DIGIPASS Authentication to Citrix XenDesktop with endpoint protection
|
|
- Tabitha Hodge
- 6 years ago
- Views:
Transcription
1 DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE
2 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility for its accuracy and/or completeness. In no event will VASCO Data Security be liable for damages arising directly or indirectly from any use of the information contained in this document. Copyright Copyright 2010 VASCO Data Security, Inc, VASCO Data Security International GmbH. All rights reserved. VASCO, Vacman, IDENTIKEY, axsguard, DIGIPASS and logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc. and/or VASCO Data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights in the U.S. and other countries. Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners. Integration Guidelines 1 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
3 Table of Contents Disclaimer... 1 Table of Contents Abstract Reader Overview... 4 How SmartAccess Works for XenApp and XenDesktop Problem Description Solution Technical Concept General overview Citrix prerequisites IDENTIFIER prerequisites Citrix Configuration Netscaler Authentication configuration Web Interface configuration IDENTIFIER DMZ Policy configuration Client configuration LDAP Synchronization IDENTIFIER LAN Policy configuration Client configuration LDAP Synchronization DIGIPASS Authentication for IIS basic Citrix CAG login with DIGIPASS Logon DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
4 12 DIGIPASS and User Management DIGIPASS Users Additional functionalities Password change policies DIGIPASS provisioning About VASCO Data Security DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
5 1 Abstract SmartAccess allows to control the users system requesting access to available applications published with Citrix XenAPP through the use of Access Gateway Enterprise policies and filters. This permits the use of endpoint analysis as a condition for application access, along with other factors. This functionality is achieved by integrating Access Gateway Enterprise components with the Web Interface for Citrix XenApp Server, and Citrix XenApp Server. This provides advanced authentication and access control. To protect the user`s identity and the company`s network, the use of static password, the weakest link in security, should be eliminated and replaced by DIGIPASS. DIGIPASS by VASCO provides one-time passwords, which allows the user to logon with a unique time-based password which can only be used once, within a certain time frame. This one-time password replaces the static password stored in Active Directory or any other database. VASCO`s strong authentication DIGIPASS allows the use of DIGIPASS to log-on with a single one-time password to the multiple Citrix environments used in by the SmartAccess scenario. SmartAccess in combination with DIGIPASS offers: - Citrix Online Applications and Desktops provisioning - no user-controlled password - Single Sign On to all sessions - SmartAccess capability, i.e. the ability to influence application properties being connection properties / context 2 Reader This document is a guideline for configuring a partner product with IDENTIFIER or IDENTIKEY Server. For details about the setup and configuration of IDENTIEKEY Server and IDENTIFIER, we refer to the installation and administration manuals of these products. IDENTIFIER is VASCO s appliance which by default runs IDENTIKEY Server by default. Within this document, VASCO Data Security, provides the reader guidelines for the configuration of the partner product with its specific configuration in combination with VASCO Server solutions and DIGIPASS. Any change in the concept might require a change in the configuration of the VASCO Server products. The product name`identifier`will be used throughout the document keeping in mind that it also applies to IDENTIKEY Server. 3 Overview The purpose of this document is to demonstrate how to configure IDENTIFIER and configure DIGIPASS authentication on Citrix Web Interface in a SmartAccess configuration. 4 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
6 For the standard configuration of the SmartAccess configuration we refer to Citrix documentation. For the standard configuration of DIGIPASS integration with CAG/Netscaler/ Web Interface we refer to the DIGIPASS integration guide for Citrix CAG. How SmartAccess Works for XenApp and XenDesktop To configure SmartAccess, you need to configure the Access Gateway settings on the Web Interface and configure session policies on the Access Gateway. When you run the Published Applications Wizard, you can select the session policies you created for SmartAccess. When a user types the web address of a virtual server in a web browser, the configured preauthentication policies are downloaded on to the user s device. The Access Gateway sends the pre-authentication and session policy names to the Web interface as filters. If the policy condition is set to true, the policy is always sent as a filter name. If the policy condition is not met, the filter name is not set. This allows you to differentiate the list of published applications and desktops and the effective policies on a computer running XenApp or XenDesktop based on the results of the endpoint analysis. The Web interface contacts the XenApp or XenDesktop server and returns the published resource list to the user. Any resources that have filters applied to them do not appear in the user s list unless the condition of the filter is met. Endpoint analysis can be configured on the Access Gateway. To configure endpoint analysis, you create a session policy that enables the ICA proxy setting and which configures a client security string. When the session policy is configured, you can link the policy to the entire user base or to users, groups, and virtual servers. When the user logs on, the endpoint analysis policy runs a security check of the client device using the client security strings configured on the Access Gateway. For example, if you want to check for a specific version of anti-virus. The client security string in the expression editor appears as follows: client.application.av.version == After the policy is configured, link it to a user, group, virtual server or the entire user base. When users log-on, the endpoint analyses policy check starts and verifies whether or not the client device has version or higher of the installed antivirus installed. When the endpoint analysis check is successful, the Web Interface portal appears in case the user is running a clientless session; if not, the Access Interface will appear. When you are creating a session policy for endpoint analyses, the session profile does not have any pre-configured settings, creating a null profile. The Access Gateway uses the Web Interface URL configured globally for SmartAccess. 5 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
7 Resources DMZ2 DMZ1 Microsoft Active Directory Services Citrix XenApp Farm Publiek Netwerk Internet End Point Scenario s Citrix Access Gateway Citrix NetScaler Web Interface Web Interface NetScaler Network Load Balancing Virtual Server Figure 1: Overview The basic configuration of Citrix in this SmartAccess configuration is based on authentication with static passwords using existing media (LDAP, RADIUS, local authentication ). VASCO DIGIPASS authentication is by default supported within a Citrix SmartAccess configuration, where the one-time password in combination with the static password is verified (combination of RADIUS and LDAP authentication on Citrix Access Gateway, with SSO to Netscaler and WebInterface) 4 Problem Description To increase the security at a level where it is `no longer allowed` to use any static password, does the standard configuration of Citrix and IDENTIFIER with RADIUS and LDAP verification, not offer the desired results. In this standard solution does the logon screen present 3 fields (user name, static password, OTP). We are seeking for a solution where ONLY the OTP can be used. Working in a SmartAccess configuration, also requires that an OTP is checked in each zone, keeping in mind that the user will enter the OTP only once at initial logon to the CAG and that it is not requesting a second or third logon when SSO authenticates the user on Web Interface. 5 Solution After setting up and configuring the IDENTIFIER appliances within 2 of the 3 Citrix zones, the user only needs the PIN code of his DIGIPASS and the one-time password generated by the DIGIPASS. Additionally we install and configure an IIS agent to support SSO and password management. 6 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
8 Get USR TCP??? Get Credentials TCP 1812 TCP 80/443 TCP 445 NTLM Figure 2: Solution 7 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
9 6 Technical Concept 6.1 General overview The main goal of Citrix CAG is to perform authentication in a secure way to set up a secure SSL VPN connection and retrieve a single sign on to connect to the Web Interface. The use of DIGIPASS, and DIGIPASS solely, makes the setup unique and is very different from the standard 2FA integrations. We describe the setup in separate chapters, describing the setup for each zone. The first zone, DMZ, will be authenticated by using RADIUS. The second zone containing the Citrix Netscaler forwards the credentials which use the Citrix standard configuration. The third zone, LAN, will use a DIGIPASS Pack for Citrix with enhanced functionality interacting with IIS running on the Citrix Web Interface. 6.2 Citrix prerequisites Make sure you have an operational setup of the Citrix SmartAccess configuration using a static password(ldap, edir, AD,..). It is very important this is working correctly before you start implementing the VASCO part. Current configuration: Windows/ Windows 2008R2 Citrix CAG 9.1 Citrix Netscaler 9.1 Citrix XenApp 6.0 Citrix Web Interface 5.3 All support updates for future versions will be available in the DIGIPASS Authentication for Web Interface, downloadable from IDENTIFIER prerequisites We assume, you already installed IDENTIFIER, a test user has been created, a domain has been created, LDAP sync has been configured, DIGIPASS is imported and tested locally within the web administration. Make sure you can synchronize the LDAP users from AD or any other repository. Check the manuals for configuring the LDAP synchronization in IDENTIFIER. The quick start guide of IDENTIFIER helps you to configure these basic features. Throughout this document, we will specify the differences between the IDENTIFIER in the DMZ zone and the IDENTIFIER in the LAN environment. 8 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
10 7 Citrix Configuration Configure CAG, Netscaler and Web Interface according to the standard procedure of Citrix. 7.1 Netscaler Authentication configuration On the Netscaler in the DMZ you configure the authentication to use RADIUS. LDAP will no longer be used here. The DIGIPASS password will be verified locally against the IDENTIFIER in the DMZ. Configure the authentication server on the Netscaler with: the IP address of the IDENTIFIER the shared secret you configured for the client in IDENTIFIER Figure 3: RADIUS config Netscaler Configure the AG server on port 1080/443. On the first-hop appliance, you also need an AG server, an LDAP group extractor and a session policy pointing to the WI. You also need at least one STA bound to the CAG. To support you in this matter, we refer to the SmartAccess Deployment Guide E%208.0%20SmartAccess%20Deployment%20Guide%20Dec% pdf, 9 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
11 7.2 Web Interface configuration Within this SmartAccess configuration we configure the Citrix Web Interface being published by the CAG. Web Interface has to be of the `Authentication at Access Gateway` type in Gateway direct access mode. 8 IDENTIFIER DMZ Go to the IDENTIFIER web administration page, and authenticate with the administrative account created during setup. 8.1 Policy configuration To add a new policy, select Policies Create. Figure 4: Policy configuration (1) There are some policies available by default. You can also create new policies to suit your needs. Those can be independent policies or policies from which you inherit the settings by default or from other policies. We suggest to create a new policy, without inheritance and give it the name `DMZ` 10 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
12 Fill in a policy ID and description. Figure 5: Policy configuration (2) In the policy options configure it to use the right back-end server. This could be the local database, but also active directory or another RADIUS server. This is probably the same as in your default client authentication options before you changed them. Or you use the local database, Windows or you go on to another RADIUS server. In our example we select our newly made DMZ Policy and change it like this: Local auth.: DIGIPASS/Password Back-End Auth.: None (None) Back-End Protocol: None (None) Dynamic User Registration: No (No) Password Autolearn: No (No) Stored Password Proxy: No (No) Windows Group Check: No Check (No Check) After configuring this policy, the authentication will happen locally in the IDENTIFIER User credentials are passed on to the IDENTIFIER which will check these credentials against its local user database and will respond to the client with an Access-Accept or Access-Reject message. 11 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
13 In the Policy tab, click the Edit button, and change the Local Authentication to DIGIPASS/Password. Figure 6: Policy configuration (3) The user details can keep their default settings. 12 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
14 Figure 7: Policy configuration (4) 8.2 Client configuration Now create a new component by right-clicking the Components and choose New Component. Figure 8: Client configuration (1) As component type you choose RADIUS Client. The location is the IP address of the client (Citrix Access Gateway). In the policy field you should find your newly created policy. Fill in the shared secret you entered in the client for the RADIUS options. In our example this was VASCO. Click Create. Figure 9: Client configuration (2) Now the client and the IDENTIFIER are set up. We will now see if the configuration is working. 13 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
15 8.3 LDAP Synchronization Configure the IDENTIFIER LDAP synchronization to retrieve user information from the user repository. The Netscaler can re-route that information towards the LDAP server. TIP: check the Administration guide of the IDENTIFIER. TIP: Logon to the configuration page of the IDENTIFIER to configure LDAP sync. 9 IDENTIFIER LAN Go to the IDENTIFIER web administration page, and authenticate with the administrative account. 9.1 Policy configuration To add a new policy, select Policies Create. Figure 10: Policy configuration (1) There are some policies available by default. You can also create new policies which suit your needs. Those can be independent policies or policies which inherit their settings by default or from other policies. To make things easier, create a new policy, without inheritance and use a practical name. In this configuration we called the policy `LAN` 14 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
16 Fill in a policy ID and description. Choose the option which is most suitable for your situation. If you want the policy to inherit setting from another policy, choose the right policy in the Inherits From list. Otherwise leave this field to None. In this example we chose not to inherit. Figure 11: Policy configuration (2) After configuring this policy, the authentication will happen locally in the IDENTIFIER and the user`s LDAP credentials will be verified against AD. User credentials are passed on to the IDENTIFIER, it will check these credentials against its local user database it also checks the AD password and will respond to the client with an Access-Accept or Access-Reject message. The client in the LAN will be the IIS on which we installed an agent. This agent is a type of middleware between IIS and IDENTIFIER. 15 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
17 In the Policy tab, click the Edit button, and change the settings to Local auth.: DIGIPASS/Password Back-End Auth.: If Needed Back-End Protocol: Mircrosoft AD(LDAP) Figure12: Policy configuration (3) In the User tab, click the Edit button, and change the settings to Dynamic User Registration: Password Autolearn: Stored Password Proxy: Default Domain: Windows Group Check: No Yes Yes enter the name of your domain No Check Figure13: Policy configuration (4) 16 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
18 9.2 Client configuration Create a new component by right-clicking the Components and choose New Component. During setup of the DIGIPASS Citrix Web Interface, an administration program, as client type is required to allow, the creation of an IIS Module client. Select for Client Type Administration Program Location IP address of the IIS server running Web Interface Policy ID IDENTIKEY Administration Logon Protocol ID SEAL Figure14: Client Configuration During the setup of the DIGIPASS for Citrix Web Interface, allow the creation of the IIS Module component. 9.3 LDAP Synchronization Configure the IDENTIFIER LDAP synchronization to retrieve user information from the user repository. In this zone, we sync directly with AD whereas in the DMZ the Netscaler forwarded the requests. TIP: check the Administration guide of the IDENTIFIER. TIP: Logon to the configuration page of the IDENTIFIER to configure LDAP sync. 17 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
19 10 DIGIPASS Authentication for IIS basic Check the DIGIPASS Authentication for IIS basic installation guide for installation instructions. This DIGIPASS installer has to be installed on the server running Citrix Web Interface. Once the DIGIPASS Authentication for IIS Basic is installed, open via Start >All Programs>VASCO>DIGIPASS Authentication for IIS basic>digipass Authentication for IIS basic configuration Select Tracing > select Full Tracing. The tracing might help you checking the log files. Figure15: DIGIPASS Authentication for IIS Basic Configuration 18 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
20 Select Connections > the connections should have been configured already during the setup. The connection refers to the IP address of the authentication server being the IDENTIFIER. If set correctly, no changes required. Select Authentication > Select HTTP Header Filtering Check enabled Base URL: Enter the path to the Citrix logon page being login.aspx Select Header Fields > enter within the User Name field the value `user`, enter within the Password field the value `password` Select Apply and accept to restart the IIS service The DIGIPASS IIS basic configuration is completed. 11 Citrix CAG login with DIGIPASS 11.1 Logon For user and DIGIPASS assignment, check section 12 in this document. To start the test, browse to the public IP address or hostname of the CAG. In our example this is Enter your Username and PIN and DIGIPASS Password (one-time password) and click the Logon button. Figure 2: Response Only If all goes well, you will be authenticated and be directed to the Citrix Web Interface Portal publishing your resources. 19 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
21 12 DIGIPASS and User Management 12.1 DIGIPASS The DIGIPASS is delivered with a database file, DPX. This file protected by a transport key, should be loaded on to the IDENTIFIER in the DMZ and once more on to the IDENTIFIER in the LAN. Be sure that the time settings on both IDENTIFIER appliances is configured correctly. It is possible to configure the ntp server address. The DIGIPASS devices, represented by a serial number in the IDENTIFIER, can be assigned manually or automatically. The automated procedures allow user to self-assign a DIGIPASS to their account. It is also possible to automatically assign a DIGIPASS to a user without the need for registration. This auto-assignment is interesting for DIGIPASS Mobile. To provision the DIGIPASS Mobile, see section Users Within this SmartAccess configuration, users will be synchronized automatically by means of LDAP sync. 13 Additional functionalities 13.1 Password change policies The VASCO server products (IDENTIFIER and IDENTIKEY server) provide the tools to update the local database with the password changes. These password updates can be treated at the moment the password is changed or at a later stage. The Password Sync Tool, providing this functionality is available on DIGIPASS provisioning VASCO provides a wide range of hardware and software DIGIPASS devices. The provisioning functionalities within VASCO`s server products, like IDENTIKEY and IDENTIFIER, offer the lowest TCO and a user friendly provisioning of software and hardware DIGIPASS. Check with your VASCO contact to discuss the possibilities. 14 About VASCO Data Security VASCO is a leading supplier of strong authentication and e-signature solutions and services specializing in Internet Security applications and transactions. VASCO has positioned itself as global software company for Internet Security serving customers in more than 100 countries, including several international financial institutions. VASCO s prime markets are the financial sector, enterprise security, e-commerce and e- government. 20 DIGIPASS SSO Authentication to Citrix XenDesktop in High Security Environments
DIGIPASS Authentication for O2 Succendo
DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of
More informationDIGIPASS Authentication for NETASQ
DIGIPASS Authentication for NETASQ With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 19 Disclaimer Disclaimer of Warranties and Limitations of Liabilities
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007 With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 35 Integration Guideline Disclaimer Disclaimer of Warranties
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 36 Disclaimer Disclaimer of Warranties and Limitations
More informationINTEGRATION GUIDE. DIGIPASS Authentication for VMware View
INTEGRATION GUIDE DIGIPASS Authentication for VMware View Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationDIGIPASS Authentication for F5 BIG-IP
DIGIPASS Authentication for F5 BIG-IP With VASCO VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 37 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and
More informationaxsguard Identifier Product Guide Product Guide axsguard AXSGuard ConfigurationTool
Product Guide axsguard AXSGuard ConfigurationTool 0 2009 Product Guide axsguard Identifier axsguard Identifier axsguard Identifier DIGIPASS ConfigurationTool v1.5 0.1 axsguard Identifier Product Guide
More informationDIGIPASS Authentication for Citrix Access Essentials Web Interface
DIGIPASS Authentication for Citrix Access Essentials Web Interface With VASCO Digipass Pack for Citrix DIGIPASS Authentication for Citrix Access Essentials - Integration Guideline V1.0 2006 VASCO Data
More informationCitrix StoreFront 2.0
White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationAuthlogics Forefront TMG and UAG Agent Integration Guide
Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The
More informationAccess Gateway 9.3, Enterprise Edition
Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationCNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-250 Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions Version: Demo QUESTION NO: 1 Citrix 1Y0-250 Exam A company uses various pre-approved user devices
More informationIntegration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationNetScaler Gateway 10.5
NetScaler Gateway 10.5 Jun 26, 2014 About This Release Key Features What's New Known Issues Compatibility with Citrix Products System Requirements NetScaler Gateway Plug-in System Requirements Endpoint
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationCitrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ]
s@lm@n Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] Question No : 1 Scenario: An administrator needs to deliver production
More informationNetScaler Radius Authentication. Integration Guide
NetScaler Radius Authentication Integration Guide Copyright 2018 Crossmatch. All rights reserved. Specifications are subject to change without prior otice. The Crossmatch logo and Crossmatch are trademarks
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1
More informationReceiver for BlackBerry 2.2
Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...
More informationApp Orchestration 2.6
Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To
More informationUse Digipass two-factor authentication
DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationNetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led
NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course
More informationModify these field values (right-click and select Fields) to change text throughout the document:
Modify these field values (right-click and select Fields) to change text throughout the document: NOTE: Diagrams may appear or disappear depending on these field settings so BE CAREFUL adding and removing
More information4TRESS FT2011 Out-of-Band Authentication and Juniper Secure Access
4TRESS FT2011 Out-of-Band Authentication and Juniper Secure Access RADIUS Channel Integration Handbook Document Version 2.2 Released May 2013 hidglobal.com Table of Contents List of Figures... 3 1.0 Introduction...
More informationAzure MFA Integration with NetScaler
Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class
More informationEntrust GetAccess 7.0 Technical Integration Brief for IBM WebSphere Portal 5.0
Entrust GetAccess 7.0 Technical Integration Brief for IBM WebSphere Portal 5.0 November 2004 www.entrust.com 1-888-690-2424 Entrust is a registered trademark of Entrust, Inc. in the United States and certain
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationVACMAN Controller. HSM Integration Guide - White Paper. Revision 4.0
VACMAN Controller HSM Integration Guide - White Paper Revision 4.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties,
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationSteel-Belted RADIUS. Digipass Plug-In for SBR. SBR Plug-In SBR. G etting Started
Steel-Belted RADIUS Digipass Plug-In for SBR SBR Plug-In SBR Steel-Belted RADIUS G etting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities
More informationPrerequisites CNS-220 Citrix NetScaler Essentials and Traffic Management
CNS-221 Citrix NetScaler Unified Gateway Learn the skills required to configure and manage NetScaler Gateway and Unified Gateway features, including how to implement Gateway components including NetScaler
More informationaxsguard Gatekeeper PPTP How To 1.7
axsguard Gatekeeper PPTP How To 1.7 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is the axsguard Gatekeeper? 1.4. About VASCO 2. General
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationIntegration Guide. SafeNet Authentication Service. Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS
SafeNet Authentication Service Integration Guide Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationCreation date: 19/03/2010 Last Review: 08/06/2010 Revision number: 3
KB 110064 How To install a Citrix or OWA Filter with axsguard Identifier? Creation date: 19/03/2010 Last Review: 08/06/2010 Revision number: 3 Document type: How To Security status: EXTERNAL Summary This
More informationIntegration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationOne Identity Starling Two-Factor Desktop Login 1.0. Administration Guide
One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 1Y0-250 Title : Implementing Citrix NetScaler 10 for App and Desktop Solutions Vendor
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0
RSA SECURID ACCESS Implementation Guide Citrix 12.0 Peter Waranowski, RSA Partner Engineering Last Modified: February 20 th, 2018 Table of Contents Table of Contents...
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationSecure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security.
Secure your business Use DIGIPASS two-factor authentication S E C U R E D PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l ic K E Y I N F R A S T R U C T U R E The world s leading software company
More informationHySecure Quick Start Guide. HySecure 5.0
HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More information4TRESS AAA. Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook. Document Version 2.3 Released May hidglobal.
4TRESS AAA Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook Document Version 2.3 Released May 2013 hidglobal.com Table of Contents List of Figures... 3 1.0 Introduction...
More informationSurePassID Local Agent Guide SurePassID Authentication Server 2016
SurePassID Local Agent Guide SurePassID Authentication Server 2016 SurePassID Local Agent Guide Revision: 03 10 2016 You can find the most up-to-date technical documentation at: http://www.surepassid.com
More informationvisionapp Workspace Management 2008 (vwm)
2008 (vwm) Value-Add to Citrix Products Product Information Head Office Frankfurt a.m. (D) Helfmann-Park 2 65760 Eschborn phone: +49-69-79583-0 www.visionapp.com Office London (UK) Office Washington (US)
More informationIntegration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationForeScout CounterACT. Configuration Guide. Version 4.1
ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported
More informationDeploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3
Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationHow to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00
Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version
More informationInstallation Guide Worksoft Certify
Installation Guide Worksoft Certify Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Installation Guide Version 9.0.3 Copyright 2017 by Worksoft,
More informationRelease Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues... 6 Release Purpose SonicOS 6.1.1.4 is a maintenance
More informationTable of Contents 1 Citrix Access Gateway 5 VPX Introduction...1
Table of Contents 1 Citrix Access Gateway 5 VPX...1 1.1 Introduction...1 2 Citrix Access Gateway Access Controller 5.0...2 3 Citrix Access Gateway Advanced 4.x...3 4 Introduction...4 5 Prerequisites...5
More informationGuide to Deploying NetScaler as an Active Directory Federation Services Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationVMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018
VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3
More informationIntegration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationStoreFront :47:53 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
StoreFront 2.0 2013-06-30 15:47:53 UTC 2013 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents StoreFront 2.0... 5 About this release... 6 Known issues... 9 System
More informationDeployment Guide. ICA Proxy for Citrix Receiver with SMS Authentication. Access Gateway Enterprise Edition XenApp XenDesktop
Mobile Device Deployment Guide ICA Proxy for Citrix Receiver with SMS Authentication Access Gateway Enterprise Edition XenApp XenDesktop www.citrix.com Table of Contents Introduction...3 Solution Requirements...4
More informationCitrix NetScaler Administration Training
Citrix NetScaler Administration Training Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1 NetScaler Overview
More informationBIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1
BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationPolycom RealPresence Resource Manager System, Virtual Edition
Getting Started Guide 8.3.0 December 2014 3725-72114-001B Polycom RealPresence Resource Manager System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationUnderstanding of basic networking concepts (routing, switching, VLAN, firewall functionality)
Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based
More informationAppScaler SSO Active Directory Guide
Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
More informationThis Readme describes the NetIQ Access Manager 3.1 SP5 release.
NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationCisco Unified Communications Domain Manager manual configuration
Cisco Unified Communications Domain Manager manual configuration This section describes how to manually configure Unified Communications Domain Manager with customer onboarding provisioning data. This
More informationImplementation Guide for protecting Juniper SSL VPN with BlackShield ID
Implementation Guide for protecting Juniper SSL VPN with BlackShield ID Copyright Copyright 2011, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationIntegration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationNetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi
NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for
More informationGiovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security
Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate
More informationPass Citrix 1Y0-306 Exam
Pass Citrix 1Y0-306 Exam Number: 1Y0-306 Passing Score: 800 Time Limit: 120 min File Version: 35.7 http://www.gratisexam.com/ Pass Citrix 1Y0-306 Exam Exam Name: Citrix Access Gateway 4.2 with Advanced
More informationISA 2006 and OWA 2003 Implementation Guide
ISA 2006 and OWA 2003 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with CA SiteMinder
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with CA SiteMinder Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc.
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-A04 Title : Gateway 8.1.Enterprise Edition: Administration Vendors :
More informationDell One Identity Cloud Access Manager 8.0. Overview
Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDeploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
More informationSafeNet Authentication Client
SafeNet Authentication Client All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationBIG-IP Access Policy Manager : Portal Access. Version 12.1
BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7
More informationDeploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
More informationQuantum Policy Suite Subscriber Services Portal 2.9 Interface Guide for Managers
Quantum Policy Suite Subscriber Services Portal 2.9 Interface Guide for Managers Version 5.5 August 31, 2013 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone
More informationApp Orchestration 2.0
App Orchestration 2.0 Getting Started with Citrix App Orchestration 2.0 Prepared by: Jenny Berger Commissioning Editor: Erin Smith Version: 1.0 Last Updated: April 4, 2014 Page 1 Contents Welcome to App
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationIntegrate Citrix NetScaler
Publication Date: December 08, 2016 Abstract This guide helps you in configuring Citrix NetScaler and EventTracker to receive Citrix NetScaler events. You will find the detailed procedures required for
More information