client Device Mapping on XenAppYou can also use Access Gateway filters that are applied to policies on a

    computer running XenApp. This allows users access to XenApp capabilities such

    as client drive mapping, printer mapping, or clipboard mapping based on the

    results of the endpoint analysis.

    The Citrix XenApp Plug-ins support mapping devices on client devices so users

    can access external devices within client sessions. Client device mapping

    provides:

    Access to local drives and ports

    Cut-and-paste data transfer between a client session and the local clipboard

    Audio (system sounds and .wav files) playback from the client sessionDuring logon, the client informs the server of the available client drives and COM

    ports. By default, client drives are mapped to server drive letters so they appear to

    be directly connected to the server. These mappings are available only for the

    current user during the current session. They are deleted when the user logs off

    and recreated the next time the user logs on

    After enabling the XML Service, configure policies for client device mapping.

    To enforce client device mapping policies based on SmartAccess filters, create

    two policies on the server:

    A restrictive ICA policy that disables client device mapping and applies to

    all Access Gateway users

    A full ICA policy that enables client device mapping and applies only to

    users who fulfill the endpoint analysis session policy

    Note: The filtered non-restrictive ICA policy must be given a higher

    priority than the restrictive ICA policy so that when it applies to a user, it

    overrides the policy that disables client device mapping.

    Restrictive and non-restrictive policies on XenApp 4.5 are configured using the

    Presentation Server Console. On XenApp 5.0, the policies are configured using

    Citrix XenApp Advanced Configuration.

    To configure a restrictive policy on XenApp 4.5

    1. Open the Presentation Server Console by clicking Start > Programs >

    Citrix > Management Consoles > Presentation Server Console.

    2. In the Presentation Server Console, in the left pane, right-clickPolicies

    and clickCreate Policy.

  • 8/2/2019 AGEE XA XD Integration

    38/70

    38 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    3. In Policy Name, type a name for the policy, such as Restrictive ICA, and

    clickOK.

    4. In the right pane, right-click the restrictive ICA policy and click

    Properties.

    5. Click Client Devices > Resources > Drives > Connection.

    6. In the right pane, under Connection, clickEnabled and clickDo Not

    Connect Client Drives at Logon.

    7. Configure any other settings you want to enforce on invalid client

    connections and clickOK.

    8. Right-click the restrictive ICA policy and select Apply this policy to.

    9. In the left pane, clickAccess Control.

    10. In the right pane, clickFilter based on Access Control, clickApply to

    connections made through Access Gateway, clickAny connection, and

    clickOK.

    To configure a restrictive policy on XenApp 5.0

    1. Click Start > Citrix > Administrative Tools > XenApp Advanced

    Configuration.

    2. In Advanced Configuration, in the left pane, right-clickPolicies and click

    Create Policy.

    3. In Policy Name, type a name for the policy, such as Restrictive ICA, and

    clickOK.4. In the right pane, right-click the restrictive ICA policy and click

    Properties.

    5. Click Client Devices > Resources > Drives > Connection.

    6. In the right pane, under Connection, clickEnabled and clickDo Not

    Connect Client Drives at Logon.

    7. Configure any other settings you want to enforce on invalid client

    connections and clickOK.

    8. Right-click the restrictive ICA policy and select Apply this policy to.

    9. In the left pane, clickAccess Control.

    10. In the right pane, clickFilter based on Access Control, clickApply to

    connections made through Access Gateway, clickAny connection, and

    clickOK.

    After creating the restrictive ICA policy, create a non-restrictive ICA policy.

  • 8/2/2019 AGEE XA XD Integration

    39/70

    Chapter 6 Configur ing SmartAccess 39

    To configure a non-restrictive ICA policy on XenApp 4.5

    1. Open the Presentation Server Console by clicking Start > Programs >Citrix > Management Consoles > Presentation Server Console

    2. In the Presentation Server Console, in the left pane, right-clickPolicies

    and clickCreate Policy.

    3. In Policy Name, type a name for the policy, such as Full ICA, and click

    OK.

    4. In the right pane, right-click the non-restrictive ICA policy and click

    Properties.

    5. Click Client Devices > Resources > Drives > Connection.

    6. In the right pane, under Connection, clickEnabled and clickConnect

    Client Drives at Logon.

    7. Configure any other settings you want to enforce on invalid client

    connections and clickOK.

    8. Right-click the non-restrictive ICA policy and select Apply this policy to.

    9. In the left pane, clickAccess Control.

    10. In the right pane, clickFilter based on Access Control, clickApply to

    connections made through Access Gateway, clickAny connection that

    meets any of the following filters, and clickAdd.

    11. In Access Gateway Farm, type or select the virtual server name.

    12. In Access Gateway filter,type or select a session policy name that isconfigured on the Access Gateway and clickOK twice.

    13. Right-click the non-restrictive policy and clickPriority > Make highest

    priority.

    To configure a non-restrictive ICA policy on XenApp 5.0

    1. Click Start > Citrix > Administrative Tools > XenApp Advanced

    Configuration.

    2. In Advanced Configuration, in the left pane, right-clickPolicies and click

    Create Policy.

    3. In Policy Name, type a name for the policy, such as Full ICA, and click

    OK.

    4. In the right pane, right-click the non-restrictive ICA policy and click

    Properties.

    5. Click Client Devices > Resources > Drives > Connection.

  • 8/2/2019 AGEE XA XD Integration

    40/70

    40 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    6. In the right pane, under Connection, clickEnabled and clickConnect

    Client Drives at Logon.

    7. Configure any other settings you want to enforce on invalid client

    connections and clickOK.

    8. Right-click the non-restrictive ICA policy and select Apply this policy to.

    9. In the left pane, clickAccess Control.

    10. In the right pane, clickFilter based on Access Control, clickApply to

    connections made through Access Gateway, clickAny connection that

    meets any of the following filters, and clickAdd.

    11. In Access Gateway Farm, type or select the virtual server name.

    12. In Access Gateway filter,type or select a session policy name that is

    configured on the Access Gateway and clickOK twice.

    13. Right-click the non-restrictive policy and clickPriority > Make highest

    priority.

    Enabling XenApp as a Quarantine Access MethodIf you have endpoint analysis configured on the Access Gateway, users who pass

    an endpoint scan can access all the resources that are configured on the Access

    Gateway. You can put users who fail an endpoint scan in a quarantine group.

    When this occurs, users can access published resources only.

    For example, you created an endpoint analysis scan to check whether or not

    Notepad is running on the client device when users log on. If Notepad is running,

    users can log on using the Access Gateway Plug-in. If Notepad is not running,

    users receive only the list of published applications.

    To configure restricted user access, create a quarantine group on the Access

    Gateway. You create the quarantine group within a session profile and then add

    the profile to a session policy.

    To configure a quarantine group on the Access Gateway

    1. In the configuration utility, in the navigation pane, expand Access Gateway

    > Policies and clickSession.

    2. On the Profiles tab, clickAdd.3. In the Create Session Profile dialog box, in Name, type a name for the

    profile.

  • 8/2/2019 AGEE XA XD Integration

    41/70

    Chapter 6 Configur ing SmartAccess 41

    4. On the Security tab, clickAdvanced.

    5. Under Client Security, clickOverride Global, in Quarantine Group,select a group, and clickOK.

    After this session policy is created, create a new session policy for client security

    within the Security Settings - Advanced dialog box. This is the endpoint

    analysis scan users must pass to log on with the Access Gateway Plug-in. The

    following procedure configures the security expression to check for Notepad.

    To create an endpoint analysis scan

    1. In the Access Gateway Policy Manager, under Available Policies /

    Resources, clickSession Policies.

    2. Under Related Tasks, clickCreate new session policy.

    3. In the Create Session Policy dialog box, in Name, type a name for the

    policy.

    4. Next to Request Profile, clickNew.

    5. In the Create Session Profile dialog box, in Name, type a name for the

    profile.

    6. On the Security tab, clickAdvanced.

    7. In the Security Settings - Advanced dialog box, under Client Security,

    clickOverride Global and clickNew.

    8. In the Create Expression dialog box, next to Match Any Expression,

    clickAdd.9. In Expression Type, select Client Security.

    10. In Component, select Process.

    11. In Name, type notepad.exe, clickOK and clickCreate.

    12. In the Security Settings - Advanced dialog box, in Quarantine Group,

    select the quarantine group, clickOK, and clickCreate.

    13. In the Create Session Policy dialog box, next to Named Expressions,

    select True value, clickAdd Expression, clickCreate, and clickClose.

    After the session policy is created, bind the policy to the quarantine group. When

    both policies are configured and bound to the group, test the results. If Notepad is

    running, users can log on using the Access Gateway Plug-in. If Notepad is not

    running, users can log on with XenApp Plug-ins only.

    For more information about configuring endpoint analysis policies, see the

    Access Gateway Enterprise Edition Administrators Guide.

  • 8/2/2019 AGEE XA XD Integration

    42/70

    42 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Configuring XenDesktop 2.1 for SmartAccessThe Access Gateway enables XenDesktop to deliver secure desktops to remote

    users. XenDesktop can intelligently deliver desktops using the SmartAccess

    capabilities of the Access Gateway. When you create desktop groups using the

    Access Management Console in XenDesktop, you then configure policies and

    filters for access control.

    To configure the Access Gateway to deliver published desktops, you use the same

    options that are available with the Web Interface, ICA proxy access, clientless

    access, and Access Gateway access.

    When you create a session policy using the Published Applications tab, use the

    Web address for the XenDesktop Web Interface site. After creating the policy,

    bind it to a virtual server. Then create a null session profile where settings are not

    configured. The Web Interface configuration is inherited from global settings.

    Configuring SmartAccess in XenDesktop 2.1You can use SmartAccess policies to show and hide desktop groups. When you

    configure settings on XenDesktop, you configure the settings to use the Access

    Gateway virtual server name and the session policy name. Then you configure

    access control to allow connections to meet defined filters. You can also use

    SmartAccess policies

    To configure policies and filters in XenDesktop 2.1

    1. In the Access Gateway Management Console, clickCitrix Resources >

    Desktop Delivery Controller > Desktop Groups.

    2. Right-click the desktop group and clickProperties.

    3. Under Properties > Advanced, clickAccess Control.

    4. Click Allow connections made through Access Gateway Advanced

    Edition (version 4.0 or later).

    5. Click Any connection that meets any of the following filters and click

    Add.

    6. In Access Gateway Farm, type the name of the virtual server on the

    Access Gateway.

    7. In Access Gateway Filter,type the name of the session policy on theAccess Gateway and clickOK twice.

    Configuring SmartAccess on the Access GatewayYou configure SmartAccess on the Access Gateway to access XenDesktop using

    a session policy bound to a virtual server.

  • 8/2/2019 AGEE XA XD Integration

    43/70

    Chapter 6 Configur ing SmartAccess 43

    To configure a session policy for SmartAccess

    1. In the Access Gateway Policy Manager, under Available Resource /Policies, clickSession Policies.

    2. Under Related Tasks, clickCreate new session policy.

    3. In the Create Session Policy dialog box, in Name, type a name for the

    policy, such as XenDesktopPolicy.

    4. In Request Profile, clickNew and in the Create Session Profile dialog

    box in Name, type a name for the profile, such as XenDesktopProfile.

    5. On the Published Applications tab, next to ICA Proxy, clickOverride

    Global and select ON.

    6. In Web Interface Address, clickOverride Global and type the URL to

    the XenDesktop Web Interface site.

    7. In Single Sign-on Domain, clickOverride Global, type the domain name

    and clickCreate.

    8. In the Create Session Policy dialog box, next to Named Expressions,

    select True Value, clickAdd Expression, clickCreate and clickClose.

    You also need to create a null session policy which is bound to the virtual server.

    The session profile does not contain any configuration, making it a null profile. In

    the session policy, add the True Value expression and save the policy.

    When both session policies are created, bind both policies to the virtual server.

    Adding the Desktop Delivery Controller as theSecure Ticket AuthorityTo establish ICA connections with XenDesktop, you add the IP address of the

    Desktop Delivery Controller to the virtual server.

    To configure and bind the Secure Ticket Authority to a virtual server

    1. In the Access Gateway Policy Manager, under Configured Policies /

    Resources, expand Virtual Servers and then expand a virtual server node.

    2. Click STA Servers.

    3. Under Related Tasks, clickBind new STA server.

    4. In the Configure STA Server dialog box, in URL, type the IP address or

    URL of the server running the STA and clickCreate.

  • 8/2/2019 AGEE XA XD Integration

    44/70

    44 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    Monitoring ICA ConnectionsYou can monitor user sessions on your server farm using the ICA Connections

    dialog box. This dialog box provides the following information:

    User name of the person connecting to the server farm

    Domain name of the server farm

    IP address of the client device

    Port number of the client device

    IP address of the server running XenApp or XenDesktop

    Port number of the server running XenApp or XenDesktop

    To open the ICA Connections dialog box

    1. In the configuration utility, in the navigation pane, clickAccess Gateway.

    2. In the details pane, under Monitor Connections, clickICA connections.

  • 8/2/2019 AGEE XA XD Integration

    45/70

    CHAPTER 7

    Configuring Single Sign-On

    Single sign-on allows users to log on once and then access the Web Interface or

    Web applications in the secure network.

    In This Chapter

    Configuring Single Sign-On to the Web Interface

    Configuring Single Sign-On for Citrix XenApp and File Shares

    Configuring Single Sign-On to the Web InterfaceThe Access Gateway can be configured to provide single sign-on to servers in the

    internal network that use Web-based authentication. With single sign-on, you can

    redirect the user to a custom home page, such as a SharePoint site or to the Web

    Interface. You can also configure single sign-on to resources through the Access

    Gateway Plug-in from a bookmark configured in the Access Interface or a Webaddress users type in the Web browser.

    If you are redirecting the Access Interface to a SharePoint site or the Web

    Interface, provide the Web address for the site. When users are authenticated,

    either by the Access Gateway or an external authentication server, users are

    redirected to the specified home page and logged on automatically. User

    credentials are passed transparently to the Web server. If the credentials are

    accepted by the Web server, users are logged on automatically. If the credentials

    are rejected by the Web server, users receive an authentication prompt asking for

    their user name and password.

    You can configure single sign-on to Web applications globally or using a session

    policy.

    To configure single sign-on to Web applications globally

    1. In the configuration utility, in the navigation pane, expand Access Gateway

    and clickGlobal Settings.

    2. In the details pane, under Settings, clickChange global settings.

    http://../document_center.pdf
  • 8/2/2019 AGEE XA XD Integration

    46/70

    46 Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop

    3. In the Global Access Gateway Settings dialog box, on the Client

    Experience tab, clickSingle Sign-on to Web Applications and clickOK.

    To configure single sign-on to Web applications using a session policy

    1. In the Access Gateway Policy Manager, under Available Policies /

    Resources, expand Session Policies and select a policy.

    2. Under Related Tasks, clickModify session policy.

    3. In the Configure Session Policy dialog box, next to Request Profile, click

    Modify.

    4. In the Configure Session Profile dialog box, on the Client Experience tab,

    next to Single Sign-On to Web Applications, clickGlobal Override,

    clickSingle Sign-On to Web Applications, and clickOK.

    Configuring Ports for Single Sign-OnSingle sign-on is attempted only for network traffic where the destination port is

    considered an HTTP port. To allow single sign-on to applications that use a port

    other than port 80 for HTTP traffic, add the other port number(s) on the Access

    Gateway. You can enable multiple ports. The ports are configured globally.

    To define the HTTP port for single sign-on to Web applications

    1. In the configuration utility, in the navigation pane, expand Access Gateway

    > Global Settings.

    2. In the Global Access Gateway Settings dialog box, in the details pane,under Settings, clickChange global settings.

    3. On the Network Configuration tab, clickAdvanced.

    4. In the Network Configuration - Advanced dialog box, under HTTP

    Ports, type the port number, clickAdd, and clickOK twice.

    Note: If Web applications in the internal network use different port numbers,

    type the port number and clickAdd. The HTTP port number must be defined to

    allow single sign-on to Web applications, including the Web Interface.

    Additional Configuration GuidelinesWhen configuring the Web Interface for single sign-on, use the following

    guidelines:

    The Authentication Service URL must begin with https.

  • 8/2/2019 AGEE XA XD Integration

    47/70

    Chapter 7 Configuring Single Sign-On 47

    The server running the Web Interface must trust the Access Gateway

    certificate and be able to resolve the certificate FQDN to the virtual server

    IP address.

    The Web Interface must be able to open a connection to the Access

    Gateway virtual server. Any Access Gateway virtual server can by used for

    this purpose; it does no