Symantec VIP. Integration Guide for Citrix NetScaler

Similar documents
Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview. Remote Access Integration Architecture

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Symantec Ghost Solution Suite Web Console - Getting Started Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Enterprise Vault

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Enterprise Vault

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Veritas Desktop and Laptop Option Mac Getting Started Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Enterprise Vault Requesting and Applying an SSL Certificate and later

Symantec Enterprise Vault

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017

Veritas System Recovery 18 Management Solution Administrator's Guide

Symantec Protection Center Getting Started Guide. Version 2.0

NetScaler Radius Authentication. Integration Guide

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Veritas Enterprise Vault Guide for Mac OS X Users 12.2

Partner Management Console Administrator's Guide

Veritas Desktop and Laptop Option 9.2

Veritas Backup Exec Migration Assistant

Azure MFA Integration with NetScaler

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas SaaS Backup for Office 365

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3

Altiris Software Management Solution 7.1 from Symantec User Guide

Sentry SSO with Netscaler

Veritas NetBackup OpenStorage Solutions Guide for Disk

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013

Symantec ediscovery Platform

Enterprise Vault Guide for Outlook Users

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Enterprise Vault.cloud Journaling Guide

Security Content Update Release Notes for CCS 12.x

SafeNet Authentication Service

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Veritas SaaS Backup for Salesforce

Veritas Backup Exec Quick Installation Guide

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

Veritas ediscovery Platform

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

PGP Viewer for ios. Administrator s Guide 1.0

Symantec Workflow 7.1 MP1 Release Notes

Precise Custom Portal

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Access Enterprise Vault Solutions Guide

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

PGP Viewer for ios. User s Guide 1.0

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas Deployment Manager User's Guide

Veritas NetBackup Appliance Security Guide

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Veritas CommandCentral Enterprise Reporter Release Notes

Security Content Update Getting Started Guide (Version: CCS 12.x)

One Identity Password Manager User Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Deliver and manage customer VIP POCs. The lab will be directed and provide you with step-by-step walkthroughs of key features.

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0

Symantec PGP Viewer for ios

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec. device

Symantec Enterprise Security Manager Modules for Oracle Release Notes

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

PGP NetShare FlexResponse Plug-In for Data Loss Prevention

Integration Guide. SafeNet Authentication Service. Protecting Microsoft Internet Security and Acceleration (ISA) Server 2006 with SAS

Veritas NetBackup Appliance Security Guide

Symantec Enterprise Vault Technical Note

Patch Assessment Content Update Getting Started Guide for CCS 12.0

Symantec Enterprise Vault Technical Note

Veritas Enterprise Vault PST Migration 12.2

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Veritas ediscovery Platform

Veritas Data Insight Software Compatibility List 6.1.1

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

Symantec Enterprise Vault Technical Note

One Identity Defender 5.9. Product Overview

SafeNet Authentication Service

Transcription:

Symantec VIP Integration Guide for Citrix NetScaler

Legal Notice Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Contents Chapter 1 Introduction... 5 About Symantec VIP... 5 System requirements... 6 VIP supported features... 6 Authentication methods... 7 RADIUS Authentication using User ID Security Code... 7 RADIUS Authentication using User ID LDAP Password Security Code... 9 Chapter 2 Configuring Citrix NetScaler... 12 Prerequisites... 12 Adding a Validation server... 12 Configuring the Citrix NetScaler device for VIP Enterprise Gateway... 14 RADIUS Authentication using User ID - Security Code... 14 RADIUS Authentication using User ID - LDAP Password - Security Code... 17 Testing the Integration... 21 Authentication Method 1: User ID Security Code... 22 Authentication Method 2: User ID LDAP Password Security Code... 25 VIP Access Push Authentication... 26 Supporting selective two-factor authentication for a specific set of users... 27 Chapter 3 Integrating VIP JavaScript with Citrix NetScaler... 29 Supported features... 29 Prerequisites... 30 Configuring JavaScript with VIP components... 30 Self Service Portal configuration... 30 Self Service Portal IdP URL... 31 Self Service IdP Proxy URL... 31 Integrating JavaScript with Citrix NetScaler 10.x... 31

Contents 4 Task 1: Generating JavaScript code from VIP Manager... 31 Task 2: Updating the Citrix NetScaler Sign-in page... 32 Integrating JavaScript with Citrix NetScaler 11.0... 32 Task 1: Citrix NetScaler 11.0 configured with User ID Security Code validation server... 33 Task 2. Citrix NetScaler 11.0 configured with User ID LDAP Password Security Code validation server... 35 Integrating JavaScript with Citrix NetScaler 11.1/12.0... 36 Testing the JavaScript integration... 39 Chapter 4 Adding LDAP Authentication Server and Policy for enabling first-factor authentication... 40 Adding LDAP Authentication Server... 40 Adding the LDAP Authentication Policy... 41 Chapter 5 Customizing the Citrix NetScaler login page... 42 Customizing the Login Page for Citrix NetScaler 11.0... 42 Customizing the Login Page for Citrix NetScaler 10.x... 43 Chapter 6 Troubleshooting... 44 Issues and solutions... 44

Chapter 1 Introduction This chapter includes the following topics: About Symantec VIP System requirements VIP supported features Authentication methods About Symantec VIP The traditional user name and password authentication is no longer enough to meet today's evolving security threats and regulatory requirements. However, users demand an easy-to-use authentication solution. What is needed today is stronger and smarter authentication to secure corporate data and applications, while offering greater ease of use. Symantec VIP is a cloud-based authentication service that enables enterprises to securely access online transactions, meet compliance standards, and reduce fraud risk. VIP provides an additional layer of protection beyond the standard user name and password through a wide variety of additional authentication capabilities including: Two factor authentication dynamic, one-time-use security codes generated by a user's VIP credential in the form of mobile apps, desktop software, security tokens, and security cards. Out-of-band authentication dynamic, one-time-use security codes delivered by phone call, by SMS text message or email, or by push notifications sent to a registered mobile device. VIP is based on OATH open standards, an industry-wide consortium working with other groups to promote widespread strong authentication. Because the service is

Introduction System requirements 6 hosted by Symantec, enterprises engage one solution to support multiple enterprise, partner, and customer-facing applications requiring strong authentication. Intended for administrators, this guide helps you prepare for VIP integration by providing a comprehensive outline for planning, decision making, and task prioritization for a successful deployment. Users generate a security code on a VIP credential that they register with Symantec s VIP Service. They use that security code, along with their user name and password, to gain access to the resources protected by Citrix NetScaler device. System requirements The integration environment used in this document is based on the following software: Table 1-1 System requirements Product Partner Product VIP Enterprise Gateway Authentication Methods Supported Description Citrix NetScaler 9.x, 10.x, 11.0, 11.1, 12.0 Version 9.8 User ID Security Code User ID LDAP Password Security Code Intelligent Authentication (IA)/Push VIP supported features Table lists the VIP Enterprise Gateway features that are supported with Citrix NetScaler. Table 1-2 VIP supported features VIP feature Support First-factor authentication AD/LDAP password through VIP Enterprise Gateway VIP PIN Yes No Second-factor authentication VIP Push Yes

Introduction Authentication methods 7 Table 1-2 VIP feature SMS Voice VIP supported features (continued) Support Yes Yes Selective strong authentication End user-based Risk-based Yes Yes General authentication Multi-domain Anonymous user name Legacy authentication provider integration (delegation) AD password reset Yes Yes Yes Yes Integration method VIP JavaScript VIP Login Radius Yes No Yes Authentication methods The VIP integration module for Citrix NetScaler supports the following authentication methods: RADIUS Authentication using User ID Security Code RADIUS Authentication using User ID LDAP Password Security Code RADIUS Authentication using User ID Security Code The following diagram illustrates the workflow for RADIUS authentication using User ID - Security Code for VIP Enterprise Gateway.

Introduction Authentication methods 8 Figure 1-1 User ID - Security Code Table 1-3 Workflow Flow 1 Flow 2 Workflow description Description The user enters a user name, password, and a security code on the browser or plug-in based login screen. As the first part of the two-factor authentication process, the Citrix NetScaler device sends the user name and password to the User Store. For example, the User Store can be AD/LDAP. If the User Store authenticates the user name and password, the User Store returns the group permission details to the Citrix NetScaler device, along with the authentication response. Flow 3 As the second part of the two-factor authentication process, the Citrix NetScaler device sends the user name and security code to VIP Enterprise Gateway for authentication.

Introduction Authentication methods 9 Table 1-3 Workflow Flow 4 Workflow description (continued) Description The VIP Enterprise Gateway validation server authenticates the user name and security code with VIP Service. VIP Service sends an authentication response to VIP Enterprise Gateway. Flow 5 Flow 6 If VIP Service successfully authenticates the user name and security code, then VIP Enterprise Gateway returns an Access-Accept Authentication response to the Citrix NetScaler device. Based on the Access-Accept Authentication response, the Citrix NetScaler device gives the user access to the protected resources. RADIUS Authentication using User ID LDAP Password Security Code The following diagram illustrates the workflow for RADIUS authentication using User ID - LDAP Password - Security Code for VIP Enterprise Gateway.

Introduction Authentication methods 10 Figure 1-2 User ID - LDAP Password - Security Code Table 1-4 Workflow Flow 1 Flow 2 Flow 3 Workflow description Description The user enters a user name, password, and a security code on the browser or plug-in based login screen. The Citrix NetScaler device sends the user name, password, and security code to VIP Enterprise Gateway. As the first part of the two-factor authentication process, the VIP Enterprise Gateway validation server authenticates the user name and password against your User Store. For example, your User Store can be AD/LDAP. If the User Store authenticates the user name and password, the authentication response includes the group permission details. Flow 4 As the second part of the two-factor authentication process, VIP Enterprise Gateway authenticates the user name and security code with VIP Service.

Introduction Authentication methods 11 Table 1-4 Workflow Flow 5 Flow 6 Workflow description (continued) Description If VIP Service successfully authenticates the user name and security code, then VIP Enterprise Gateway returns an Access-Accept Authentication response to the Citrix NetScaler device. Based on the Access-Accept Authentication response, the Citrix NetScaler device gives the user access to the protected resources.

Chapter 2 Configuring Citrix NetScaler This chapter includes the following topics: Prerequisites Adding a Validation server Configuring the Citrix NetScaler device for VIP Enterprise Gateway Testing the Integration Supporting selective two-factor authentication for a specific set of users Prerequisites Before you integrate Citrix NetScaler with Symantec VIP for second-factor authentication, you must make sure that your first-factor authentication works. The Credential Provider application must be configured with LDAP and a user must be able to log into the application with a user name and a password Install and configure VIP Enterprise Gateway. For configuration procedures, refer to VIP Enterprise Gateway Installation and Configuration Guide. Adding a Validation server You must complete the following steps to create a Validation server: 1. Log in to VIP Enterprise Gateway and click the Validation tab. 2. Click Add Server. The Add RADIUS Validation server dialog box is displayed.

Configuring Citrix NetScaler Adding a Validation server 13 3. Configure the RADIUS validation parameters: Field Vendor Application Name Authentication Mode Action Select Citrix Systems from the drop-down list. Select the vendor s application that you use, Citrix NetScaler. Select the mode that you want to use for first and second-factor authentication. UserID Security code: In this authentication mode, your User Store such as AD/LDAP validates the first-factor (user name and password). VIP Enterprise Gateway validates the second-factor (user name and security code) with VIP Service. Ensure that your first-factor validation works before selecting this authentication mode. UserID LDAP Password Security code: In this authentication mode, VIP Enterprise Gateway validates the first-factor (user name and password) with your User Store, such as AD/LDAP. VIP Enterprise Gateway validates the second-factor (user name and security code) with VIP Service. Optionally, if you want to authorize the user according to the LDAP Groups, then you must configure the LDAP RADIUS mapping in the Validation server. 4. Click Continue to add the Validation server.

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 14 Configuring the Citrix NetScaler device for VIP Enterprise Gateway Complete the procedures in this section to configure the NetScaler device. These procedures apply for both authentication schemes, unless otherwise specified. See the NetScaler product documentation for specific details. Note: The screen examples within these procedures have been captured from Citrix NetScaler VPX (version NS 11.0). Refer to the product documentation provided for your version of the NetScaler device for specific screen captures and procedures. RADIUS Authentication using User ID - Security Code Prerequisite Add the LDAP authentication server and policy if they do not already exist. For more information, see the Citrix documentation or See Adding LDAP Authentication Server and Policy for enabling first-factor authentication on page 40. Note: The screen examples within these procedures have been captured from Citrix NetScaler VPX (version NS 11.0). Refer to the product documentation provided for your version of the NetScaler device for specific screen captures and procedures. Task 1. Adding the RADIUS Authentication Policy and Server 1. In the navigation pane, expand System > Authentication and select RADIUS. If you are using Citrix NetScaler 12.0 or later, in the navigation pane, expand System > Authentication > Basic Policyand select RADIUS. 2. From the Policy tab, click Add. The Create Authentication RADIUS Policy page is displayed. 3. In the Create Authentication Policy box, type a name for the policy in the Name field. 4. From the Server drop-down list, select the + button to add VIP RADIUS server.

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 15 5. In the Create Authentication RADIUS Server dialog box, type a name for the server in the Name field. 6. In the Server section, specify values for each of the following parameters:

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 16 Field IP Address Port Time-out Secret Key Action Enter the IP address of the Validation Server. Enter the port number of the Validation Server. Enter a value in seconds. Note: If you are integrating Out-of-Band authentication (SMS, Voice, or Push) then to avoid authentication failures, set the Time-out field to a minimum value of 60 seconds. Enter the secret key and confirm it. Be sure that the Secret Key and the VIP RADIUS Shared Secret Key are the same. 7. Click Create to create the RADIUS Server. 8. In the Create Authentication RADIUS Policy page, under Expression, you can add your own expression according to the policy. Note: For test purposes only, ns_true is added as the Expression. Add the appropriate policy according to your enterprise requirement. 9. Click Create. Task 2. Configuring NetScaler Gateway Virtual Server 1. In the navigation pane, expand NetScaler Gateway > Virtual Servers, and click Add to new virtual server or Open the existing virtual server. Ignore Step 2 to Step 4 if the LDAP server is already configured as the primary authentication server. 2. Under the Authentication section, click the + button. 3. From the Choose Policy drop-down list, select LDAP as the Policy and Primary as the Type, and click Continue. 4. Click Bind to select your LDAP policy and then click Insert. 5. Under the Authentication section, click the + button. 6. From the Choose Policy drop-down list, select RADIUS as the Policy and Secondary as the Type, and click Continue. 7. Click Bind to select your RADIUS policy and then click Insert.

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 17 8. Click OK. RADIUS Authentication using User ID - LDAP Password - Security Code Task 1. Adding the Authentication Policy and Server 1. In the navigation pane, expand System > Authentication, and select RADIUS. If you are using Citrix NetScaler 12.0 or later, in the navigation pane, expand System > Authentication > Basic Policyand select RADIUS. 2. From the Policy tab, click Add. The Create Authentication RADIUS Policy page is displayed. 3. In the Create Authentication Policy box, type a name for the policy in the Name field. 4. From the Server drop-down list, select the + button to add VIP RADIUS server.

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 18 5. In the Create Authentication Policy dialog box, type a name for the policy in the Name field. 6. From the Server field, select the server created previously (For example, VIP_Server_1). 7. In the Create Authentication Server dialog box, type a name for the server in the Name field.

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 19 8. In the Server section, specify values for each of the following parameters: Field IP Address Port Time-out Secret Key Action Enter the IP address of the Validation Server. Enter the port number of the Validation Server. Enter a value in seconds. Note: If you are integrating Out-of-Band authentication (SMS, Voice, or Push) then to avoid authentication failures, set the Time-out field to a minimum value of 60 seconds. Enter the secret key and confirm it. Be sure the Secret Key and the VIP RADIUS Shared Secret Key are the same. 9. Click Details to expand the advanced configuration and enter a value in the Group Attribute Type field. This value must match the RADIUS Mapping Attribute value that you had entered when configuring the RADIUS LDAP

Configuring Citrix NetScaler Configuring the Citrix NetScaler device for VIP Enterprise Gateway 20 mapping in the VIP Enterprise Gateway validation server. Ignore this step if you do not want to authorize a user based on the LDAP group. Note: In this example, the Validation server RADIUS Mapping Attribute is selected as Class. The Class value of 25 was entered as the Group Attribute Type in the Citrix authentication server. Refer to the RFC for the RADIUS attribute numeric value. 10. The Create Authentication RADIUS Policy page, under Expression, you can add your own expression according to the policy. Note: For test purposes only, ns_true was added as the Expression. Add the appropriate policy according to your enterprise requirement.

Configuring Citrix NetScaler Testing the Integration 21 11. Click Create. Task 2. Configuring NetScaler Gateway Virtual Server 1. In the navigation pane, expand NetScaler Gateway > Virtual Servers. 2. Click Open the existing virtual server. If any other server is configured as the primary server, remove it. 3. Under the Authentication section, click the + button. 4. From the Choose Policy drop-down list, select RADIUS as the Policy and Primary as the Type, and click Continue. 5. Click Bind to select your RADIUS policy and then click Insert. 6. Click OK. Testing the Integration This section describes the procedures for testing the integration of Citrix NetScaler with Symantec VIP. An authentication method can integrate the following verification mechanisms: Hardware and VIP Access Credential: In this method, the security code that you generate on your hardware or VIP Access credential is used besides the user name and password to access the protected resources. SMS/Voice: If you have configured Out-of-Band (OOB) authentication in the VIP Enterprise Gateway validation server and in VIP Manager, then a security code is sent to your registered mobile device over SMS or Voice. You must use this security code besides the user name and password to access the protected resources.

Configuring Citrix NetScaler Testing the Integration 22 VIP Access Push: For users who have installed VIP Access on their registered mobile devices, VIP Service sends a VIP Push notification message to the mobile device. The user must tap the Allow button on the device to perform the second-factor authentication and complete the sign-in. To test the integration, you can access Citrix Access Gateway in the following ways: Browser-based Login Plug-in based Login Each authentication method contains instructions to access Citrix Access Gateway. Authentication Method 1: User ID Security Code Hardware and VIP Access Credential Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The following page is displayed: For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed.

Configuring Citrix NetScaler Testing the Integration 23 2. Enter the user name and password. Note: For details on customization, See Customizing the Citrix NetScaler login page on page 42. 3. Update the Security Code (or Secondary password) field as follows: For browser-based login: Enter the security code that you generate on your hardware or VIP Access credential. For plug-in based login: Right-click for advanced options to enable the Secondary password field, and then enter the security code that you generate on your hardware or VIP Access credential. 4. Click Logon for browser-based login (or click Connect for plug-in based login). After successful authentication, you can access the protected resources. SMS/Voice Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The login page is displayed. For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed. 2. Enter the user name and password. 3. Update the Security Code (or Secondary password) field as follows: For browser-based login: Enter Push or Send.

Configuring Citrix NetScaler Testing the Integration 24 For plug-in based login: Right-click for advanced options to enable the Secondary password field, and then enter Push or Send. Note: The key words Push and Send are not case-sensitive. 4. Click Logon for browser-based login (or click Connect for plug-in based login). If the credentials are correct, you will receive a security code over SMS or Voice on your registered mobile device and the Challenge page is displayed. 5. In the Enter Your Security Code field, enter the security code that you received on your device. 6. Click Submit for browser-based login (or click Send Response for plug-in based login). After successful authentication, you can access the protected resources. VIP Access Push Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The login page is displayed. For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed. 2. Enter the user name and password. 3. Update the Security Code (or Secondary password) field as follows: For browser-based login: Enter Push or Send. For plug-in based login: Right-click for advanced options to enable the Secondary password field, and then enter Push or Send. Note: The key words Push and Send are not case-sensitive. 4. Click Logon for browser-based login (or click Connect for plug-in based login). If the credentials are correct, you will receive a Push notification on your registered mobile device. 5. Tap Allow on your device to complete the authentication. After successful authentication, you can access the protected resources.

Configuring Citrix NetScaler Testing the Integration 25 Authentication Method 2: User ID LDAP Password Security Code Hardware and VIP Access Credential Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The login page is displayed. For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed. 2. Update the following fields: Enter the user name. In the Password + Security Code field for browser-based login (or Password field for plug-in based login), enter the password followed by the security code that you generate on your hardware or VIP Access credential. Note: In case of plug-in based login, do not right-click for advanced options to enable the Secondary password field as you must enter the password followed by the security code in the Password field.

Configuring Citrix NetScaler Testing the Integration 26 3. Click Logon for browser-based login (or click Connect for plug-in based login). After successful authentication, you can access the protected resources. SMS/Voice Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The following login page is displayed. For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed. 2. Enter the user name and password. 3. Click Logon for browser-based login (or click Connect for plug-in based login). If the credentials are correct, you will receive a security code over SMS or Voice on your registered mobile device and the Challenge page is displayed. 4. In the Enter Your Security Code field, enter the security code that you received on your device and click Submit. After successful authentication, you can access the protected resources. VIP Access Push Authentication 1. Access the login page as follows: For browser-based login: Access the Citrix Access Gateway Virtual Server (For example, https://mycitrix.com). The login page is displayed. For plug-in based login: Double-click the Access Gateway Plug-in icon. The Citrix Access Gateway window is displayed. 2. Enter the user name and password. 3. Click Logon for browser-based login (or click Connect for plug-in based login). If the credentials are correct, you will receive a Push notification on your registered mobile device.

Configuring Citrix NetScaler Supporting selective two-factor authentication for a specific set of users 27 4. Tap Allow on your device to complete the authentication. After successful authentication, you can access the protected resources. Supporting selective two-factor authentication for a specific set of users You can define distinct authentication or authorization policies in your corporate LDAP environment based on user Distinguished Names (DN) or group information. You can selectively provide highly secure twofactor authentication to a set of users. For example, a company can enable two-factor authentication for the system administrators who typically have higher privileges. The rest of the employees of the company may not have to use two-factor authentication. You can configure Citrix NetScaler in the cascade authentication mode for enabling a subset of users for two-factor authentication. Complete the following steps to configure selective two-factor authentication: 1. In your organization's LDAP/AD, make sure that you have grouped the users who use two-factor authentication. In Citrix NetScaler, configure the RADIUS and AD/LDAP server. In VIP Enterprise Gateway, configure your User Store filter in such a way that the group of users who use VIP authentication only can be searched. In Citrix NetScaler, configure your LDAP/AD user filter in such a way that the users who are authenticated by AD password alone can be searched. 2. In the virtual server, add a new server or open the server that you want to update. 3. Navigate to the Authentication tab. Insert User ID LDAP Password Security Code mode VIP RADIUS server policy followed by the LDAP or AD policy.

Configuring Citrix NetScaler Supporting selective two-factor authentication for a specific set of users 28 4. Click Done.

Chapter 3 Integrating VIP JavaScript with Citrix NetScaler This chapter includes the following topics: Supported features Prerequisites Configuring JavaScript with VIP components Self Service Portal configuration Integrating JavaScript with Citrix NetScaler 10.x Integrating JavaScript with Citrix NetScaler 11.0 Testing the JavaScript integration Supported features VIP JavaScript supports the following features: Push authentication SMS/Voice-based security code Email-based security code Device finger print Registered computer (RC) Intelligent Authentication (Risk-based)

Integrating VIP JavaScript with Citrix NetScaler Prerequisites 30 Prerequisites Before you configure VIP JavaScript, you must complete the installation and configuration of the VIP integration module described in the chapter Configuring Citrix NetScaler. If the VIP RADIUS Enterprise Gateway server is integrated with the Citrix NetScaler server, then you must disable the Access Challenge feature in the VIP Enterprise Gateway validation server. Configuring JavaScript with VIP components You must configure the VIP Policy in VIP Manager. For details, refer to Symantec VIP Intelligent Authentication Enterprise Integration Guide (IA_Enterprise_Integration.pdf) which you can download from Account > Download Files > Intelligent Authentication link in VIP Manager. If the user s login ID is different from the user s ID registered in the Cloud, (For example, a user s login ID is samaccountname [domain\user] and the user is registered with userprincipal name [user@domain.com]) then you must enable the enterprise login ID mapping feature in VIP Manager. To enable the enterprise login ID mapping feature, do the following: 1. Log into VIP Manager. 2. Click the Policies tab. The VIP Policy Configuration page is displayed. 3. Click the Components sub-tab. 4. Click the Edit link and select Yes for the Enable enterprise login ID mapping option. Self Service Portal configuration The Self-Service Portal is a cloud-based web application. Your end users can use this application to register, test, reset, or remove credentials from their accounts. You can configure VIP Enterprise Gateway to provide secure access for your end users to the Self-Service Portal, and for your administrators to VIP Manager. You can either configure SSP IdP in VIP Enterprise Gateway or SSP IdP Proxy in order to configure Intelligent Authentication (IA) and Out-of-band authentication such as email, SMS, Voice OTP. Refer the VIP Enterprise Gateway Installation and Configuration Guide to configure SSP IdP or SSP IdP proxy component.

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 10.x 31 Self Service Portal IdP URL Self Service IdP Proxy URL If you are planning to use the Self Service Portal IdP for JavaScript integration, then use the following URL to generate the VIP Integration Code: https://<your_ssp_idp_fqdn>:8233/vipssp/login If you are planning to use the Self Service IdP Proxy for JavaScript integration, you must provide the explicit path to your Self Service Portal IdP Proxy (in the DMZ). https://<ssp_idp_proxy_fqdn>/dmzssp/dmzlistener Integrating JavaScript with Citrix NetScaler 10.x This sections describes the procedures for generating JavaScript code from VIP Manager, and updating the Citrix NetScaler sign-in page. Task 1: Generating JavaScript code from VIP Manager Perform the following steps in VIP Manager: 1. Log into VIP Manager and navigate to Account > VIP Policy Configuration > Account > Edit. 2. Click the VIP Integration Code for JavaScript link to generate code. 3. If Citrix NetScaler is configured with the User ID LDAP Password Security Code authentication mode, select the Simplified method to generate the VIP integration code. 4. If Citrix NetScaler is configured with the User ID Security Code authentication mode, select the Manual method. Then, you must select the User ID Security Code authentication mode to generate the VIP integration code. If you are unsure about the value for the user name, password, security code, and form name fields, use the following values: User Name Field Name: login Password Field Name: passwd Security Code Field Name: passwd1 Form Name: Log_On

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 32 Task 2: Updating the Citrix NetScaler Sign-in page Note: You can find the Citrix NetScaler Sign-In page at /Netscaler/ns_gui/vpn/index.html. Back up the Sign-In page file (index.html) before you paste the VIP integration code. Perform the following steps to update the sign-in page of the module: 1. If you have generated the VIP integration code for the Citrix NetScaler module that is configured with the User ID LDAP Password Security Code authentication mode, you must copy the VIP integration code that you have generated in VIP Manager and paste it just before the </BODY> tag at the end of the index.html file. 2. If you have generated the VIP integration code for the Citrix NetScaler module that is configured with the User ID Security Code authentication mode, you must do the following: Copy the VIP integration code that you have generated in VIP Manager and paste it just before the </BODY> tag at the end of the index.html file. In the login.js file, add the code that is highlighted in the following sample code to hide the password2 field: <SPAN style="display:none" class=ctxmsam_logonfont>' + _("Password2") + '</SPAN></TD> <TD colspan=2 style="padding-right:8px;"> <input class=ctxmsam_contentfont type="password" title="' + _ ("Enter password") + '" name="passwd1" id="passwd1" size="30" maxlength="32" style="display:none" style="width:100%;"></td></tr>'); Note: The password2 field will be filled automatically after the JavaScript integration with the Citrix NetScaler module. Integrating JavaScript with Citrix NetScaler 11.0 This sections describes the procedures for generating JavaScript code from VIP Manager, and updating the Citrix NetScaler sign-in page. If you are using Citrix NetScaler version 11.0, you must update the JavaScript integration code in the following cases:

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 33 Task 1: Citrix NetScaler 11.0 configured with User ID Security Code validation server Perform the following steps if you have configured Citrix NetScaler 11.0 with User ID Security Code validation server: 1. Open the Index.html file (located at /netscaler/vpn_gui/vpn/) and paste the following JavaScript code before the </head> tags. <!-- BEGIN VIP integration code --> <script type="text/javascript" src="https://userservices.vip. symantec.com/vipuserservices/resources/js/v_1_0/vip?appid= <APPID>&idpURL=https://<SSP_IDP OR Proxy_URL>"> </script> <script type="text/javascript"> function vipauth() { var securitycodefield = $('[name="passwd1"]'); var passwordfield = $('[name="passwd"]'); var formname = 'vpnform'; var usernamefield = $('[name="login"]'); var username = usernamefield.val(); var password = passwordfield.val(); try{ if (username && password) { vip.genticket({user:username, password:password}, function(success, ret) { try{ if (success) { securitycodefield.val(ret.ticket); document.forms[formname].onsubmit=function (event){return true;}; document.forms[formname].submit(); } else {alert("fail; " + ret.tostring());} } catch(e){alert("in callback");} }); } } catch(e){ alert(e); } return false; } </script> <!--END VIP integration code --> 2. In the earlier JavaScript code, update the APPID and SSP_IDP OR Proxy_URL values as follows:

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 34 APPID: Get the APPID from the VIP Manage Policy Configuration page. To get the APPID, do the following: Log in to VIP Manager and navigate to Account > VIP Policy Configuration > Account > Edit. Click the VIP Integration Code for JavaScript link to generate the code, select Simplified as the method to generate integration code, and then take the APPID. SSP_IdP OR Proxy_URL: Based on your requirement, you can configure either Self Service Portal IDP or Self Service IDP Proxy. See Self Service Portal configuration on page 30. 3. Open the gateway_login_form_view.js file (located at /netscaler/vpn_gui/vpn/js) and do the following: Search for the following code, and then add 'onclick':'return vipauth();' at the appropriate place in the code: var Login = $ ("input type='submit'></input>").attr ({'id':'log_on','value': 'Log On', 'class': 'custombutton login_page', 'disabled': 'disabled'}). appendto(right_loginbutton); For example, var Login = $ ("input type='submit'></input>").attr ({'id':'log_on','value': 'Log On', 'class': 'custombutton login_page','disabled':'disabled','onclick':'return vipauth();'}).appendto(right_loginbutton);}). appendto(right_loginbutton); Search for the following code, and then add "style":"display:none;" at the appropriate place in the code to hide the password2 field: var enter_passwd2 = $ ("<input type='password'></input>"). attr({'id':'passwd1','class':'prepopulatedcredentials', 'autocomplete':'off', 'spellcheck' : 'false', 'name' :'passwd1', 'size':'30', 'maxlength' : '127',"width":"180px"}) For example, var enter_passwd2 = $ ("<input type='password'></input>"). attr({'id':'passwd1','class':'prepopulatedcredentials', 'autocomplete':'off', 'spellcheck' : 'false', 'name' :'passwd1', 'size':'30', "style":"display:none;", 'maxlength' : '127',"width":"180px"}) Search for the following code, and then add $(password2).hide(); next to the code: var password2 = $("<span></span>").addclass ('plain input_labels form_text'). attr("id","password2");

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 35 For example, var password2 = $("<span></span>").addclass ('plain input_labels form_text'). attr("id","password2"); $(password2).hide(); 4. Save the changes. Task 2. Citrix NetScaler 11.0 configured with User ID LDAP Password Security Code validation server Perform the following steps if you have configured Citrix NetScaler 11.0 with User ID LDAP Password Security Code validation server: 1. Open the Index.html file (located at netscaler/vpn_gui/vpn/) and paste the following JavaScript code before the </head> tags. <!-- BEGIN VIP integration code --> <script type="text/javascript" src= "https://userservices.vip.symantec.com/vipuserservices/resources/ js/v_1_0/vip?appid=<appid>&idpurl=https://<ssp_idp OR Proxy_URL>"> </script> <script type="text/javascript"> function vipauth() { var passwordfield = $('[name="passwd"]'); var formname = 'vpnform'; var usernamefield = $('[name="login"]'); var username = usernamefield.val(); var password = passwordfield.val(); try{ if (username && password) { vip.genticket({user:username, password:password}, function(success, ret) { try{ if (success) { passwordfield.val(password + ret.ticket); document.forms[formname].onsubmit=function (event){return true;}; document.forms[formname].submit(); } else {alert("fail; " + ret.tostring());} } catch(e){alert("in callback");} }); } } catch(e){ alert(e); } return false; } </script> <!-- END VIP integration code -->

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 36 2. In the above JavaScript code, update the APPID and SSP_IDP_Proxy_URL values as follows: APPID: Get the APPID from the VIP Manage Policy Configuration page. To get the APPID, do the following Log in to VIP Manager and navigate to Account > VIP Policy Configuration > Account > Edit. Click the VIP Integration Code for JavaScript link to generate the code, select Simplified as the method to generate integration code, and then take the APPID SSP_IdP OR Proxy_URL: Based on your requirement, you can configure either Self Service Portal IDP or Self Service IDP Proxy. See Self Service Portal configuration on page 30. 3. Open the gateway_login_form_view.js file (located at /netscaler/vpn_gui/vpn/js) and do the following: Search for the following code, and then add 'onclick':'return vipauth();' at the appropriate place in the code: var Login = $("<input type='submit'>,/input>").attr ({'id':'log_on','value':'log On','class':'custombutton login_page','disabled':'disabled'}). appendto(right_loginbutton); For example, var Login = $("<input type='submit'>,/input>").attr ({'id':'log_on','value':'log On','class':'custombutton login_page','disabled':'disabled'}). 'onclick':'return vipauth();'}).appendto(right_loginbutton); 4. Save the changes. Integrating JavaScript with Citrix NetScaler 11.1/12.0 This section describes the procedures for integrating JavaScript with Citrix NetScaler. If you are using Citrix NetScaler version 11.1/12.0, you must update the JavaScript integration code in the following cases: Task 1. Citrix NetScaler 11.1 configured with User ID Security Code validation server Perform the following steps if you have configured Citrix NetScaler with User ID Security Code validation server: 1. Open the Index.html file (located at /netscaler/vpn_gui/vpn/) and paste the following JavaScript code before the </head> tags.

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 37 <!-- Start VIP integration code --> <script type="text/javascript"> $(document).ready(function() { $.getscript("https://userservices.vip.symantec.com/vipuserservices/ resources/js/v_1_0/vip?appid=<appid>&idpurl=<ssp_idp OR Proxy_URL> &autointegration=manual"); }); function vipauth() { if (document.getelementbyid('enter user name') && document.getelementbyid('passwd')) { vipiaintegrationproperties.setauthenticationmode('uo'); vipiaintegrationproperties.setusernamefieldname (document.getelementbyid('enter user name').getattribute("name")); vipiaintegrationproperties.setpasswordfieldname (document.getelementbyid('passwd').getattribute("name")); vipiaintegrationproperties.setsecuritycodefieldname (document.getelementbyid('passwd1').getattribute("name")); vipiaintegrationproperties.setformname('vpnform'); } } </script> <!-- END VIP integration code --> 2. In the earlier JavaScript code, update the APPID and SSP_IDP OR Proxy_URL values as follows: APPID: Get the APPID from the VIP Manage Policy Configuration page. To get the APPID, do the following: Log in to VIP Manager and navigate to Account > VIP Policy Configuration > Account > Edit. Click the VIP Integration Code for JavaScript link to generate the code, select Simplified as the method to generate integration code, and then take the APPID. SSP_IdP OR Proxy_URL: Based on your requirement, you can configure either Self Service Portal IDP or Self Service IDP Proxy. See Self Service Portal configuration on page 30. 3. Open the gateway_login_form_view.js file (located at /netscaler/vpn_gui/vpn/js) and do the following: Search for the following code, and then add "style":"display:none;" at the appropriate place in the code to hide the password2 field:

Integrating VIP JavaScript with Citrix NetScaler Integrating JavaScript with Citrix NetScaler 11.0 38 var enter_passwd2 = $("<input type='password'><input>").attr ({'id':'passwd1','class':'prepopulatedcredentials', 'autocomplete':'off', 'spellcheck' : 'false', 'name' :'passwd1', 'size':'30', 'maxlength' : '127',"width":"180px"}) For example: var enter_passwd2 = $("<input type='password'><input>").attr({'id':'passwd1','class':'prepopulatedcredentials', 'autocomplete':'off', 'spellcheck' : 'false', 'name' :'passwd1', 'size':'30', "style":"display:none;", 'maxlength' : '127',"width":"180px"}) Search for the following code, and then add $(password2).hide(); next to the code: var password2 = $ ("<span></span>").addclass ('plain input_labels form_text'). attr("id","password2"); For example: var password2 = $ ("<span></span>").addclass ('plain input_labels form_text'). attr("id","password2"); $(password2).hide(); 4. Save the changes. Task 2. Citrix NetScaler 11.1/12.0 configured with User ID - LDAP Password - Security Code validation server Perform the following steps if you have configured Citrix NetScaler 11.0/12.0 with User ID - LDAP Password - Security Code validation server: 1. Open the Index.html file (located at netscaler/vpn_gui/vpn/) and paste the following JavaScript code before the </head> tags. <!-- Start VIP integration code --> <script type="text/javascript"> $(document).ready(function() { $.getscript("https://userservices.vip.symantec.com/vipuserservices/ resources/js/v_1_0/vip?appid=<appid>&idpurl=<ssp_idp OR Proxy_URL> &autointegration=manual"); }); function vipauth() { if (document.getelementbyid('enter user name') && document.getelementbyid('passwd')) { vipiaintegrationproperties.setusernamefieldname (document.getelementbyid('enter user name').getattribute("name"));

Integrating VIP JavaScript with Citrix NetScaler Testing the JavaScript integration 39 vipiaintegrationproperties.setpasswordfieldname (document.getelementbyid('passwd').getattribute("name")); vipiaintegrationproperties.setformname('vpnform'); } } </script> <!-- END VIP integration code --> 2. In the earlier JavaScript code, update the APPID and SSP_IDP Or Proxy_URL values as follows: APPID: Get the APPID from the VIP Manage Policy Configuration page. To get the APPID, do the following: Log in to VIP Manager and navigate to Account > VIP Policy Configuration > Account > Edit. Click the VIP Integration Code for JavaScript link to generate the code, select Simplified as the method to generate integration code, and then take the APPID. SSP_IdP OR Proxy_URL: Based on your requirement, you can configure either Self Service Portal IDP or Self Service IDP Proxy. See Self Service Portal configuration on page 30. Testing the JavaScript integration Perform the following steps to test the JavaScript integration: 1. Access the Citrix NetScaler VPN URL. 2. Enter a valid user name and password. 3. Click Continue. The Confirm Your Identity window is displayed. 4. Enter a valid security code. 5. Select the Remember this private device check box, and click Continue. You can access the protected resource after successful authentication. In the next login, you will not be prompted for the security code as you have opted to remember the device.

Chapter 4 Adding LDAP Authentication Server and Policy for enabling first-factor authentication This chapter includes the following topics: Adding LDAP Authentication Server Adding the LDAP Authentication Policy Adding LDAP Authentication Server Perform the following steps to add the LDAP Authentication Server: 1. In the navigation pane, expand System > Authentication and select LDAP. 2. From the Servers tab, click Add. 3. In the Create Authentication Server dialog box, type a name for the server in the Name field (For example, NetScaler_AD). 4. In the Server section, enter the following: IP address for the LDAP server Port Time-out value in seconds 5. Under Connection Settings, enter the Base DN, Administrator Bind DN, and Administrator Password. Confirm your Administrator Password.

Adding LDAP Authentication Server and Policy for enabling first-factor authentication Adding the LDAP Authentication Policy 41 6. Under Other Settings, enter the Server Logon Name Attribute, Search Filter, Group Attribute, and Sub Attribute Name. 7. For Security Type, select Plain Text, and select the Authentication and User Required fields check boxes. 8. Click Create. Adding the LDAP Authentication Policy Perform the following steps to add the LDAP Authentication Policy: 1. From the Policies tab, click Add. 2. In the Create Authentication Policy dialog box, type a name for the policy in the Name field. 3. Select the authentication server created previously (For example, NetScaler_AD). 4. Under Expression, you can add your own expression according to the policy. Note: For test purposes only, ns_true was added as the Expression. Add the appropriate policy according to your enterprise requirement. 5. Click Create.

Chapter 5 Customizing the Citrix NetScaler login page This chapter includes the following topics: Customizing the Login Page for Citrix NetScaler 11.0 Customizing the Login Page for Citrix NetScaler 10.x Customizing the Login Page for Citrix NetScaler 11.0 Perform the following steps to customize the login page for Citrix NetScaler version 11.0: 1. Log in to the Citrix NetScaler Admin console and navigate to Configuration > NetScaler Gateway > Portal Themes. 2. Click Add to add a new theme, enter the new theme name, select the theme template (for example, GreenBubble), and then click OK to save the changes. 3. Click OK on the Portal Theme page to save the changes, and click Back to return to the Portal Theme page. 4. Select the theme that you created, and click Edit. 5. In Advanced settings, click the Login page, change the password and password2 field labels as per your requirement, and click OK to save the changes. 6. Click the click to bind and view configured theme link to verify the changes, and then click Done. 7. Save the NetScaler configuration.

Customizing the Citrix NetScaler login page Customizing the Login Page for Citrix NetScaler 10.x 43 Customizing the Login Page for Citrix NetScaler 10.x To customize the login page for Citrix NetScaler version 10.x, refer to the following article http://support.citrix.com/article/ctx126206