CWS 315 2I en StudentManual 1 3 Days v04
CWS 315 2I en StudentManual 1 3 Days v04
ot
fo
rr
es
al
e
or
di
CWS-315-2I: Citrix Virtual Apps and Desktops 7 Advanced
s
tri
Administration
b
ut
io
n
(1-3 Days)
Table Of Contents
N
Module 2 - Planning: Redundancy and Scalability..................................................................................................................................42
ot
Citrix Virtual Apps and Desktops Redundancy and Scalability....................................................................................................44
StoreFront and Citrix Gateway Redundancy and Scalability.......................................................................................................53
fo
Site Infrastructure Redundancy and Scalability...........................................................................................................................67
rr
Machines Running the Virtual Delivery Agent.............................................................................................................................82
es
Module 3 - Planning: Virtual Apps and Desktops Environment with Multiple Locations..........................................................................93
Zones...........................................................................................................................................................................................95
al
VDA Registration in a Multi-Zone Environment.........................................................................................................................110
e
Zone Preference........................................................................................................................................................................122
or
Optimal Gateway Routing and Zones........................................................................................................................................131
StoreFront Resource Aggregation.............................................................................................................................................138
di
Managing StoreFront Store Subscriptions in a Multi-Location Environment.............................................................................145
s tri
Module 4 - Planning: Backups and Disaster Recovery.........................................................................................................................157
Backups.....................................................................................................................................................................................159
b ut
Disaster Recovery Considerations............................................................................................................................................177
Disaster Recovery Process.......................................................................................................................................................184
io
Module 5 - Planning: Advanced Authentication Methods......................................................................................................................193
n
Multi-factor Authentication - RADIUS and One Time Passwords (OTP)...................................................................................195
Multi-factor Authentication - Smart Card Authentication............................................................................................................205
Federated Authentication - Federated Identity Concepts..........................................................................................................217
Module 6 - Planning: App and Data Security........................................................................................................................................237
Introduction to Application Security..........................................................................................................................................239
Preventing Jailbreak Attacks.....................................................................................................................................................245
Minimizing the Impact of Attacks...............................................................................................................................................263
Module 7 - Planning: Virtual Delivery Agent Security............................................................................................................................282
Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption.................................................................................284
Microsoft Group Policy Objects (GPOs) and Citrix Policies......................................................................................................292
Image Management...................................................................................................................................................................310
Module 8 - Introduction to Troubleshooting...........................................................................................................................................320
N
Resource Tools and Utilities......................................................................................................................................................326
ot
Introduction to PowerShell.........................................................................................................................................................341
fo
Module 9 - Troubleshoot Access Issues...............................................................................................................................................360
rr
Troubleshooting StoreFront.......................................................................................................................................................362
Workflow and Troubleshooting Overview..................................................................................................................................370
es
Troubleshooting Access and Authentication.............................................................................................................................380
al
Troubleshooting App/Desktop Launch......................................................................................................................................393
e
Module 10 - Troubleshoot Delivery Controller Issues...........................................................................................................................399
Validating FlexCast Management Architecture (FMA) Services................................................................................................401
or
Module 11 - Troubleshoot Virtual Delivery Agent (VDA) Registration Issues.......................................................................................423
di
Troubleshooting Virtual Delivery Agent (VDA) Registration......................................................................................................425
s
Module 12 - Troubleshoot HDX Connection Issues..............................................................................................................................442
tri
Troubleshooting HDX Connections...........................................................................................................................................444
b ut
io
n
Citrix Virtual Apps and Desktops 7
Advanced Administration
N
ot
Course Overview
fo
rr
es
al
CWS-315-2I: September 27, 2021
e
Lab Manual: v1.19, v2.1
Module 0
or
di
s
tri
b
ut
io
n
N
Virtual Apps and Desktops infrastructure
ot
components
• Manage Citrix Virtual Apps and Desktops
fo
deployment with multiple locations.
rr
• Implement backups and disaster recovery for Citrix
es
Virtual Apps and Desktops deployment.
al
• Determine the advanced authentication methods
e
appropriate for access to a Citrix Virtual Apps and
or
Desktops environment.
di
• Explain how the app and data security can be
s
improved in a virtualized environment.
tri
b
• Secure the machines running the Virtual Delivery
ut
Agent.
io
n
N
virtual environment.
ot
• Troubleshoot common access issues.
fo
• Troubleshoot common Delivery Controller and
rr
database issues.
es
• Troubleshoot common VDA registration issues.
al
• Troubleshoot common HDX connection issues.
e
or
di
s
tri
b
ut
io
n
N
• Create OS, Platform, App, Elastic, and User Layers.
ot
• Deploy a layered image using Citrix Virtual Apps
fo
and Desktops.
rr
• Explore Layer priority and maintain an App Layering
es
environment.
al
e
or
di
s
tri
b
ut
io
n
N
Management (WEM).
ot
• Install WEM on-premises and WEM Service.
fo
• Run the WEM Consoles and perform initial setup.
rr
• Use WEM for VM performance optimization.
es
• Use WEM to secure virtualization environments.
al
• Examine the WEM Agent operations.
e
or
• Migrate to WEM, and upgrade existing WEM
environments.
di
s
tri
b
ut
io
n
N
with an intelligent workspace
ot
platform.
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
Formerly Networking
N
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
• Include the following information:
ot
• Name and company
• Job title
fo
• Job responsibility
rr
• Networking and virtualization experience
es
• Citrix product experience
• Class expectations
al
e
or
di
s
tri
b
ut
io
n
N
• Class Policies
ot
• Break and lunch schedules
fo
• Emergency contact information
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
• Active Directory
• Windows Operating Systems
ot
• Storage
fo
• Networking
rr
• Some previous administrative experience with Citrix
es
Virtual Apps and Desktops 7 (Deploy and
Administer)
al
e
or
di
s tri
b ut
io
n
Key Notes:
• Citrix recommends completing the free Citrix Virtual Apps and Desktops 7 introduction bundle at elearning.citrix.com prior to
attending this course.
N
• Module 1: Implement Redundancy and Scalability
ot
• Module 2: Manage Virtual Apps and Desktops
fo
Environment with Multiple Locations
rr
• Module 3: Implement Backups and Disaster
es
Recovery
al
e
or
di
s
tri
utb
io
n
N
Methods
ot
• Module 5: Improve App and Data Security
fo
• Module 6: Secure Machines Running the Virtual
rr
Delivery Agent
es
• Module 7: Introduction to Troubleshooting
al
e
or
di
s
tri
b
ut
io
n
N
• Module 9: Troubleshoot Delivery Controller Issues
ot
• Module 10: Troubleshoot VDA Registration Issues
fo
• Module 11: Troubleshoot HDX Connection Issues
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
• Module 13: Create an OS Layer
ot
• Module 14: Create a Platform Layer
fo
• Module 15: Create App Layers
rr
• Module 16: Create Elastic App and User Layers
es
• Module 17: Deploy a Layered Image using Citrix
al
Virtual Apps and Desktops
e
or
• Module 18: Explore Layer Priority and Maintain an
App Layering Environment
di
s
tri
b
ut
io
n
N
Management (WEM)
ot
• Module 20: Installing Workspace Environment
Management (WEM)
fo
rr
• Module 21: WEM Consoles and Initial Setup
es
• Module 22: WEM Centralized Management Features:
System and Log On Optimization
al
e
• Module 23: WEM Centralized Management Features:
or
Security & Lockdown
• Module 24: The WEM Agent
di
s
• Module 25: Upgrading Workspace Environment
tri
Management (WEM) and Migration to WEM Service
b
ut
io
n
N
• Student Manual
• Lab Manual
ot
• Lab Environment
fo
• Watch the Instructor demonstrate how to access the
rr
course materials and connect to the lab
es
environment.
al
e
or
di
s
tri
b
ut
io
n
N
per module.
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
-315
N
Credentials, specifically
ot
those used to enroll in the
course.
fo
2. When instructed to
rr
provision your labs, click
es
the module you want to
al
complete.
e
or
di
s tri
but
© 2020 Citrix Authorized Content
io
n
Additional Resources:
• Lab Access URL: <Insert link here>
N
ot
fo
rr
es
al
3. After clicking on a specific module, verify the
e
requirements and click READY TO START.
or
di
s
tri
4. On the next page, click START LAB.
but
© 2020 Citrix Authorized Content
io
n
N
ot
fo
rr
es
al
5. Verify the 5-minute countdown timer starts and
e
wait for the timer to go to zero.
or
6. If you have not done so already, ensure you
have the Citrix Workspace app or Citrix
di
Receiver installed.
s
7. Click OPEN LAB IN CITRIX RECEIVER to
tri
connect to the lab.
but
© 2020 Citrix Authorized Content
io
n
N
ot
fo
rr
es
al
e
or
8. Once the lab exercises are complete, click END
di
LAB to decommission the lab.
stri
b ut
© 2020 Citrix Authorized Content
io
n
Delivery Controller
NYC-VDC-001
• This diagram represent the StoreFront
Server OS Desktop OS
N
lab environment for this NYC-STF-001
Master Master
NYC-DTP-MST
ot
NYC-SRV-MST
course. Domain Controller
NYC-ADS-001
fo
Firewall
rr
SQL Server OS
the Instructor any issues. NYC-SQL-001 NYC-SRV-001
Desktop OS
es
NYC-DTP-001
Firewall Citrix ADC
Endpoint
• All lab environment details NYC-WRK-001
NYC-ADC-001
al
are also provided in the lab File Server
e
Citrix ADM
manual. NYC-ADM-001 NYC-FSR-001
or
Hardware Layer
di
stri
Network Wifi Storage Processor Memory Graphics Hypervisor
b ut
© 2020 Citrix Authorized Content
io
n
Key Notes:
• The course lab environment is not a production environment.
• Each VM is given enough resources to perform the lab exercises.
• There are enough lab exercises to gain valuable hands-on experience to match the lecture part of this course.
• These lab VM’s are tuned tot eh lab manual tasks, do not deviate unless instructed to by the Instructor.
• Any deviation may result in destabilizing of the lab causing intermittent or long-term failure.
• If a lab fails, it can be reset to the beginning, but it is time consuming and requires a classroom support ticket.
N
Manager for general
ot
management
• Hyper-V Manager for virtual
fo
machine management and
rr
power operations
es
• System Center Virtual
al
Machine Manager for
e
Hypervisor management
or
di
s
tri
b
ut
© 2020 Citrix Authorized Content
io
n
N
Connection Manager to
ot
connect to the lab virtual
machines (VM).
fo
• The connections are pre-
rr
configured.
es
al
e
or
di
s
tri
b
ut
© 2020 Citrix Authorized Content
io
n
N
• Power operations
ot
• Install Operating System
fo
rr
es
al
e
or
di
s
tri
b
ut
© 2020 Citrix Authorized Content
io
n
N
• Add Networking features
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
© 2020 Citrix Authorized Content
io
n
N
ot
fo
rr
es
al
e
or
1. Navigate to training.citrix.com
di
2. Click on the “Contact Us” dropdown.
s
3. Select “Classroom Support”.
tri
utb
© 2020 Citrix Authorized Content
io
n
N
courseware.
ot
• To print, click Student Resources > Courseware >
Student Manual > Launch.
fo
rr
es
al
e
or
di
s
tri
utb
io
n
N
ot
fo
rr
Help shape the next course.
es
al
Tell us what you liked!
e
or
What can we do better?
di
s
tri
utb
io
n
N
Not at all How likely is it you would recommend Citrix Courses to a friend? Extremely
ot
Likely Likely
0 1 2 3 4 5 6 7 8 9 10
fo
rr
es
\/
al
e
or
di
Detractor Passive Promoter
s
tri
but
io
n
31
The picture can't be display ed.
N
ot
fo
rr
es
al
Facebook Twitter LinkedIn
e
Become a fan of Citrix Services Follow @citrixservices Join the Citrix Education Group
or
di
Visit http://training.citrix.com to find more information on training, certifications, and exams.
s tri
b ut
© 2020 Citrix Authorized Content
io
n
32
The picture can't be display ed.
N
ot
Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration
fo
rr
es
al
e
Module 1
or
di
s
tri
but
io
n
N
Desktops deployment options.
ot
• Introduce the advanced configuration topics
fo
covered in this course.
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
Deployments - Advanced
ot
Configuration
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
Customer Data User Layer Access Layer Control Layer Resource Layer
Center
Delivery Controller
N
team manages every (Assigned
Desktop)
Domain Controller
ot
aspect of the deployment:
Firewall
• Infrastructure
fo
• Rights assignments
rr
• Resources and hardware SQL Single-session OS Remote PC
NetScaler Gateway (Random Desktop)
es
External Users Firewall
al
License Server
e
or
Hardware Layer
di
s
Network Wifi Storage Processor Memory Graphics Hypervisor
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• This model offers complete control over every aspect of the deployment, including choice of the hardware manufacturer. It also
comes with complete responsibility for designing and operating security, climate control, backup, maintenance and updates.
• A typical on‐premises configuration consists of one or more Delivery Controllers. For customers looking to use Citrix Cloud and have
Citrix host the Delivery Controller, consider the following needs:
• All current Delivery Controllers that are on premises need to use the “ListOfDDCs” option for those VDAs to remain on‐
premises.
with Public Cloud User Layer Access Layer Control Layer Resource Layer
Workloads
Delivery Controller
N
Layers hosted in (Assigned
Desktop)
Domain Controller
ot
customer’s data center.
Firewall
fo
• Resource Layer hosted in
rr
customer’s public cloud SQL Single-session OS Remote PC
(Random Desktop)
environment: NetScaler Gateway
es
External Users Firewall
• Microsoft Azure
al
License Server
• Amazon Web Services
e
• Google Cloud
or
Hardware Layer
• Requires Hybrid Rights
di
licenses.
s
Network Wifi Storage Processor Memory Graphics Hypervisor
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Citrix announced support for public cloud with Current Releases (CR) and Long‐Term Service Releases (LTSR) starting with 2203 for
customers with Hybrid Rights.
• Hybrid Rights are term‐based subscription licenses that are provided in addition to the cloud service subscription when the customer
transitions or trades up from a perpetual license to a cloud service subscription.
• Citrix offers support for Microsoft Azure, Amazon Web Services, and Google Cloud Platform for hosting resources in a public cloud.
Delivery Controller
N
team allows a third party (Assigned
Desktop)
Domain Controller
ot
to manage the hardware.
Firewall
Example:
fo
• Microsoft Azure or Google
rr
SQL
Cloud. Single-session OS
(Random Desktop)
Remote PC
NetScaler Gateway
es
External Users Firewall
• Requires Hybrid Rights
al
License Server
licenses.
e
or
Hardware Layer
di
s
Network Wifi Storage Processor Memory Graphics Hypervisor
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Simplify cloud adoption:
• Ensure a smooth and secure transition when migrating environments to the public cloud.
• Expand capacity quickly and with less capital cost.
• Manage hybrid and multi‐cloud environments:
• Leverage a common management plane across all Citrix environments.
• Use multiple disaster recovery locations or manage multiple sites and/or clouds.
N
Additional Resources:
ot
• Citrix Cloud Overview
fo
https://www.citrix.com/products/citrix‐cloud/
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
IMPLEMENT BACKUP SECURE TROUBLESHOOT
fo
rr
es
al
• Redundancy and • Backup key • Enhance application • Leading practice to
e
scalability. components and and data security. troubleshooting Citrix
• Deploy resources in • Secure Virtual environment.
or
perform disaster
multiple datacenter recovery activities. Delivery Agent. • Troubleshooting
locations. access, Delivery
di
• Advanced Controller, Virtual
s
authentication. Delivery Agent, and
tri
HDX issues.
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The first part of this course will examine some important topics to help keep a Citrix Virtual Apps and Desktops infrastructure healthy
with the main themes being resilience and security.
• Each module will look at a different aspect with practical labs to reinforce learning.
• The second part of this course will examine some important areas to help troubleshoot a Citrix Virtual Apps and Desktops
infrastructure with the main themes being tools and procedures.
• Each module will look at a different troubleshooting aspect with practical labs to reinforce learning.
N
location, hardware ownership requirements,
ot
and responsibilities for configuration. Hosting
fo
platform types: On-Premises, customer
rr
managed Cloud-based, or Full Public Cloud.
es
al
• Ensure implementation of redundancy, backing
e
up key components, securing application and
or
data, and follow leading troubleshooting
practices to have a resilient and secure Citrix
di
Virtual Apps and Desktops site.
s
tri
b
ut
io
n
N
ot
Planning: Redundancy and Scalability
fo
rr
es
al
e
Module 2
or
di
s
tri
b
ut
io
n
N
ot
• Identify components when adopting
redundancy and scalability leading practice.
fo
rr
• Recognize the importance of implementing
redundancy and scalability to Citrix
es
infrastructure components.
al
e
• Describe how to implement Redundancy and
or
Scalability to Citrix infrastructure components.
• Identify tools and indicators used to assess
di
VDA performance.
s
tri
• Determine redundancy requirements for VDA
b
ut
©machines.
2022 Citrix Authorized Content
io
n
ot
Redundancy and Scalability
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will describe why redundancy and scalability considerations are critical for the stability and optimization of Citrix
Virtual Apps and Desktops environments. Also, we will identify the components in Citrix Virtual Apps and Desktops deployments that
should be included when adopting redundancy and scalability leading practices. This will help you build a Citrix Virtual Apps and
Desktop environment that meets your organization’s growth and availability requirements.
StoreFront‐A
• Redundancy: The
elimination of single points
N
Endpoints with Citrix ADC
of failure.
ot
Citrix Workspace app Load Balancer
StoreFront‐B
• Active-Passive: Typically, a
fo
failure will result in a delay
rr
while the backup (or Active – Active Configuration
es
passive) site is brought
online.
al
e
StoreFront‐A
• Active-Active: Typically, a
or
failure will create no loss of Endpoints with Citrix ADC
availability. Citrix Workspace app Load Balancer
di
StoreFront‐B
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Redundancy is the ability of any system to experience a failure in one or more components, yet still be able to provide the service(s)
for which it is was designed.
• Single points of failure may include your license server, SQL database, Delivery Controllers, or file systems.
• In most cases, redundancy is achieved by having duplicate systems. These may be designed to be failed over to in the event of the
primary service failing, known as Active‐Passive. Alternatively, they may be designed to be running at all times, known as Active‐
Active, ensuring little or no disruption in the event the primary system fails.
N
• 2x Controller Server
ot
• HA Database Server
fo
• 2x License Server (if grace period is not acceptable)
• 2x Citrix Gateway (recommended)
rr
• Load balancing systems, like Citrix ADC, are key in providing redundancy and offer many different load balancing
es
mechanisms and can provide performance gains.
• Although adding redundant systems can offer even more resources, bottlenecks can often limit the gains provided.
al
e
or
di
s tri
b ut
io
n
StoreFront‐A
• Scalability: Adding
Citrix ADC
Components to provide the
N
Load Balancer
StoreFront‐B
expected level of
ot
performance for "Business
fo
as Usual" activity.
rr
es
al
StoreFront‐A
e
Citrix ADC
Endpoints with
or
Load Balancer
Citrix Workspace app StoreFront‐B
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• An architect will need to design a system to be able to support the expected load that allows "Business as usual" (or BAU) activities
to be conducted.
• BAU will mean different things to different organizations. An accountancy firm, for example, may have a greater demand for
resources one week per quarter, which means their system needs to be scaled to meet that demand.
• It can take a significant amount of time to scale up resources. So, it is important to ensure that a Citrix Virtual Apps and Desktops
environment can meet the near term needs of the user community.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Course
Delivery Controller
N
Domain Controller
components are essential to
ot
Firewall
the operation of a Citrix
fo
Virtual Apps and Desktops
rr
environment. SQL Single-session OS
(Random Desktop)
Remote PC
Citrix ADC/Gateway
es
Firewall
• Management and Cloud External Users
components (where
al
License Server
appropriate).
e
or
Hardware Layer
di
s
Network Wi-Fi Storage Processor Memory Graphics Hypervisor
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Citrix infrastructures can be categorized into several layers, from hardware layers hosting CPU, memory, storage, and networks
through to operational layers such as control, access, user, and resource.
• We will be looking at the redundancy and scalability of the access, control, and resource layers throughout this course. Where
appropriate, this will include Cloud components.
Multi-session OS Single-session OS
N
Internal Users StoreFront Workspace Delivery Controller (Assigned Desktop)
ot
Cloud Connectors
fo
Firewall Site Database
rr
Single-session OS
Remote PC
(Random Desktop)
es
Citrix Gateway Citrix Gateway License Server
External Users Firewall
al
Service
e
Domain Controller
or
Hardware Layer Hardware Layer
di
s
Optional
tri
on-premises Network Storage Processor Memory Graphics Network Storage Processor Memory Graphics
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• While many components require an architect to design in a redundant and scalable manner, with Citrix Cloud environment this is not
necessary. The default setup is to use Workspace to provide authentication and Store services, and the Citrix Gateway Service for
HDX connections, both of which are redundant.
• Where you need to retain on‐prem resources, you will still need to ensure that redundancy and scalability considerations are met for
non‐Cloud components such as Cloud Connectors, Gateways, and on‐premises StoreFront servers.
• In the diagram, components not managed by Citrix Cloud must continue to be managed by the organization, and so redundancy and
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
Which components required for Citrix Virtual
Apps and Desktops on-premises deployments
fo
would normally have their scalability and
rr
redundancy considerations managed by other
teams?
es
• Active Directory
al
e
• SQL
or
di
s
tri
b
ut
io
n
ot
Redundancy and Scalability
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• The first point of contact that a user has to Citrix Virtual Apps and Desktops infrastructure is at the access layer. Whether access is
direct to a StoreFront server or via a Citrix ADC, it is crucial that this system will continue to be available should any single part fail.
• This section will focus on ensuring redundancy and scalability at the access layer.
Delivery Controller
N
Domain Controller
containing multiple
ot
StoreFront servers. Firewall
• Creates Redundancy and
fo
reduces the changes of
rr
SQL
Single-session OS Remote PC
inconsistent (Random Desktop)
es
External Users Citrix Gateway
configurations. Firewall
al
synchronized login License Server
e
experience to users.
• Hosted using IIS and load
or
Hardware Layer
balancers.
di
s
Network Wi-Fi Storage Processor Memory Graphics Hypervisor
tri
b ut
io
n
Key Notes:
• Used for both, internal and external access requirements, StoreFront is hosted on standalone web servers, most often running
Microsoft IIS.
• When load balancers are placed in front of multiple StoreFront servers, you can achieve both redundancy and scalability; however,
each server has its own independent configuration. This results in the potential for an inconsistent client experience when
connecting to different StoreFront servers through a load balancer.
• The use of server groups with StoreFront allows a common configuration to be shared across multiple StoreFront servers. This
Additional Resources:
N
• StoreFront high availability and multi‐site configuration: StoreFront current version documentation
ot
StoreFront 2203 Long Term Service Release | StoreFront 2203 (citrix.com)
fo
• High Availability
https://docs.citrix.com/en‐us/storefront/current‐release/plan/high‐availability‐and‐multi‐site‐configuration.html
rr
• Configure server groups: Current Release
es
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐server‐group.html
• Load balancing with ADC: Current Release
al
https://docs.citrix.com/en‐us/storefront/current‐release/integrate‐with‐netscaler‐and‐netscaler‐gateway/load‐
e
balancing‐with‐netscaler.html
or
di
s tri
b ut
io
n
N
ot
• Single-server scalability primarily based on • There is no hard limit to the number of servers
CPUs assigned to the server. in a server group.
fo
rr
• Scalability is measured by max amount of user • However, there will be diminishing returns when
es
connections per hour. adding 6+ StoreFront servers to a server group.
al
• Access via Citrix Receiver/Workspace for Web • 2-3 StoreFront servers with 4 vCPUs and 8 GB
e
adds CPU and RAM overhead. RAM should support 150k connections per hour
or
(at a logon rate of 50 requests per second)
• Scale up first, then scale out.
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The StoreFront server, sitting in the access layer, is used to authenticate and broker connections only. It's load will be highest during
peak login periods, such as the start of the working day. The number of Citrix Receiver and or Citrix Workspace users supported by a
StoreFront server group depends on the hardware in use.
• Based on simulated activity where users log on, enumerate 100 published applications, and start one resource, expect a single
StoreFront server with the minimum recommended specification of two virtual CPUs running on an underlying dual Intel Xeon
2.27Ghz processor server to enable up to 30,000 user connections per hour.
N
• To determine whether an existing production deployment of StoreFront is sized adequately, use Citrix Director Trends to
ot
determine the maximum number of connections that are initiated over the course of an hour. If multiple Sites are
fo
aggregated by a single StoreFront server groups, the connections initiated to each Site should be added to arrive at the
total number. Combined with resource utilization data from the StoreFront servers, this can be used to support a
rr
request to allocate more resources to the existing StoreFront servers, or to add another server to the group.
es
al
Additional Resources:
• StoreFront High availability and multi‐site configuration: StoreFront current version documentation
e
https://docs.citrix.com/en‐us/storefront/current‐release/plan/high‐availability‐and‐multi‐site‐configuration.html
or
di
s tri
b ut
io
n
Users
• Single Access Route
N
• Secondary Backup Route
ot
• Automatic, Instant Switchover
fo
rr
Citrix ADC Citrix ADC
es
al
e
or
Server Server
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• StoreFront servers are primarily used to connect to resources. In most public network situations or some high security deployments,
you need to control access and provide secure session communications using a gateway. Citrix Gateway is part of the Citrix ADC
product, which can provide a secure gateway through which to access Citrix Virtual Apps and Desktops infrastructure.
• To ensure redundancy, customers historically deployed HA Pairs or GSLB (Global Server Load Balancing) when integrating with Citrix
Virtual Apps and Desktops products.
• With release 10.1 and later, most of the important features in a Citrix ADC are available in Cluster mode, which is another viable
N
• It is crucial that the "hello" messages between the primary and secondary units are not delayed to avoid triggering an
ot
incorrect failover.
fo
Additional Resources:
rr
• High Availability
es
https://docs.citrix.com/en‐us/citrix‐adc/current‐release/system/high‐availability‐introduction.html
al
• Clustering
e
https://docs.citrix.com/en‐us/citrix‐adc/current‐release/clustering.html
or
• Azure Load Balancer overview
https://docs.microsoft.com/en‐us/azure/load‐balancer/load‐balancer‐overview
di
s tri
b ut
io
n
Users
• Multi Site or Load parameters may require more
than one Citrix ADC to be active at a time.
N
ot
• Clusters require additional network setups and
configurations.
fo
rr
• GSLB requires no additional network setup.
Citrix ADC Citrix ADC
es
al
e
or
Server Server
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• A cluster or GSLB configuration exists when multiple Citrix ADC units are working effectively as a single entity sharing the load out to
a number of units servicing user requests. This allows load sharing, redundancy, and sizing to be accommodated in a single solution.
• A GSLB deployment uses DNS to identify the least busy service at the point of user request. Additional units can be added as
required.
• A Citrix ADC cluster is a group of appliances working together as a single system image. Each appliance in a cluster is called a node,
and you can have as many as 32 Citrix ADC appliances in each cluster. It is worth verifying that the features you need are available in
Additional Resources:
• High Availability
https://docs.citrix.com/en‐us/citrix‐adc/current‐release/system/high‐availability‐introduction.html
• Clustering
N
https://docs.citrix.com/en‐us/citrix‐adc/current‐release/clustering.html
ot
• Azure Load Balancer overview
https://docs.microsoft.com/en‐us/azure/load‐balancer/load‐balancer‐overview
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Users
• Third-party infrastructure which services load
balancing requests.
N
ot
• ADC infrastructure can be standalone without Azure Load
GSLB or Clustering. Balancing
fo
rr
• It is important to understand how third-party load
balancing methods work to avoid issues
es
Citrix ADC VPX Citrix ADC VPX
al
e
or
Server Server
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• With cloud solutions growing, there are several options available to facilitate load balancing and redundancy. These are normally
provided and supported by the cloud provider, and they can simplify deployments.
• In a Microsoft Azure deployment, for example, a high availability configuration of two Citrix ADC virtual machines is achieved by
using the Azure Load Balancer. This distributes the client traffic across the virtual servers configured on both the Citrix ADC instances.
• It is important that we understand how third‐party load balancing operates to ensure we do not have issues with features such as
persistence and auto‐reconnect.
N
• Azure Load Balancer overview
ot
https://docs.microsoft.com/en‐us/azure/load‐balancer/load‐balancer‐overview
fo
rr
es
al
e
or
di
s tri
b ut
io
n
• TLS (encryption) Citrix ADC VPX Citrix ADC MPX Citrix ADC SDX
N
throughput is the most • Virtual appliance that is • Physical network • Physical network
ot
significant factor in supported on most major appliance that is installed appliance that uses the
hypervisor and cloud- in an on-premises or MPX architecture
scalability and sizing.
fo
hosting platforms. service provider’s combined with Citrix
datacenter. Hypervisor to host
rr
• Each Citrix ADC platform • Depending on model, multiple Citrix ADC virtual
has multiple models with TLS throughput can
es
• Depending on model, instances simultaneously.
range from 10 Mbps to 30 TLS throughput can
increasing throughput
al
Gbps. range from 1 Gbps to 120 • TLS throughput must be
capabilities. Gbps. compared to the
e
maximum throughput for
or
• Includes dedicated CPUs the virtual VPX instance
for encryption/decryption. where the Gateway
di
vServer is located.
stri
b
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• To identify which Citrix ADC platform can meet the environment’s requirements, the key resource constraints must be identified.
Since all remote access traffic will be secured using the transport security layer (TLS), transported by Hypertext Transfer Protocol
(HTTP) in the form of HTTPs, there are two resource metrics that should be targeted:
• TLS throughput – The TLS throughput is the maximum gigabits of TLS traffic that may be processed per second (Gbps).
• TLS transactions per second (TPS) – The TPS metric identifies how many times per second an Application Delivery Controller (ADC)
may execute a TLS transaction. The capacity varies primarily by the key length (security strength) required. While TPS is an
N
required TLS throughput. However, making provisions for TLS bandwidth will help ensure the total throughput
ot
estimated is sufficient.
fo
• Ideally, the overhead should be measured during a proof of concept or pilot.
• Once the concurrent bandwidth and TLS throughput requirements are known, compare those to the Citrix ADC model
rr
that has been deployed. Citrix publishes datasheets that specify that maximum expected TLS throughput for a given
es
Citrix ADC platform and model.
al
e
or
di
s tri
b ut
io
n
N
aggregate resources from multiple Sites. They
ot
have been allocated with 2 vCPUs and 4 GB
RAM. Resource utilization and historical session
fo
data show that the StoreFront servers are at the
rr
limit of their expected capacity.
es
How should StoreFront capacity be expanded?
al
e
Increase the resources allocated to the existing
or
StoreFront servers.
di
s
tri
b
ut
io
n
ot
and Scalability
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will identify the considerations for implementing Redundancy and Scalability to Delivery Controllers, License
Servers, Site Database, and Director.
Redundancy
Delivery Controller
N
servers manage the Domain Controller
ot
deployment.
Firewall
fo
• Deployments should have
rr
SQL
at least two Delivery Single-session OS
(Random Desktop)
Remote PC
Controllers.
es
External Users Firewall Citrix Gateway
al
License Server
e
or
Hardware Layer
di
s
Network Wi-Fi Storage Processor Memory Graphics Hypervisor
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The delivery controller is responsible for facilitating connection requests in cooperation with the StoreFront and ADC Servers. Once a
session is operational, the Delivery Controller continues to communicate with the session to extract performance and alerting
information. The delivery controller, therefore, has a critical role in both connectivity and session operation.
• If the only Delivery Controller fails, existing sessions will not be impacted; however, performance and alerting data will not be
available. New sessions will not be able to be launched and power management features, such as switching on additional machines
to meet demand will not be able to be met. As there is no way to communicate with the SQL, configuration management of the
N
This avoids potentially removing a logon that is used by other products’ services on the same machine. The logon must
ot
be removed manually if it is no longer required; the security admin server role permission is needed to remove the
fo
logon.
rr
Additional Resources:
es
• Citrix VDI Handbook
al
https://docs.citrix.com/en‐us/legacy‐archive/downloads/citrix‐vdi‐handbook‐7‐6‐ltsr.pdf
• Delivery Controllers (Current Release)
e
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/manage‐deployment/delivery‐controllers.html
or
di
s tri
b ut
io
n
• The sizing equation below is a baseline for estimating how many Delivery Controllers are needed in a Site or
Zone.
• Delivery Controller scalability is primarily based on CPU utilization.
• Local host cache considerations should play a part in sizing decisions.
N
• Use resource monitoring on the Delivery Controller(s) to track and validate scalability.
ot
fo
rr
es
Delivery Controller Sizing Equation Assumed Specifications
al
e
• 4 vCPU
or
୳୫ୠୣ୰ ୭ ୡ୲୧୴ୣ ୗୣୱୱ୧୭୬ୱ ୮ୣ୰ ୗ୧୲ୣ ୭୰ ୭୬ୣ
• 4 GB RAM
1 ൌ Number of Delivery Controllers • Bonded virtual NIC
ହ,
di
• 40 GB storage
s tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The sizing equation is useful for making quick estimates as to the scalability of a Delivery Controller, but a few factors can affect how
an administrator might want to size the Controllers in their environment.
• Local host cache introduces new considerations that were not applicable to earlier versions of Citrix Virtual Apps and Desktops. In
a Site database outage scenario, any of the Delivery Controllers in a Site could be elected as the primary broker. This means that
all Delivery Controllers must be sized to provide an acceptable level of scalability in this scenario.
• Because local host cache uses a SQL Server Express LocalDB to store Site data, only a single CPU socket and up to four cores can
N
Controller during an outage. Note that these numbers count machines, not sessions, in contrast to the estimate
ot
above.
fo
Additional Resources:
rr
• Design methodology control layer – Delivery Controllers – Decision: Server Sizing
es
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/system‐requirements.html
al
• Local Host Cache
e
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/manage‐deployment/local‐host‐cache.html
or
di
s tri
b ut
io
n
N
ot
Redundancy Options Scalability Considerations
fo
rr
• Duplicate standby License Server • A server with 2 vCPUs and 2 GBs
es
of RAM can issue 170 licenses per
• Load Balanced License Server
al
second
e
• Microsoft Cluster
• Optimize Receive and Processing
or
parameters
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Some Citrix components can operate without a license server for a period of time; however, for others a working license server is a
critical component.
• Traditionally, License files are assigned against a server name resulting in some special considerations for redundancy. This may mean
that a duplicate, identical license server in a passive state, is switched on if the active license server is detected as down.
• Multiple license servers must not be issuing licenses at the same time because of EULA restrictions, which is why active‐passive load
balancing is a useful option.
N
• The optimal values are dependent on the server hardware, site configuration, and license request volume. Citrix
ot
recommends testing and evaluating different values to determine the optimal configuration. Setting the maximum
fo
number of processing threads to 30 and the maximum number of receiving threads to 15 is a good starting point for
large scale deployments. This optimization will improve the Citrix License Server‘s ability to provide licenses by
rr
increasing its ability to receive and process license requests.
es
al
Additional Resources:
• Clustered license servers
e
https://docs.citrix.com/en‐us/licensing/current‐release/clustered‐license‐servers.html
or
• Making the Citrix License Server (Truly) Highly Available
di
https://www.citrix.com/blogs/2015/02/12/making‐the‐citrix‐license‐server‐truly‐highly‐available/
s
• Improve performance by specifying thread use
tri
https://docs.citrix.com/en‐us/licensing/current‐release/manage/thread‐use.html
b ut
io
n
Redundancy SQLServer-A
Options
on Node01 Active
Database
N
• Always On
ot
SQL Mirror
• Mirroring Active
fo
SQLServer-A
• Cluster Database
rr
es
Controller SQLServer-B Mirror
SQLServer-C Database
al
SQL Cluster
e
or
SQLServer-A
di
Shared Storage Active
s
Controller Virtual Database Database
Server
tri
SQLServer‐B
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Although we have technologies such as the Local Host Cache the most efficient way to ensure redundancy is to avoid the loss of
critical Citrix Virtual Apps and Desktops databases. If we focus on Microsoft SQL server we have three main options to protect the
site databases.
• SQL Always On uses a failover approach combined with a duplicated copy of the original database. Key here is that the replica
databases can also be used for reads so improvements in scalability and performance can also be observed with Always On.
• SQL mirroring uses a witness server to ensure the database is maintained over two locations and automatic failover occurs when the
Additional Resources:
• Supported Databases for Citrix Virtual Apps and Desktops Components
https://support.citrix.com/article/CTX114501
N
• Always On Availability Groups (SQL Server):
ot
https://docs.microsoft.com/en‐us/sql/database‐engine/availability‐groups/windows/always‐on‐availability‐groups‐sql‐
fo
server?view=sql‐server‐2017
rr
es
al
e
or
di
s tri
but
io
n
N
Database Expected Key Sizing factors
ot
Users CPU RAM Type max. size
0 – 5K 2 cores 4 GB RAM
fo
Number of users, published
30 – 390
Site applications, virtual desktop
rr
5 – 15K 4 cores 8 GB RAM MBs
type.
es
15K+ 8 cores 16 GB RAM
20 MBs Retention period, number of
al
Monitoring to 119 users, number of
• Host database files and transaction logs on
e
GBs connections.
separate hard disk subsystems.
or
Config. 30 – 200 Usage of MCS, number of
• This will help the database cope with high Logging MBs administrative actions.
di
number of transactions during boot storms.
s
• Sizing estimates do not include transaction
tri
logs, and in larger environments, these should
be monitored and backed up regularly to
b ut
© 2022 Citrix Authorized Content prevent excessive growth.
io
n
Key Notes:
• The SQL server must be sized correctly to ensure the performance and stability of an environment. Since every Citrix product uses
SQL server in a different way, no generic all‐encompassing sizing recommendations exist, but are available on a product‐by‐product
basis.
• For Citrix Virtual Apps and Desktops environments not using MCS, the configuration logging database size tends to fall between 30
and 40MB. For MCS environments, database size can easily exceed 200MB due to the logging of all VM build data.
• In addition to the Site, Monitoring, and Configuration Logging databases, a system‐wide temporary database (tempdb) is provided by
N
session brokering, as any transactions that generate new data require tempdb space. Citrix Virtual Apps and
ot
Desktops tends to have short‐lived transactions, which help keep the size of the tempdb small.
fo
• For an existing production environment, regular monitoring of storage utilization of the SQL server(s) hosting the Site
databases should be completed by the team managing the SQL deployment. Regularly performing backups of the SQL
rr
transaction logs can help to limit the growth of the Site databases.
es
al
Additional Resources:
• How to Enable Read‐Committed Snapshot
e
https://support.citrix.com/article/CTX137161
or
di
s tri
b ut
io
n
Delivery Controller
Admin with Director
• Consider multiple Citrix Director servers if high
availability for Site monitoring is a requirement.
N
Enterprise Deployments
ot
• Citrix Director can be co-located with the Delivery
Controller role in small or non-production
fo
environments. Director Server Delivery Controller
rr
Admin
es
teams, use a dedicated server or servers with 4 High-Availability Deployments
al
vCPU, 4 GB RAM as a baseline.
e
or
Director Server Delivery Controller
di
Citrix
Admin
Gateway
s
Director Server Delivery Controller
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• From a redundancy point of view, if a Citrix Director server goes offline, administrators will lose the ability to monitor the Site, but
end user sessions will not be affected. Configuring Citrix Director on multiple servers will mitigate this issue if high‐availability is
desired for monitoring.
• A load balancer, such as Citrix ADC, can be used to distribute the load between multiple Director servers.
• During initial installation, only one Controller per Site should be entered. Director automatically discovers all other Controllers in
the same Site and falls back to those other Controllers if the configured Controller fails. Director does not load balance between
N
Additional Resources:
ot
• Citrix Director – Advanced configuration
fo
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/director/install‐and‐configure/advanced‐configuration.html
rr
es
al
e
or
di
s tri
b ut
io
n
N
When configuring CPUs for a Delivery Controller
ot
machine, is it better to configure four sockets,
one core per socket, or one socket with four
fo
cores?
rr
es
It is preferable to have one socket with four
al
cores allocated to it, so that all the cores can be
e
used if the Controller is elected as the primary
broker when Local Host Cache is in use.
or
di
s
tri
b
ut
io
n
N
For Module 2.
ot
fo
rr
es
al
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
ot
Delivery Agent
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this this lesson, we will identify tools and indicators used to assess VDA performance and determine the redundancy requirements
for VDA machines.
N
“N+1” machines per Delivery Group.
ot
• Each organization must determine the availability
fo
and capacity of VDAs in the event of a VM, host,
rr
chassis, or datacenter-level outage.
es
• Work to learn the business requirements of the end
al
users and translate those into redundancy
e
3. Test and Deploy
requirements for each resource hosted on Citrix
or
Virtual Apps and Desktops.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• There is no singular “leading practice” for the redundancy of machines hosting HDX sessions. Each organization must make its own
tradeoff between cost and increased availability.
• For example, non‐production and lab environments may be located on a single host, or even a single VM with a nested hypervisor.
On the other hand, critical production workloads may be hosted in multiple datacenters to provide the highest level of
redundancy possible.
• Investigate the business requirements of the end user groups, in terms of application and or desktop criticality, availability
N
team whenever possible; but he acknowledged that the application’s backend databases were hosted in a single
ot
datacenter, so there was no expectation of access if the entire datacenter suffered an outage.
fo
• As a result of these requirements, the Citrix administrative team worked with the hardware team to ensure that the
VDA machines hosting the application were not all located on the same physical host or rack in the primary
rr
datacenter. As a result of this approach, the team minimized the number of surplus machines that needed to be
es
created.
al
e
or
di
s tri
b ut
io
n
N
tracked over time.
ot
• Perform regular capacity assessment of the
fo
Citrix environment to determine environment
rr
utilization and required capacity adjustments, if
es
needed.
al
• Tools such as Citrix Director and the Citrix
e
Analytics can assist in performing a capacity
or
assessment.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Even when a Citrix environment goes through a formal design and is sized based on capacity requirements, once the environment is
in production, regular capacity assessments with help plan for future growth as more users access the environment.
• A baseline of the environment performance should be taken, so that it can be compared against performance over time.
• For example, if a user complains of poor performance, this baseline can be used for comparison purposes to identify if the issues
are related to the user load exceeding the capacity of the environment.
• An example of baseline performance metrics for capacity management would include historical data for CPU, Memory, and
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
• Citrix Optimizer
ot
• Workspace Environment Management
(WEM)
fo
• Citrix Optimizer is part of WEM.
rr
es
• It is important to test optimizations
before implementing them in
al
production.
e
or
di
s tri
Citrix Workspace Environment
Management (WEM)
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In order to enhance performance and increase scalability, Citrix administrators can use tools such as the Citrix Workspace
Environment Management (WEM) tool to prepare and configure environments for optimal performance.
• Citrix Workspace Environment Management (WEM) has additional system optimization features that can provide benefits in
controlling resource usage and configuring the user environment.
• The Citrix Optimizer, included with WEM is a powershell based tool, with GUI, that analyzes an environment, allows optimizations to
be executed from template driven infrastructures with the ability to rollback an optimization if issues are found.
Additional Resources:
• Citrix Optimizer
https://support.citrix.com/article/CTX224676
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
What are some tools that Citrix offers to help
assess and optimize the performance of
fo
machines hosting apps and desktops?
rr
es
• Citrix Analytics
al
• Citrix Optimizer
e
• Citrix Workspace Environment Management
or
di
s
tri
b
ut
io
n
N
ot
• Exercise 2-2: Edit the Store to Add the Second
Delivery Controller
fo
rr
• Exercise 2-3: Test Local Host Cache
es
• Exercise 2-4: Join the Second StoreFront Server to
the Server Group
al
e
• Exercise 2-5: Configure Load Balancing for the
StoreFront Servers
or
• Exercise 2-6: Test the Load Balancing of the
di
StoreFront Servers
s
tri
b
ut
io
n
N
critical for the stability and optimization of Citrix
ot
Virtual Apps and Desktops environments.
fo
• Some components may already be redundant or
rr
easily scalable in a Citrix Virtual Apps and Desktops
environment.
es
• Maintaining business as usual is a critical driver for
al
both redundancy and scalability.
e
or
di
s tri
b ut
io
n
Key Notes:
• To ensure platform stability and resource availability for business‐as‐usual activities an engineer must ensure both redundance and
scalability needs are met.
• Depending on each environment some components may already be redundant or have inbuilt redundancy.
• The primary objective for redundancy and scalability is to maintain a business‐as‐usual position.
N
require the use of third-party solutions in addition to
ot
Citrix technologies and hardware.
fo
• Various tools, both Citrix and third-party allow
rr
engineers and architects to assess the needs of a
Citrix Virtual Apps and Desktop deployment.
es
• Find out user requirements to guide redundancy
al
decisions for VDA machines and implement
e
Windows optimizations to gain the most from each
or
machine.
di
s tri
b ut
io
n
Key Notes:
• Redundancy and scalability implementation will often require the integration of third‐party solutions which need careful planning to
ensure proper integration.
• There are a wide variety of tools available to engineers to accurately plan for deployment redundancy and scalability needs.
• Decisions on how much redundancy is required will be driven by user requirements.
N
ot
Planning: Virtual Apps and Desktops Environment with Multiple Locations
fo
rr
es
al
e
Module 3
or
di
s
tri
but
io
n
N
ot
VDAs in single-zone and multi-zone
environments.
fo
• Explain the purpose of Zone Preference
rr
options and how they control the behavior of
es
app and desktop launches.
al
• Compare the differences between StoreFront
e
standard routing and StoreFront optimal
or
gateway routing (OGR).
di
• Describe how StoreFront resource aggregation
s
tri
is used for application grouping and load
b
balancing and identify its configuration
ut
methods.
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes
• Identify the benefits of creating multiple Zones in a Citrix Virtual Apps and Desktops Site that has geographically dispersed resource
locations
• Identify the tasks to move a machine catalog between zones.
N
deployment of a single Citrix Virtual Apps
ot
and Desktops site across multiple
geographically distributed datacenters.
fo
rr
• A site will always contain a primary zone
and, optionally, several satellite zones.
es
al
• The primary zone must contain at least one
e
Delivery Controller and access the site
database.
or
• A satellite zone can contain VDAs (machine
di
catalogs and delivery groups), Delivery
s tri
Controllers, StoreFront servers, Citrix
b
Gateway servers, and Hypervisor
ut
© 2022 Citrix Authorized Content
connections.
io
n
Key Notes:
• A site always has a primary zone, which is used to host control plane resources. It can also have one or more secondary, or satellite
zones.
• Satellite zones can be used for disaster recovery or connection routing.
• Zones will often be used where you have geographically‐distant datacenters, branch offices, or cloud locations.
• Primary zone:
• The primary zone has the default name "Primary", which contains the SQL Server site database, Studio, Director, Citrix StoreFront,
N
• A satellite zone, particularly a large one, might also contain a hypervisor that is used to provision and or store
ot
machines for that Zone. When you configure a satellite zone, you can associate a hypervisor or cloud service
fo
connection with it.
• Be sure any machine catalogs that use a Hypervisor or cloud connection are in the same Zone.
rr
es
Additional Resources:
• Citrix Virtual Apps and Desktops Zones
al
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/zones.html
e
or
di
s tri
b ut
io
n
N
• Each location has a deployed site. • 1 site • 1 site, 3 Zones, Control Plane in Citrix
ot
• Each location has a Delivery Controller • 3 Zones Cloud
fo
and SQL server. • Control Plane on-premises • The control plane is hosted in Citrix
rr
• High Availability implementations, such Cloud, where High Availability is built
as Delivery Controller, are per site. in.
Result:
es
• Less administrative overhead, with • A site can have zero or more satellite
al
Result: only 1 site to manage zones, which can consist of VDAs and
e
• 3 times the work to manage 3 one or more Connectors, with or
separate sites without infrastructure servers.
or
• None of the office locations have a
di
Delivery Controller or a SQL server.
s
Result:
tri
• Less administrative overhead, with
b
only 1 site and no infrastructure to
ut
© 2022 Citrix Authorized Content manage.
io
n
Key Notes:
• Option 1 does not include the deployment of Zones.
• Each site deployment automatically creates a zone and puts all infrastructure and resources into this zone, known as the primary
zone.
Additional Resources:
• Citrix Virtual Apps and Desktops Zones
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Deployment Example
primary zone
New York (NYC)
N
ot
• Using a single site across multiple locations Delivery Controller
simplifies management.
fo
rr
Linux Desktop Hosted Desktop Assigned Desktop
• For example:
• New York is the primary zone and will host the site
es
satellite zone satellite zone
database and Citrix infrastructure. San Francisco (SFO) Miami (MIA)
al
• Miami is a satellite zone that only hosts a machine
catalog.
e
• San Francisco, as a larger satellite zone, hosts both a
or
Delivery Controller
Delivery Controller and a machine catalog.
di
Remote PC
s
Assigned Desktop
tri
b ut
© 2022 Citrix Authorized Content
© 2022 Citrix Authorized Content
io
n
Key Notes:
• From Citrix Virtual Apps and Desktops version 7.7 we can now span a single Citrix Virtual Apps and Desktops site across multiple
datacenters and geographical locations.
• The site database should always be in the primary zone and for optimal performance, install Studio and Director only in the primary
zone.
• While it is possible to have satellite zones without any controllers, it is recommended to configure at least one controller for each
satellite zone to ensure faster and more reliable VDA registration, and to ensure registration during WAN outages.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
SQL
• Every site has one primary
zone. Delivery Controller
N
Director
• Delivery Controller
ot
• License server Desktops Apps
• Studio and Director
fo
• Optional Components:
rr
Zone 2 Satellite Zone 2 Satellite
• Citrix Gateway San Francisco (SFO) Miami (MIA)
• StoreFront
es
• One or more VDAs *
• Machine catalogs
al
• Host connections
e
* Desktop OS and or Server
Delivery Controller
or
Resources Resources
OS machines running the
VDA.
di
s
Desktops Apps Desktops Apps
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Each Citrix Virtual Apps and Desktops site will start off with a single zone, created by default, called the primary zone.
• The primary zone will contain all the key components for operation of the site.
• In addition, secondary sites can be added to support a distributed infrastructure. These sites should, but don't have to contain
Delivery Controllers, allowing for local VDA registration with failover to a Delivery Controller in the primary zone.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Director
• One or more Machine
ot
catalogs Desktops Apps
• One or more Cloud
fo
Connectors, if using Citrix
rr
Cloud Zone 3 Satellite Zone 3 Satellite
San Francisco (SFO) Miami (MIA)
• Optional Components:
es
• Delivery Controller
• Citrix Gateway
al
Machine Catalog Machine Catalog
• StoreFront
e
• Host connections Delivery Controller
or
* Desktop OS and/or Server OS Resources Resources
di
s
Desktops Apps Desktops Apps
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• A satellite zone is designed to contain resources needed to host Citrix Virtual Apps and Desktops in locations remote to the primary
zone and or datacenter. A zone needs to contain at least VDAs and machine catalogs.
• To avoid overloading during high‐load session launches, a registry setting on the Controller can be used to throttle concurrent end‐
user launches. This is located at HKLM\Software\Citrix\DesktopServer\ThrottledRequestAddressMaxConcurrentTransactions.
• In some test situations, high latencies between satellite zones and the database in the primary zone, coupled with a relatively high
rate of application and desktop connection, launches by end‐ users using a Controller in the satellite zone, could cause new launches
N
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
ot
7KLVVOLGHLV HGLWDEOH$GDSWLWWR\RXUQHHGV
Manage multiple locations without multiple
Primary
fo
DQGFDSWXUH\RXUDXGLHQFH VDWWHQWLRQ
Reason SQL databases.
rr
es
al
e
Control VDA registration during normal
or
circumstances and during Delivery Controller failure.
7KLVVOLGHLV HGLWDEOH$GDSWLWWR\RXUQHHGV 6HFRQGDU\
Control app location launches
DQGFDSWXUvia Zone Preference.
di
H\RXUDXGLHQFH VDWWHQWLRQ 5HDVRQV
s
Reduce long distance WAN traffic.
tri
b ut
© 2022 Citrix | Confidential
io
n
Key Notes:
There is no real limitation on how many VDAs you can run per zone. It would only be limited based on the resource constraints of the
host hypervisor platform.
With a small secondary site, there may be no need for Delivery controllers if you have a stable, low latency connection to the primary
zone; however, as load increases in a Secondary Zone, performance may degrade when connecting to resources.
N
ot
• Use zones in the Manage console to map items to
Resource Locations:
fo
• Cloud Connectors
rr
• machine catalogs
es
• Host Connections
• Users
al
• Application Groups
e
• Citrix DaaS zones do not use a Primary and or
or
Secondary setup like an on-premises site, and
have in-built fault tolerance.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Zones in Citrix Cloud, as displayed in Cloud Studio, reference resource locations. Using Cloud Zones, you can map Cloud Connectors,
machine catalogs, Host Connections, Users, and Application groups to a particular Resource Location.
• In a Citrix DaaS site, there is no primary zone because the Database and Delivery Controllers reside in Citrix Cloud and not inside the
resource location. This means that for each resource location created in the Cloud Control Plane, a corresponding Zone is created
inside Cloud Studio.
• When a hypervisor connection is placed in a zone, it is assumed that all the hypervisors managed through that connection also reside
N
between components that are impacted by latency. For example, moving a catalog to a different zone than the
ot
connection (host) that creates the machines in the catalog, can affect performance.
fo
Additional Resources:
rr
• Zones in Citrix Cloud
es
https://docs.citrix.com/en‐us/xenapp‐and‐xendesktop/service/manage‐deployment/zones.html
• Citrix Virtual Apps and Desktops Zones
al
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/zones.html
e
or
di
s tri
b ut
io
n
N
ot
What is a benefit when using zones in a
fo
Citrix Virtual Apps and Desktops site?
rr
es
Reduces the network traffic between geographically
al
separated datacenters.
e
or
di
s
tri
b
ut
io
n
ot
Environment
fo
rr
es
al
e
or
di
s tri
but
io
n
Key Notes
• Describe the VDA registration process for VDAs in single Zone and multi‐Zone environments.
• Identify the requirements of moving Machine Catalogs between Zones.
N
• Install VDA software on the VM. • Auto-update
ot
• Specify Delivery Controller address.
fo
• Citrix Desktop Service (BrokerAgent.exe) • Group Policy
rr
contacts controller to register as available.
es
• Manually
al
e
• Machine Creation Services
or
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• It is critical that the VDA registers with a Delivery Controller for management, enumeration, and session operation. The registration
process can be completed using a number of methods.
• The auto update method allows VDAs to receive an updated list of available Delivery Controllers every 90 minutes. This allows
Delivery Controllers to be added or removed from the site without any additional configuration on the VDAs. It is controlled by a
Citrix Policy and is enabled by default.
• Some deployments cannot use auto‐update and they must self‐manage. These are:
N
update persistent storage. Each Controller also checks the site Configuration Database every 90 minutes for Controller
ot
information. This means if a Controller has been added or removed since the last check, or if a policy change has
fo
occurred, the Controller sends updated lists to its registered VDAs.
rr
• A VDA will accept connections from all the Controllers in the most recent list it received. If that list does not include the
es
Controller it is registered with (in other words, that Controller was removed from the site), the VDA re‐registers,
al
choosing among the Controllers in the list. After a VDA registers or re‐registers, it receives an updated list, and the
process starts again.
e
or
Additional Resources:
• Citrix Virtual Apps and Desktops Current Release: Delivery Controllers
di
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/manage‐deployment/delivery‐controllers.html
s tri
b ut
io
n
Active Directory
N
ot
OR
fo
2. Desktop Service checks the registry for VDA uses Desktop
5
rr
Service
ListOfDDCs. (BrokerAgent.exe)
to initiate the
es
Virtual Delivery Delivery Controller
3. Validates each Delivery Controller listed in AD by Agent
registration process
over TCP (BrokerService.exe)
DNS entry. (BrokerAgent.exe) Port 80
al
1 & 2
e
4. Obtains a Kerberos ticket from AD for each
Delivery Controller found to allow communication.
or
5. Makes a call for “Registration”.
di
Site Database
s tri
b ut
© 2022 Citrix Authorized Content
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The VDA Registration Process starts with:
1. A check to see if Auto‐update of DDCs is enabled. If so, the VDA gathers the list of all available controllers, OR
2. The VDA checks its registry entry for ListOfDDCs (manually or GPO populated).
3. Once a list of DDCs is obtained it is validated by DNS entry.
4. The next stage is to obtain a Kerberos ticket from AD for each controller found to allow for communication.
5. The VDA can then make a call for “Registration”.
Active Directory
N
7. BrokerService.exe attempts to validate the
ot
Kerberos ticket and VDA details from AD.
fo
8. Obtains Kerberos ticket for communication with VDA uses Desktop
rr
Service
VDA. (BrokerAgent.exe)
to initiate the
es
Virtual Delivery 9 Delivery Controller
9. Two -Way test for Callback is made to complete Agent
registration process
over TCP (BrokerService.exe)
registration. (BrokerAgent.exe) Port 80
al
e
or
6
di
Site Database
s tri
b ut
©
© 2022
2022 Citrix
Citrix Authorized
Authorized Content
Content
io
n
Key Notes:
• The VDA Registration Process continued:
6. Before confirming registration, the VDA identity and functional level are validated.
7. Next BrokerService.exe attempts to validate the Kerberos ticket and VDA details from AD.
8. A Kerberos ticket is then obtained for communication with the VDA.
9. Finally, a two‐Way test of Callback is made. This two‐way test needs to be confirmed by both VDA and controller for hard
registration to be successful.
N
Delivery Controllers in satellite zones. Delivery Controller in the primary zone.
ot
fo
rr
Zone 1 (Primary) Zone 2 (Satellite) Zone 1 (Primary) Zone 2 (Satellite)
New York (NYC) San Francisco (SFO) New York (NYC) San Francisco (SFO)
es
al
SQL SQL
e
or
Delivery Controller Delivery Controller Delivery Controller Delivery Controller
Resources Resources Resources 1 Resources
di
s
2
tri
Desktops Apps Desktops Apps Desktops Apps Desktops Apps
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• For on‐premises deployments, the VDA Registration process will always try to use a Delivery Controller within the zone that the VDA
is located.
• When no Delivery Controllers in the same zone respond, the VDA will then seek to register with a delivery controller in the primary
zone.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
site 1
When the first attempt to register fails, the VDA Zone 1 (Primary)
New York (NYC)
Zone 2 (Satellite)
San Francisco (SFO)
N
follows this pattern:
ot
fo
1. A VDA in a satellite site unsuccessfully
Delivery
attempts to contact a Delivery Controller. Delivery
rr
Delivery Delivery
Controller Controller Controller Controller
es
4 3 2 1
2. The VDA will next attempt to register with
another Delivery Controller in its local zone.
al
e
3. If that is unsuccessful, or no other Delivery
or
Controllers exist in its local zone, the VDA will
contact a random Delivery Controller in the
di
primary zone.
s tri
4. The VDA proceeds to attempt registration with
b
other Delivery Controllers in the primary zone
ut
until none are left to try.
io
n
Key Notes:
• In this example, the VDA is able to register with the final Delivery Controller in the primary zone after attempts to register with
Delivery Controllers in its own zone and one in the primary zone failed. This means the VDA stays registered in the primary zone,
even if a Controller in satellite zone becomes available again. If an administrator wants to later return the VDA back to their original
satellite zone it will require a manual restart of the VDA, or its Citrix Desktop Service (BrokerAgent.exe), which will force a new
registration. Essentially, any action that triggers the agent to attempt re‐registration will move it back to one of its local satellite zone
controllers.
Additional Resources:
• Zones ‐ Where VDAs register and where Controllers fail over
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/zones.html
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
zone, the VDAs in that catalog will re-register
ot
with Controllers in the zone you move the
catalog to.
fo
Delivery Delivery Delivery Delivery
Controller Controller Controller Controller
rr
• When you move a catalog, make sure you
Machine Catalog Machine Catalog
also move any associated host connection to
es
the same zone.
al
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• An Administrator may want to move specific machine catalogs to a different zone for a number of reasons. These include;
• Changing the host infrastructure.
• Following user and user VDA relocation.
• To meet disaster recovery standards.
• To ease overall site resource organization and administration.
• Catalogs can be moved from one zone to another using Citrix Studio by:
Additional Resources:
• Move items from one zone to another zone
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/zones.html
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
and registers with Controller B, which was
ot
specified during VDA installation). Controller
fo
B is removed from the site.
rr
If Auto-Update is enabled, what happens
es
next?
1. The VDA receives an updated list of Delivery
al
Controllers 90 minutes later, the list does not
e
include Controller B.
or
2. Then, the VDA will proceed to attempt
di
registration with Controller A or C.
s
tri
3. Once it successfully registers with one of
b
these Controllers, it receives another updated
ut
list.
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes
• Describe the purpose of each of the Zone Preference options.
• Describe how Zone Preference is used to control app and desktop launches for new sessions and when reconnecting to disconnected
sessions.
N
in controlling which VDA is to be used when
ot
launching an application or desktop in a
multi-zone site.
fo
rr
• An Administrator can manage how a broker
selects a preferred launch zone when a user
es
session is initialized.
al
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Setting a preferred zone allows you to control which VDA, in terms of the zone it is in, that should be used as the preferred VDA from
which to launch an app or desktop when you have a multi‐Zone environment.
• This can be useful in launching specific resources depending on the user’s requirements.
• This process can be controlled by configuring preferred launch zones.
N
Application User
User Home
ot
Home Location
fo
rr
es
The Application "Home option" of The User Home option of The User Location option of zone
al
zone preference will result in the zone preference will result in preference will result in the broker
broker selecting the launch zone
e
the broker selecting the selecting the launch zone where the
where the application is configured launch zone where the user’s user is currently located.
or
and its data stored. home data is located (such
di
as profile share). Wherever the user's Citrix Workspace
s
app is running will be identified and
tri
chosen as the launch zone for that
b
session.
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Zone Preference can be configured in one of three ways with only one being selected for launching resources. By default, if more
than one way is configured, the priority for selecting the preferred zone is:
• Application Home
• User Home
• User Location
• Some examples of how Zone Preference priority works are:
N
assigned ones. In addition, application home supports applications only. There is no support specific to Published
ot
Desktops (VDI) or Server Desktops.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
No
Mandatory
N
Mandatory Application
Application
ot
User Home Home
Home
fo
Zone
rr
es
This option will prevent a session This option will prevent a (Ignore configured user home zone.)
al
from being launched in an alternate session from being launched
zone if the users’ session cannot be
e
in an alternate zone if an If you do not specify a home zone for
launched in their Home zone. applications home zone is an application, you can also indicate
or
not available. that any configured user zones should
di
not be considered when launching that
s
application.
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
Key Notes:
• Zone Preference provides three options with the ability to further restrict how user and application Home zones are handled for
launch requests. These three options are:
• Mandatory User Home zone.
• Mandatory application home zone.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Broker Service will 2
non-preferred zone.
ot
always attempt to launch
an application or desktop
fo
in the preferred zone. 3 Start a new session in the preferred zone.
rr
es
• Zone Preference
occurs even if there is an Connect to an existing session in a non-preferred
al
existing session for a 4 zone.
e
user who launches a new
or
application that could
Start a new session in a in a non-preferred zone.
di
share (Session Sharing) 5
s
the already existing
tri
session.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• It should be noted that Zone Preference usually takes precedence over Session Sharing.
• Default behavior would normally mean that a user would connect to any existing session in the preferred zone. If no existing session
is available, then the user would connect to a disconnected session in a non‐preferred zone.
• Where no existing or disconnected sessions exist, the user would start a new session in the preferred zone before connecting to an
existing session in a non preferred zone.
Additional Resources:
• Zone Preference (Order of Preference)
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops‐service/manage‐deployment/zones.html
N
ot
fo
rr
es
al
e
or
di
s tri
utb
io
n
N
ot
What is the default priority order for
selecting the preferred zone to process the
fo
session launch?
rr
es
Application Home
al
User Home
e
User Location
or
di
s
tri
b
ut
io
n
ot
Zones
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• Compare the differences between StoreFront standard routing and StoreFront optimal gateway routing (OGR).
N
(SITE) New York San Francisco (SITE)
a launch request.
ot
• By default, HDX connections HTTP(S)
fo
pass through the Citrix
rr
Citrix Citrix
Gateway that made the Gateway Gateway
es
launch request regardless of
where the resources are
al
geographically located.
e
HDX traffic passing
or
over inter‐
datacenter link
di
Word 2019
StoreFront StoreFront
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• A user may connect or be redirected to a Citrix Gateway near to their physical location, such as San Francisco, in this example. The
StoreFront server in San Francisco will enumerate the launch request, setting up the routing via the San Francisco gateway, despite
the user’s resource being in New York.
• The key is that with standard routing, the HTTPS and HDX traffic will all go through the same Citrix Gateway, the one that was used
for the initial connection, even when the user desktop and apps are in a different datacenter.
N
the gateway closest to the
ot
HTTP(S)
resource.
fo
Citrix Citrix
• Enumeration and HDX traffic Gateway Gateway
rr
may use different gateways.
es
• HDX traffic is prevented from
al
traversing the network
e
between datacenters.
or
StoreFront Word 2019 StoreFront
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• From StoreFront 3.5, you have been able to configure routing to allow enumeration to occur at the point of nearest StoreFront server
while HDX traffic takes the most direct route to the user resources from their location.
Additional Resources:
• StoreFront
https://docs.citrix.com/en‐us/StoreFront/current‐release.html
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
• Older versions of StoreFront:
ot
• Optimal HDX Routing was configured using
PowerShell.
fo
rr
• StoreFront 3.12+:
• Optimal HDX Routing is configured using the
es
StoreFront management console.
al
• Optimal HDX Routing can be mapped using
e
zones and Delivery Controllers.
or
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The Optimal Gateway Routing feature lets you override the Citrix Gateway used for ICA connections. To achieve this, you must
configure StoreFront to associate Citrix Gateway instances with zones (HDX Optimal Routing). Citrix Workspace app will then attempt
to use the preferred Citrix Gateway for the zone hosting the resource.
Additional Resources:
• StoreFront high availability and multi‐site configuration
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Instead of using PowerShell, what is an
ot
alternative method to configuring Optimal
fo
Gateway Routing?
rr
es
Using the StoreFront Management Console, within the
"Configure the Store" Settings.
al
e
Under "Optimal HDX Routing", Delivery Controllers or
Zones may be specified to configure Optimal Gateway
or
Routing.
di
s tri
b ut
io
n
Key Notes:
• If you enable Optimal Gateway Routing using PowerShell, the changes will automatically appear in the StoreFront Console.
• If you have a Server Group set with multiple StoreFront servers, enabling Optimal Gateway Routing must be propagated manually
across the Server Group.
• Optimal Gateway Routing can only be enabled via the StoreFront console, or PowerShell.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• Describe how StoreFront resource aggregation is used for application grouping and load balancing across multiple sites.
• Identify methods used to configure StoreFront resource aggregation features.
Resource
Aggregation Receiver for Aggregation
Outlook
web Group
NYC‐DDC
• Identical desktop or
application resources from
N
Outlook SFO site
different site deployments
ot
are grouped, and then
fo
aggregated as a single icon Outlook
rr
to users. Outlook StoreFront
Endpoint Outlook
es
• Resources are then load SFO DDC
al
MIA site
e
or
Outlook
Outlook
di
s tri
MIA DDC
utb
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Where you have the same resource available over multiple different Citrix Virtual Apps and Desktops sites it is possible to use
StoreFront to present just one icon to the user. This is known as an aggregated resource. When a user starts an aggregated
resource, StoreFront determines the most appropriate instance of that resource for the user‐based on resource availability.
• As part of this resource aggregation process, StoreFront dynamically monitors the hosting servers. And if they fail to respond to
requests, perhaps due to being overloaded or temporarily unavailable, users are directed to resource instances on other servers until
communications are re‐established.
Additional Resources:
• StoreFront high availability and multi‐site configuration StoreFront Multi‐Site Settings Part 2
N
https://www.citrix.com/blogs/2016/09/07/StoreFront‐multi‐site‐settings‐part‐2/
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
• Configurable from within the StoreFront
console GUI.
fo
rr
es
al
e
or
di
stri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Configuring StoreFront aggregation settings can be completed from both the console through the Manage Delivery Controllers
option and directly in the web.config file.
• To configure aggregation, you will map user groups to delivery controllers and set the sites to be included in aggregation.
• There are two options available when publishing resources. The Identical Resources option provides no load balancing. And the Load
Balance option enables the full load balancing option for multi site resources.
• If you want to define multiple, distinct aggregation groups, it still has to be done by editing the web.config file. With highly available,
N
ot
Additional Resources:
fo
• StoreFront high availability and multi‐site configuration
https://docs.citrix.com/en‐us/StoreFront/current‐release/plan/high‐availability‐and‐multi‐site‐configuration.html
rr
• StoreFront Multi‐site Settings Part 2
es
https://www.citrix.com/blogs/2016/09/07/StoreFront‐multi‐site‐settings‐part‐2/
al
e
or
di
s tri
b ut
io
n
N
StoreFront determines that the published app is
ot
available in both Site. What determines which
Site will be used to host the user’s session?
fo
rr
es
StoreFront uses the ordering specified in your
aggregation configuration to determine the site to
al
which the user is connected.
e
or
di
s
tri
b
ut
io
n
N
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
Subscriptions in a Multi-Location
ot
Environment
fo
rr
es
al
e
or
di
stri
utb
io
n
Key Notes:
• Identify the role of the StoreFront Subscription Store.
• Describe how Subscription Stores are replicated and synchronized.
StoreFront‐A
N
Replication Replication
option to add items to their
ot
favorites (The Store).
fo
Single Shared Store
• Mapping between users and
rr
their subscribed items is
es
stored in a local database on
each StoreFront server.
al
e
• Needs to be enabled by an Replication
or
Administrator.
StoreFront‐B StoreFront‐C
di
File‐Based File‐Based
s
Database Database
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Where you have multiple StoreFront servers in a group, a user can have their favorites saved on one StoreFront server replicated to
the others in the same group. The Subscription Store on each StoreFront Server is stored in the
C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Citrix\SubscriptionsStore\<Store Name>\PersistentDictionary.edb
location. This database contains user Favorites and the site name in the metadata. It consists of a string that includes:
• User SID
• site/Farm name (as defined in the StoreFront store)
N
ot
Additional Resources:
fo
• What Subscriptions and Server Groups Mean for StoreFront Designs
https://www.citrix.com/blogs/2014/10/10/what‐subscriptions‐and‐server‐groups‐mean‐for‐StoreFront‐designs/
rr
es
al
e
or
di
s tri
b ut
io
n
web.config
( StoreFront‐A ) StoreFront‐A StoreFront‐B
(Internal Store) (External Store) (Internal Store) (External Store)
• Within a StoreFront
deployment, Subscriptions
N
can be configured to be
ot
Internal External Internal External
Subscription‐A Subscription‐B Subscription‐A Subscription‐B
shared between Stores
fo
within the same server
rr
group. Now the two stores are Server Group 1
pointing to the same
es
• The web.config file on one Subscription data
al
to point to the subscriptions
e
file on the other Store. StoreFront‐A StoreFront‐B
or
(External Store) (Internal Store) (External Store) (Internal Store)
di
s tri
Internal Internal
Subscription‐A Subscription‐A
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In addition to synchronizing subscriptions within a store, we can also synchronize subscriptions between Stores. This would allow,
for example, where you have an internal and external store, to provide a smoother user experience by configuring the two stores to
share a common subscription database.
• To enable this, you need to change the store web.config file located in C:\inetpub\wwwroot\citrix<storename> so that the
web.config file on one Store points to the subscriptions file on the other Store.
• Each store web.config contains a client endpoint for the Subscription Store Service. For two stores to share a subscription datastore,
Additional Resources:
• Configure two StoreFront stores to share a common subscription datastore
https://docs.citrix.com/en‐us/StoreFront/current‐release/configure‐manage‐stores/configure‐two‐stores‐share‐
datastore.html
• How to Export and Import StoreFront Subscription Database
N
https://support.citrix.com/article/CTX139343
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
(EST)
ot
fo
StoreFront‐A StoreFront‐B StoreFront‐A StoreFront‐B
rr
Subscription
Schedule initialized
es
Store Store
al
3 AM 12 AM
e
(EST) Server Group 3 Miami (EST)
or
di
s
StoreFront‐A StoreFront‐B
tri
b ut
Store
© 2022 Citrix Authorized Content
io
n
Key Notes:
• When using subscription replication, it is important to recognize that the process is time triggered; and therefore, it will occur at
different times over multiple time zone deployments.
• This means that users may not see changes to their subscription information, or favorites, immediately if they connect to StoreFront
servers in a different time zone soon after making changes.
• PowerShell is used to execute periodic pull synchronization of subscriptions from stores in different StoreFront
deployments.
N
ot
• A specific sequence of tasks need to be completed to configure and execute this periodic pull
synchronization. This involves:
fo
• Loading the relevant PowerShell modules.
rr
• Enabling synchronization.
es
• Configuring the remote StoreFront to synchronize with.
• Adding the Microsoft Active Directory domain machine accounts for each StoreFront server in the remote
al
deployment to the local Windows user group CitrixSubscriptionSyncUsers on the current server.
e
• Propagating changes to all other servers in the Server Group.
or
• To configure a PowerShell periodic pull synchronization, you will need to use an account with local administrator
permissions to start Windows PowerShell and to import the StoreFront modules that will be required. The
di
commands for this are:
s
• Import-Module "installationlocation\Management\Cmdlets\UtilsModule.psm1"
tri
• Import-Module "installationlocation\Management\Cmdlets\SubscriptionSyncModule.psm1“
but
io
n
Key Notes:
• It is worth noting that the synchronization duration may vary depending on the size of the database.
• When configuring a periodic pull synchronization, you must always ensure the StoreFront admin console is closed to avoid errors and
that the configured Delivery Controllers are named identically, including capitalization between the synchronized Stores.
• For example: If you had three different GEO locations, as in the previous slides diagram, you may have three different AD
infrastructures and unique Virtual Apps and Desktops sites in each location. So, you would need to name the Delivery Controllers
the same for each of the three sites. Otherwise, without the same Delivery Controller names it may lead to users having different
N
synchronization at a specific interval.
ot
• To start synchronization of users’ application subscriptions between stores, you will need to restart the subscription
fo
store service on both the local and remote deployments using PowerShell after completing the configuration. If your
local StoreFront deployment consists of multiple servers, use the Citrix StoreFront management console to propagate
rr
the configuration changes to the other servers in the group.
es
al
Additional Resources:
• Set up highly available multi‐site stores: https://docs.citrix.com/en‐us/StoreFront/current‐release/set‐up‐highly‐
e
available‐multi‐site‐stores.html
or
di
s tri
b ut
io
n
N
ot
Which technology allows the same resource
across multiple sites to be presented as a single
fo
icon to the user?
rr
es
StoreFront resource aggregation
al
e
or
di
s tri
b ut
io
n
Key Notes:
• To ensure a user can retain Storefront customizations, such as favorites we enable subscriptions between StoreFront servers in a
group.
• To ensure a user is not presented with duplicate icons where the same resource exists across multiple sites, we enable StoreFront
resource aggregation.
N
• Exercise 3-2: Move a Controller into the
ot
satellite zone
fo
• Exercise 3-3: Move a machine catalog into the
rr
satellite zone
es
• Exercise 3-4: Auto-Update Policy
al
• Exercise 3-5: Add a Home Zone for a User
e
or
• Exercise 3-6: Add a Home Zone for an App
di
s
tri
b
ut
io
n
N
• Exercise 3-8: Configure Optimal Gateway Routing
ot
• Exercise 3-9: Test Optimal Gateway Routing
fo
• Exercise 3-10: Configure Subscription
rr
Synchronization
es
• Exercise 3-11: Test Subscription Synchronization
al
e
or
di
s
tri
b
ut
io
n
N
zone.
ot
• Zone preference selects the nearest resource
fo
based on the user’s location during a session
rr
launch to provide the best experience.
es
• Optimal HDX Routing can be used to improve HDX
al
session performance by routing traffic to the
e
Gateway closest to the end user.
or
• StoreFront can aggregate identical resources over
multiple sites.
di
s
• StoreFront preferences can be synchronized over
tri
multiple servers in a store to ensure a consistent
b
user experience.
ut
io
n
N
ot
Planning: Backups and Disaster Recovery
fo
rr
es
al
e
Module 4
or
di
s
tri
b
ut
io
n
N
backups for key components and data in a
ot
Citrix Virtual Apps and Desktops environment.
fo
• Recognize leading practices to take into
rr
consideration when building a Citrix Virtual
Apps and Desktop environment recovery plan.
es
• Identify the steps to fail over a production Citrix
al
Virtual Apps and Desktops deployment to a
e
Disaster Recovery site.
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be introducing the important considerations for backups in a Citrix Virtual Apps and Desktops environment.
N
ot
fo
rr
• Located on a storage device in the • Require transferring data physically or
es
datacenter. digitally to a separate physical location
al
from the datacenter.
• Allows for data to be recovered quickly.
e
• Typically used for a limited number of
• Ideal for issues that only affect a small
or
backups that require additional
portion of hardware in the datacenter.
protection in the event of a disaster.
di
• Cold storage solutions like tape can also
s
be used.
tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• The location of a backup can have a major impact on the recovery time and reliability of the Citrix environment.
• Backups can be onsite using media at the datacenter there the source server resides.
• This allows for a quick recovery time; however, it comes with a reduced resilience as events impacting the building may also impact
the backups.
• Hosting backups offsite may increase recovery time, but the resilience of the backup will be higher. The best balance can be
achieved with a hybrid backup solution where backups are held onsite, for example daily, and periodic. Let's say weekly are
Additional Resources:
• Citrix Virtual Apps and Desktops Zones Disaster Recovery Planning
N
https://docs.citrix.com/en‐us/tech‐zone/design/design‐decisions/cvad‐disaster‐recovery.html
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
• The entire configuration of a StoreFront deployment can be exported; therefore, backed up.
N
• Configuration exports can be imported on other machines with StoreFront installed.
ot
• Imported settings will overwrite any configurations on a StoreFront server.
fo
• PowerShell commands are used to export and import StoreFront configurations.
rr
es
al
e
backup.zip backup.zip
or
di
s
StoreFront StoreFront
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• StoreFront configuration exists separate to the main site database. Residing on the StoreFront server's configuration exports are
made from the StoreFront servers and can include both single server deployments and server group configurations.
• The backup (exported) file can then be stored both on and off site. Backup files are either a straightforward ZIP file or a ctxzip file if
encrypted.
• When importing (recovering) an existing deployment, the current StoreFront configuration is erased and replaced by the
configuration contained within the backup archive. If the target server is a clean factory default installation, a new deployment is
N
on all importing servers before importing the StoreFront configuration containing extra authentication methods
ot
• The SiteID is a numerical value reflecting the order in which a StoreFront site was created. This must match on both
fo
the current site and the target site where you want to restore the configuration to.
rr
Additional Resources:
es
• Export and import the StoreFront configuration
al
https://docs.citrix.com/en‐us/StoreFront/current‐release/export‐import‐StoreFront‐config.html
e
or
di
s tri
b ut
io
n
N
ot
fo
rr
File Server Desktop
es
• Save a new copy of a file every • This is the preferred option used • Uses cloud-hosted storage, such
al
day. by many enterprises. as Citrix Content Collaboration
e
(ShareFile).
• Files reside on the local • Files must be saved on network
or
machine. drives. • Auto-creates new versions as
files are saved.
di
• There may be no defense • May require support to recover
s
against local storage failure. files. • This provides a good balance of
tri
recoverability and lower admin.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In a traditional on‐premises deployment, data can be kept on local endpoints (or VMs), stored in an enterprise shared storage
solution, or placed into a third‐party cloud service. Each method has its pros and cons, but most medium to large enterprises will
choose options that allow enterprise or offsite storage in order to have more control over how data is accessed and used, as well as
to lower the risk of unrecoverable data in the event of an outage.
• Enterprise storage solutions include using File Servers either on or offsite which are simple to implement using existing skills and
scalable by adding more disks or resizing machines. However, they can represent a Single point of failure, where routine
N
• Storage Spaces Direct (S2D) is a solution based on Windows Server Failover Cluster and Scale‐Out File Services. This
ot
solution allows a single SMB file path to be hosted on multiple machines without the need for shared storage. It is
fo
highly resilient and scalable; however, it is only available on certain Windows Server Datacenter editions; it can be
complex to implement; and it may not provide the best results when used with user profile workloads.
rr
• Multiple third‐party offerings are also available for backups including vendors like Veeam, NetApp and Cloudian
es
among others. These can be highly resilient and provide good performance; however; they are often costly and may
al
require additional experience.
e
or
di
s tri
b ut
io
n
1. Application is identified for inclusion in environment. 2. Citrix and app team determine backup requirements 3. Application backup configuration occurs during
and responsibilities. onboarding activities.
N
ot
fo
rr
es
al
e
or
Citrix Virtual
Apps and Desktops
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• It is critical to identify the applications that we need to or are willing to backup. It might be possible that initially we had 10
applications in our Citrix Virtual Apps and Desktop environment, but only eight applications are active. So, we can reduce (or
eliminate) the workload needed for two, saving time and effort.
• Each application may have its own backup options and requirements and, as a result, backup requirements should be determined
during the intake process for a new application to the Citrix Virtual Apps and Desktops Site. It is important to ensure what level of
backups are expected.
N
Elastic Layer
App Layering
ot
VM‐1 VM‐2 VM‐3
Provisioning Server Application
Virtual Machine
fo
Layers
rr
Platform
Virtual Machine Layer
Master
es
Image
vDisk OS Layer
al
Master Identity Differencing vDisk Virtual Machine
Machine Disk Disk Store
e
or
• Backup approach and difficulty • vDisks should receive the highest • Implement a backup plan of the
will differ based on whether thin level of backup available. layered images.
di
clones or full clones are used.
• Elastic and user layers should
s
• Backup master VMs/templates. be backed up according to use
tri
case criticality.
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Master Images should be protected from potential corruption and loss. Keeping periodic offline copies is an easy way to achieve
this to ensure images are kept secured offline with each revision.
Recovery Models
N
ot
Simple:
• No log backups are required.
fo
• Has lower storage space requirements.
rr
• Changes to database since most recent backup
es
are NOT protected.
al
Full:
• Requires log backups as well.
e
• Data can be recovered from any point in time.
or
• Required for SQL mirroring.
di
Bulk-Logged:
s
• Requires log backups as well.
tri
• Permits bulk copy operations, so is not typically
b
used
ut
© 2021 Citrix Authorized Content for Citrix databases.
io
n
Key Notes:
• Multiple Citrix products rely on a database to store session or configuration information. This includes Citrix Virtual Apps and
Desktops, Citrix Provisioning, Citrix Workspace Environment Management, and Citrix Session Recording. Some level of backup and
recovery is recommended for all Citrix product databases. The recovery model and backup level/frequency; however, it will depend
on the organization’s requirements.
• Backups should be considered separately and as an additional step to any existing solution like Always On, Mirror and Cluster. It is
also important to retain offline backups to help protect against real time corruption or malicious encryption of live database files or
N
requirements small. This essentially eliminates the need to manage transaction log space, but changes to the
ot
database since the most recent backup are unprotected. This means that, in the event of a disaster, the unprotected
fo
changes must be redone manually.
• The full model requires log backups, and no work is lost due to a lost or damaged database data file. Data from any
rr
arbitrary point in time can be recovered (for example, prior to application or user error). This method is required for
es
database mirroring.
• The Bulk‐logged model is an adjunct of the full recovery model that permits high performance bulk copy operations.
al
It is typically not used for Citrix databases.
e
or
Additional Resources:
• Citrix VDI Best Practices for Citrix Virtual Apps and Desktops – Disaster Recovery Planning: Design Decision
di
https://docs.citrix.com/en‐us/tech‐zone/design/design‐decisions/cvad‐disaster‐recovery.html
s tri
• Recovery Models (SQL Server): Recovery Models (SQL Server)
https://docs.microsoft.com/en‐us/sql/relational‐databases/backup‐restore/recovery‐models‐sql‐server?view=sql‐
b ut
server‐ver16&viewFallbackFrom=sql‐server‐2017%E2%80%8B
• Backup Overview (SQL Server):
io
https://docs.microsoft.com/en‐us/sql/relational‐databases/backup‐restore/backup‐overview‐sql‐server?view=sql‐
n
server‐ver15
Backup Levels
N
ot
Full:
• Contains all data in a specific database, and
fo
enough log info to allow for recovering data.
rr
Partial:
es
• Contains data from only some of the filegroups in
al
a database, including:
• The primary filegroup.
e
• Every read/write filegroup.
or
• Optionally, specified read-only files.
di
Differential:
s
• Is based on the last full backup.
tri
• Records only the portions of data that have
b
changed since that full backup.
ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Multiple Citrix products rely on a database to store session or configuration information. This includes Citrix Virtual Apps and
Desktops, Citrix Provisioning, Citrix Workspace Environment Management, and Citrix Session Recording. Some level of backup and
recovery is recommended for all Citrix product databases. The recovery model and backup level/frequency; however, it will depend
on the organization’s requirements.
• Backups should be considered separately and as an additional step to any existing solution like Always On, Mirror and Cluster. It is
also important to retain offline backups to help protect against real time corruption or malicious encryption of live database files or
N
requirements small. This essentially eliminates the need to manage transaction log space, but changes to the
ot
database since the most recent backup are unprotected. This means that, in the event of a disaster, the unprotected
fo
changes must be redone manually.
• The full model requires log backups, and no work is lost due to a lost or damaged database data file. Data from any
rr
arbitrary point in time can be recovered (for example, prior to application or user error). This method is required for
es
database mirroring.
• The Bulk‐logged model is an adjunct of the full recovery model that permits high performance bulk copy operations.
al
It is typically not used for Citrix databases.
e
or
Additional Resources:
• Citrix VDI Best Practices for Citrix Virtual Apps and Desktops – Disaster Recovery Planning: Design Decision
di
https://docs.citrix.com/en‐us/tech‐zone/design/design‐decisions/cvad‐disaster‐recovery.html
s tri
• Recovery Models (SQL Server): Recovery Models (SQL Server)
https://docs.microsoft.com/en‐us/sql/relational‐databases/backup‐restore/recovery‐models‐sql‐server?view=sql‐
b ut
server‐ver16&viewFallbackFrom=sql‐server‐2017%E2%80%8B
• Backup Overview (SQL Server):
io
https://docs.microsoft.com/en‐us/sql/relational‐databases/backup‐restore/backup‐overview‐sql‐server?view=sql‐
n
server‐ver15
N
the Citrix License server high availability
ot
options are used.
• Machines involved in a high availability
fo
configuration must use the same hostname, or the
rr
license file will not work.
es
• If a machine with a different hostname will be
al
used as a backup, or is created during
e
recovery, the Citrix license file must be re-
or
allocated with the new hostname.
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Citrix licenses are held in a text file and are, therefore, easily backed up both in real time and offline for additional integrity security.
• As access to your company's licenses is via a mycitrix account, the identity must be maintained to ensure rapid access to license files
in the event you need to download existing or updated license files in response to a DR situation.
Additional Resources:
• License files
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
fo
Pool Metadata Host Config. and Software Virtual Machines
rr
• Hosts use a database to store data • These backups refer to hypervisor • Consists of backing up the virtual
es
about VMs and associated server control domain backup and machine disk files.
al
resources. restore procedures.
• Can be treated similarly to other file
e
• The process to back up and restore • May not include storage backups. Citrix recommends using
or
VM metadata will be based on repositories; e.g., only the a Citrix Ready 3rd party solution.
whether a single-host or pooled privileged control domain that runs
di
deployment is used. Citrix Hypervisor agent.
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• It is a leading practice to avoid altering the installed state of Citrix Hypervisor servers. That is, do not install any additional packages
or start additional services on Citrix Hypervisor servers, which would mean they are operating as more than a hypervisor. In the
event of needing to restore a Citrix Hypervisor, the best approach is to reinstall Citrix Hypervisor server software from the installation
media. If you have multiple Citrix Hypervisor servers, you can configure a TFTP server and use answer files for recovery replicating
any standard product deviations.
• Virtual machine configurations are held in a configuration known as the VM Metadata. Backup of the VM metadata is essential to be
N
Additional Resources:
ot
• License files Back up and restore hosts and VMs
fo
https://docs.citrix.com/en‐us/citrix‐hypervisor/dr/backup.htm
• Citrix Ready Marketplace (Backup Providers):
rr
https://citrixready.citrix.com/category‐results.html?search=backup&_ga=2.239675978.810872846.1559518441‐
es
98755839.1533921585
al
e
or
di
s tri
b ut
io
n
N
What is the difference between a full and a
ot
differential SQL database backup?
fo
rr
es
When a full backup is created, the full database is
backed up and a new backup file is created. When a
al
differential backup is created, only the changes made
e
since the previous full backup are captured; and are
or
added to the existing backup file.
di
s
tri
b
ut
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be examining leading practice considerations for disaster recovery. This includes considering the type of
questions you need to ask to ensure you have sufficient plans in place to recover a Citrix Virtual Apps and Desktops environment from
issues that impact the environment’s ability to deliver business as usual.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
managed independently through separate Citrix Virtual Apps and Desktops Sites is important as the users may need to use a
ot
different connection procedure during a DR event?
fo
• A good compromise to avoid multi‐site environments is to use Zone preference and failover or StoreFront multisite aggregation. An
rr
administrator could also consider the use of StoreFront subscription synchronization.
es
al
e
or
di
s tri
b ut
io
n
N
ever be active at any point in time. In order to support active/active replication, distributed file locking is needed.
• As a rule of a thumb never plan to have multiple access points to the same data by the same user.
ot
fo
Additional Resources:
rr
• Export and import the StoreFront configuration GSLB & DR – Everything you think you know is probably wrong!
https://www.citrix.com/blogs/2014/03/29/xendesktop‐gslb‐dr‐everything‐you‐think‐you‐know‐is‐probably‐wrong/
es
• Multiple folder targets and replication (with Citrix Profile Management)
al
https://docs.citrix.com/en‐us/profile‐management/current‐release/plan/high‐availability‐disaster‐recovery‐scenario‐2.html
e
• Disaster recovery (for Citrix Profile Management):
https://docs.citrix.com/en‐us/profile‐management/current‐release/plan/high‐availability‐disaster‐recovery‐scenario‐3.html
or
di
s tri
b ut
io
n
N
sessions on customer‐managed VDA machines.
• The Citrix Cloud service level agreement (SLA) is available online and provides a monthly uptime commitment and an explanation of
ot
what that includes and doesn’t include. Any Citrix Cloud customer should become familiar with the SLA document and determine
fo
whether it is acceptable for their organization’s overall DR requirements.
rr
• This will determine, for example, whether to use an on‐premises StoreFront and Citrix Gateway to provide access during a Citrix
Cloud outage, and also to ensure that leading practices are in place for using Local Host Cache.
es
al
Additional Resources:
e
• Scale and size considerations for Local Host Cache
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops‐service/install‐configure/install‐cloud‐connector/local‐host‐scale‐and‐
or
size.html
di
• Service Level Agreement
s
• https://docs.citrix.com/en‐us/citrix‐cloud/overview/service‐level‐agreement.html
tri
b ut
io
n
N
How might zone preference settings interfere
ot
with a datacenter failover during a Disaster
fo
Recovery event?
rr
es
If users or applications are configured incorrectly,
they may not automatically have access to their
al
resources if they access a new zone.
e
or
di
s
tri
b
ut
io
n
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be focusing on the processes around actioning both a disaster recovery process and the return to primary
datacenter post recovery.
N
ot
fo
rr
es
Block Access Terminate Reverse Enable
Go / No‐Go Complete
al
to Primary Existing Access in DR
Decision Replication Replication
Environment Sessions Datacenter
e
or
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Each environment may have its own specific procedures for maintaining business as usual in the event of a DR event. The steps in
the diagram apply to a generic scenario where there is a primary, active datacenter, a Citrix Virtual Apps and Desktops Site that is
normally used, and a passive DR datacenter with a backup Citrix Virtual Apps and Desktops Site that is only accessed when the
primary Site is unavailable or impaired. This scenario also assumes that there is application and user profile data that must be
replicated from the primary to the DR datacenter, so that users can have the full functionality needed there. Many of the steps are in
place to ensure that data replication can occur successfully without synchronization issues or lost data.
N
• Once no new sessions can be started, you may need to terminate existing sessions.
ot
• You may also need to complete a replication of the latest data from the primary to DR site.
fo
• Once all profile and application data is no longer being accessed or modified on the primary Site, data replication to
the backup environment can proceed.
rr
• If some or all the production data was lost due to the DR event, recovering the data from backup locations to the DR
es
datacenter could also occur at this stage.
• We then need to reverse replication. This is done once the datacenter doesn’t have any active connections and user
al
data is either properly replicated or you’ve decided to cut them off. We can then proceed with the second part of the
e
failover, activating access to the backup datacenter which should now be designated as the primary data location, and
or
the replication flow reversed, so that changes made to data in the backup environment will be retained.
• Finally, we need to enable access in the DR datacenter after completing any needed backend data migration/replication
di
procedures first.
s tri
• Communication to end‐users is important in this step, particularly if the access method will differ from their usual
process.
b ut
• Ideally, a plan should be in place for onboarding/migrating users to the DR site. This plan should include some
considerations;
io
• How many users and apps should be migrated.
n
• Prioritize business critical users and apps.
• How will users be notified about DR availability/limitations.
• Avoid boot/login storms.
• Monitor load on VDA machines and backend servers.
• Create appropriate load evaluator policy settings to ensure VDA machines are not overloaded.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
fo
rr
es
Enable
Block Access Terminate
Go / No‐Go Complete Complete Access to
al
to DR Existing
Decision Replication Replication Primary
Datacenter Sessions
e
Datacenter
or
di
s tri
but
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Once you have recovered the primary datacenter, the process of returning to normal operations involves similar steps as failing over
to the backup datacenter, in reverse.
• Once you have determined stability in the Primary Datacenter, you will need to perform infrastructure and functional testing to
confirm that core functionality has returned.
• The next stage will be to block access to the DR datacenter. This can also be done in stages by removing certain Active Directory
groups from resource assignments in the backup datacenter in stages.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
How can user profile settings impact a failover to
ot
a disaster recovery environment?
fo
rr
es
If user profile data is required (for example Microsoft
roaming profiles or Citrix Profile Management), the
al
profile data must be replicated to the DR location
e
before users access that location.
or
di
s
tri
b
ut
io
n
N
ot
• Exercise 4-2: Perform a Differential Backup for the
Site Database
fo
rr
• Exercise 4-3: Restore a Backup for the Site
Database
es
al
e
or
di
s
tri
b
ut
io
n
N
there are multiple components that should be
ot
considered for regular backups.
fo
• Citrix component backups can be included in a
rr
disaster recovery plan that translates organizational
disaster recovery requirements to disaster recovery
es
actions for the environment.
al
• Determine the specific series of steps that are
e
needed to fail over between a primary and backup
or
environment, as well as what user communications
should be involved.
di
s
tri
b
ut
io
n
N
ot
Planning: Advanced Authentication Methods
fo
rr
es
al
e
Module 5
or
di
s
tri
b
ut
io
n
N
(MFA) solutions are used to validate and
ot
authenticate end users in a Citrix Virtual Apps
and Desktops environment.
fo
rr
• Describe Smart Card authentication and PIN
prompt behavior in a Citrix Virtual Apps and
es
Desktops environment.
al
• Describe Citrix Federated Authenticated
e
Service (FAS) and its interaction with other
or
federated identity concepts in a Citrix Virtual
di
Apps and Desktops environment.
s
tri
b
ut
io
n
fo
rr
RADIUS and One Time Passwords (OTP)
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will learn about the use of multi factor authentication in a Citrix Virtual Apps and Desktops environment.
Passwords Tokens
N
Static PINs Phones
ot
Smart Cards
fo
rr
What you know What you have
es
al
e
or
di
s tri
b ut
© 2021 Citrix Authorized Content Multi‐factor authentication
io
n
Key Notes:
• Authentication is the process of proving who you are.
• Three possible authentication “factors” are commonly referred to as:
• “What you know, typically a password”
• “What you have, typically a token code”
• “What you are, typically fingerprint or face recognition”
• “What you are” has been proven to be less useful as a form of authentication. Hackers have illustrated they can reproduce
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
• Token contains seed + hardware\software info to perform token hash.
ot
• Token and backend hash(seed + time) must match, proving that they both had the original seed!
fo
rr
es
Something you know User Login
al
My PIN is
6789
e
Username: HR1
or
Password 1: 6789
Something you have OTP Token Password 2: ABC123
di
s
ABC123
tri
utb
© 2021 Citrix Authorized Content
io
n
Key Notes:
• One‐time passwords are typically contained in OTP tokens, and fulfill the “what you have” authentication factor. These can be
physical or virtual and there are different brands and types from various vendors available (eg. RSA SecureID, Symantec VIP, HID
ActivID).
• Tokens do not require network connectivity to work instead the token device (or soft token) has a secret unique “seed record” that
exists both on the device (or software) and on the backend authentication server. The device and server input the seed record and
the current time into a publicly known algorithm to generate a unique PIN or Password.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Authentication, Authorization, and Accounting (AAA)
ot
services.
fo
• It is commonly used as a multi-factor protocol. Many
rr
vendors use it to implement OTP systems.
es
• RADIUS is supported for both Citrix ADC system
al
Management and Citrix Gateway user connections.
e
• StoreFront needs Citrix ADC to perform RADIUS
or
authentication.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• RADIUS is a communications protocol that allows different third parties to authenticate using OTP systems.
• To function, an authenticating system “speaks” RADIUS to a OTP vendor server to pass along token information entered by the user.
• The OTP system simply returns pass\fail conditions over RADIUS back to the authenticating entity.
• This simple "Present‐Respond" approach makes RADIUS a quick and simple option to implement.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
credentials to Citrix Gateway.
ot
2
2. Citrix Gateway forwards the token
fo
credentials to the RADIUS server. Citrix ADC RADIUS
Server
rr
3. If RADIUS confirms the token credentials, 4 3
es
Citrix Gateway sends the LDAP credentials
to a Domain Controller.
al
e
4. If the Domain Controller validates the LDAP
or
Site
credentials, the rest of the enumeration and
launch processes continue normally.
di
Domain
s
StoreFront
Controller
tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• It is important to remember that all the standard Windows OS authentication still happens on the backend.
• When configuring multi‐factor authentication, the order in which the factors are authenticated can provide additional protection
against DDoS attacks. For example, if LDAP is the first factor, an external DDoS attack could target the Domain Controllers, even
though the attackers have not authenticated and are outside the internal network. If we place a hardened, dedicated authentication
mechanism such as a RADIUS server, as the first authentication factor, we can prevent this scenario.
• Any of the authentication mechanisms that are supported on the Citrix ADC appliance can be configured as any factor of the nFactor
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
implement two-factor authentication
ot
involving a RADIUS server for a Citrix Virtual
Apps and Desktops environment?
fo
rr
Citrix ADC
es
al
e
or
di
s
tri
b
ut
io
n
fo
rr
Smart Card Authentication
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be looking at how we use smart card technology in a Citrix Virtual Apps and Desktop environment.
and Desktops
United States Government
• Supported natively
N
through StoreFront with
Factor #1
ot
IIS.
fo
• Requires TLS.
1 2 3 4
John Doe
rr
• Bimodal authentication
es
available in StoreFront.
al
• Middleware may be Factor #2
e
needed on client and
or
VDA machine. USA
• E.G. ActivClient, SafeNet
di
(Gemalto).
stri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Smart cards provide multi‐factor authentication by three items.
• Identification, which is provided by a user certificate
• Authentication factor #1: PIN
• Authentication factor #2: Proof of private key
• Confirmed by digital signatures and public key decryption
• Smart cards rely on certificates and their associated public and private keys to function. This is supported by PKI, which provides a
N
intended receiver.
ot
• Using keys to provide proof of identity and identity of issuer also means that we can revoke the key.
fo
• A Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP) can be used to verify if a key has been
revoked.
rr
• When using Smart Cards with Virtual Apps and Desktops, the user will log on to their client with the same smart card
es
cert they wish to use on Citrix Virtual Apps and Desktops.
•
al
StoreFront allows for bimodal authentication, meaning the user can select either explicit or smart card authentication,
once they hit the StoreFront server.
e
or
di
s tri
b ut
io
n
N
Desktops
ot
fo
rr
• When user removes their smart • Smart cards were never meant to • PIV smart card authentication
card from the PC or attached operate over a WAN, and thus are support has been added for
es
reader, one of the following occurs highly sensitive to latency. Director access.
based on the “Smart card removal
al
behavior” GPO setting: • Because certificates must be • Fast smart card feature improves
e
exchanged over the wire, logon performance in high-latency WAN
– Workstation is locked times can increase significantly scenarios.
or
– Session is disconnected (for remote when default settings are used.
sessions)
di
– User is logged off
s tri
– No action (session stays active)
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Director supports Personal Identity Verification (PIV) based smart card authentication.
• This feature is useful for organizations and government agencies that use smart card‐based authentication for access control.
• Also supported is a fast smart card feature which addresses high‐latency WAN scenarios.
• Fast smart card is enabled by default on the hosts that are running Window Server 2016 and above, or a minimum of Windows 10.
• To enable fast smart card on the client side, configure the SmartCardCryptographicRedirection parameter in default.ica.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Virtual Apps and Desktops published resource
ot
with a smart card will receive one or more PIN
prompts:
fo
• PIN prompt at IIS\Citrix Gateway during
rr
authentication unless cached (or using Kerberos).
es
• PIN prompt at Citrix Gateway during resource launch
if set for “Client Cert:Required”.
al
• Non-domain joined Citrix Workspace app must enter
e
PIN again at Windows (no SSON).
or
• Domain-joined Citrix Workspace app with SSON
configured may not require third PIN.
di
s
tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• PIN codes form an important part of Smart Card operation.
• A Smart Card PIN can be cached for middle‐ware, such as ActivClient, to automatically respond to a prompt for a PIN.
• Also, if Kerberos is configured for Citrix Workspace app or accessing through a browser, then a Kerberos ticket can be used to
authenticate to StoreFront.
• If Citrix Gateway is set for requiring a client cert, then it will prompt again on application launch through a Gateway.
• If Single Sign‐On is not configured (so that the PIN is captured by the winlogon component), then a user will receive a PIN prompt at
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
1
Endpoint
Domain Controller
N
ot
Winlogon Delivery Controller
fo
StoreFront FMA
rr
SSONSVR.exe 2
es
4
3 Virtual Delivery Agent
al
5
Web Browser 13
7 Winlogon
e
9 8 6
or
11
di
14
s
12
Backend Services
tri
ICA Client Engine
b
10
ut
io
n
Key Notes:
• Using a domain joined machine with smart card is similar to a username and password authentication flow, except we cannot cache
the PIN on the backend. For SSOn we, therefore, rely on our client processes to grab the PIN and present it inside the HDX session
on logon. You can also use IWA (Kerberos) instead of PIN.
• The process of using a domain joined machine involves:
1. The user’s smart card logs into the endpoint where Winlogon validates the PIN and accepts the smart card certificate. Winlogon
then authenticates against the domain controller and requests the TGT (Kerberos Authentication Ticket). The domain controller
N
7. StoreFront generates an ICA file which includes the launch reference and sends it to the client.
ot
8. The client device web browser then passes the launch reference to the Desktop Toolbar, which forwards it to the ICA
fo
Client Engine.
9. The ICA Client engine then obtains the smart card PIN, which was stored by the Single‐Sign on process.
rr
10. The ICA Client Engine then passes the launch reference and PIN to the VDA machine.
es
11. The VDA checks with the DDC to validate that the launch request is coming from an authorized machine, and to
al
perform some other checks related to previous sessions, etc. If the SID provided by the VDA matches the SID that
the Delivery Controller had previously stored, the Delivery Controller validates the connection.
e
12. The VDA service sends the PIN to Winlogon. Winlogon validates the PIN with the endpoint, and it receives the smart
or
card certificate in return.
di
13. Winlogon authenticates against the domain controller by using the smart card credentials.
14. At this stage, if the client needs a connection to other backend servers like Outlook or SharePoint, then the VDA will
s tri
use the smart card credentials to request a TGT\Service ticket for the requested server.
b ut
io
n
Domain Controller
N
4
2
ot
fo
1 3
rr
Citrix Gateway
es
al
6
e
5
or
di
s
VDA
tri
Delivery Controller
utb
© 2022 Citrix Authorized Content
io
n
Key Notes:
When using the Citrix Gateway with Smart Card authentication the process is moved to the gateway.
1. First, the user device sends the PIN and Smart Card certificate to Citrix Gateway.
2. Citrix ADC then pulls AD attributes from the certificate and performs LDAP translation to obtain the sAMAccountName or UPN.
• As a secondary authentication mechanism, LDAP can also be used to translate to sAMAccountName or UPN from any AD
attribute on the certificate. The translation step is not necessary if the cert has sAMAccountName or UPN as one of its
attributes.
N
is configured.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Gateway. No middleware is caching PINs,
ot
and the Gateway is set for “User Cert:
fo
Mandatory”. Single sign-on has been set up
rr
for the environment, and users use the same
es
credentials to access their endpoints and the
Citrix environment.
al
e
How many PIN prompts would the user see
or
here PIN
One andprompt
why? at the initial Citrix Gateway
di
logon. A second PIN prompt at Citrix Gateway
s
during session launch. The final Windows OS
tri
PIN prompt is taken care of by the SSON
b
configs in this case, so there will be two prompts
ut
total.
io
n
Key Notes:
There are a number of different login combinations that can be implemented depending on your user and or environment needs.
These should be carefully assessed, planned, and verified before rolling out into production.
fo
rr
Federated Identity Concepts
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be looking at the use of federated authentication services as part of the authentication process for Citrix Virtual
Apps and Desktops.
Site App
Password Password
N
passwords.
ot
• Single Sign-On vs Multiple identities
fo
• The solution: SSO using federated identity.
• Links users’ identity and other attributes across
rr
Identity
multiple distinct identity management systems. Provider
es
• Allows a single set of credentials for user
al
authentication to Intranet or Internet
e
applications. ATM PIN
Work
Password
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Federated authentication aims to achieve the goal of using a single identity across all login requirements. The world wide web is full
of interactive applications that users can visit by simply clicking a hyperlink. Once they do, they expect to see the page they want,
possibly with a brief stop along the way to log on.
• When a user visits a different web page, which also requires a login, the ideal solution is that their existing login can be used or
federated to the new page. This single sign on experience already exists within the domain infrastructure.
• Kerberos, which provides single sign on through domains, is limited to operating within the domain. It can, for example, only give you
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
fo
rr
es
Issuer (e.g., ADFS, Relying Party (e.g.,
al
Claim Security Token Okta, and Ping) ShareFile)
e
or
• A statement that one • A bundle of claims that is • A trusted authority that • The claims-based
subject makes about digitally signed by the issues claims and tokens. application that trusts the
di
itself or another subject. issuer who created it. issuer to provide
s
• Typically, responsible for
identity/authentication.
tri
authenticating the user.
but
io
n
Additional Resources:
• An introduction to claims
https://www.microsoft.com/en‐us/download/details.aspx?id=28362
• Scenario:
• Issuer: Check-in desk
• Token - Boarding pass
N
Security validates
• Relying Party - Gate crew the “token” by
ot
asking for an
• Claims consists of: Passenger name, flight number, additional
fo
seat number, frequent flyer status, etc. authentication
rr
factor (e.g. license
• Claims-based identity frees the application from the or passport).
es
burden of authentication.
al
• Claims-based authentication requires an explicit
e
trust relationship with the issuer. Applications Boarding agent
or
accepts token and
and or resources believe a claim about a user provides access to
only if it trusts the entity that issued the claim.
di
the service.
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Federated, or claims‐based identity can be described by thinking about a route taken through an airport to board a plane.
• You can't simply walk up to the gate and present your passport or driver's license; instead, you must first go through a security
checkpoint. Here, you present the required credentials, lets us the example of a passport.
• After verifying that your picture ID matches your face (authentication), the agent checks your boarding pass to verify that you've
paid for a ticket (authorization).
• Assuming all is in order, you are allowed to proceed to the terminal and ultimately, the gate.
N
board a particular flight at a particular time and sit in a particular seat. The gate agents simply validate your boarding
ot
pass, read the claims on it, and let you board the plane.
fo
• It's also important to note that there may be more than one way of obtaining the signed set of claims that is your
boarding pass. You might go to the ticket counter or kiosk at the airport, or you might use the airline's web site and
rr
print your boarding pass at home.
es
• The gate agents boarding the flight don't care how the boarding pass was created; they don't care which issuer you
al
used, as long as it is trusted by the airline. They only care that it is an authentic set of claims that give you permission to
get on the plane.
e
• In software terms, this bundle of claims is called a security token.
or
• Each security token is signed by the issuer who created it.
• A claims‐based application considers users to be authenticated if they present a valid, signed security token from a
di
trusted issuer.
s tri
b ut
io
n
N
(web browser) (IDP)
ot
User accesses URL in app
fo
1
App generates auth
rr
request
HTTP POST to AS w/ Auth request Auth request is
2 passed, verified
es
User is sent to logon page at AS
3
al
User logs in
e
or
Redirect to app w/ SAML token
4 SAML token is
generated
di
s
User is logged in to service provider
tri
5
but
io
n
Key Notes:
• It is important to understand what some of the terms mean in relation to federated authentication.
• SAML = Security Assertion Markup Language (SAML). It is an XML‐based open standard used for exchanging authentication and
authorization data between security domains, in other words, between an identity provider (ADFS, Google, Okta, etc.) and a service
provider (such as ShareFile, SalesForce or Workday).
• An identity provider is a trusted provider that enables you to use SSO to access other Web sites.
• A service provider is a Web site that hosts applications.
N
• There are some different terms used between SAML and ADFS. These are:
ot
• Attributes = Claims
fo
• Identity Provider (IdP) = Account Provider / Issuer / Claims Provider
• Service Provider (SP) = Relying Party
rr
• SAML tokens contain assertions and claims about the authenticating party, which include Identity and authentication
es
mechanism among other attributes
• The SAML authentication flow is also used by ADFS and can be summarized as:
al
• Step 1: The user browses to the URL of the web application, which is also referred to as the Service Provider (SP).
e
• Step 2: The web application generates a SAML authentication request, and it passes it to the Authorization Server.
or
• Step 3: The client web browser is redirected to the AS’s logon page. The user enters the credentials necessary to
di
authenticate with the AS.
• Step 4: After successful authentication, the AS generates a SAML token, which is sent to the SP.
s tri
• Step 5: After validating the SAML token, the SP allows the client to access the web application.
b ut
Additional Resources:
• ADFS Technical Reference
io
https://docs.microsoft.com/en‐us/windows‐server/identity/ad‐fs/ad‐fs‐technical‐reference
N
Provider
with Active Directory Certificate Services.
ot
• FAS allows StoreFront to use a broader range of
fo
Users
authentication options, such as SAML.
rr
Corporate Network
es
FAS Certificate Active
al
Server Authority Directory
e
or
Citrix StoreFront Controller VDA
di
Gateway
s tri
b
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• By using federation, you don’t need to issue and manage passwords for your partners’ personnel, nor do you have to worry about
how to lock down their access to just this entry point and specific apps. The external users don’t get passwords for your environment
and so can only come in via the gateway configured to accept them. Importantly, this puts responsibility for confirming the
authenticity and status of the external users where it belongs, with the partners themselves.
• This is the ultimate in authentication flexibility for Windows. And the beauty of FAS is that you are not compromising the capability
of the Windows session if you chose to go password‐free.
N
level cryptographic configuration is available in the FederatedAuthenticationService.exe.config file allowing admins to
ot
change the encryption and protection of the virtual smartcards.
fo
• Lets examine a user who accesses Google Apps and Windows apps from a Chromebook. If the company is using Google
rr
apps, my users all have a Google account. If they have Win apps, they also have an AD account. Right now, my users
log in to Google to get Google apps, then they log in to AD to get Win Apps via Citrix Virtual Apps and Desktops. Two
es
separate accounts are needed.
al
• With CVAD 7.9+ FAS, a user can login to Gmail via FAS, and their Gmail account is associated with an AD account, and
e
they get access to their Win and Google apps via one, non‐Windows account. This provides a better user
experience.
or
• If the Gmail account is compromised, the company can disconnect the link between Gmail and Windows AD and
di
the compromised Gmail account doesn’t have access to business‐critical Windows apps.
s
• The other benefit of this approach is the ‘password free’ part, where the Gmail users only have to worry about
tri
their Google password and there is no additional password required to associate and authenticate to AD.
b
Everyone needs an AD account or a mapping to an AD account to get their Win Apps, but the accounts can be
ut
generic or even shared.
io
n
Additional Resources:
• Federated Authentication Service
https://docs.citrix.com/en‐us/federated‐authentication‐service/2203‐ltsr/
N
Provider
ot
fo
Users
rr
Corporate Network
es
FAS Certificate Active
al
Server Authority Directory
e
or
Citrix StoreFront Controller VDA
di
Gateway
s tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The first thing that a user needs to do, as part of federated authentication, is to authenticate to the identify provider.
• A successful authentication will result in a SAML token being issued.
N
Provider
Identity Provider.
ot
fo
Users
rr
Corporate Network
es
FAS Certificate Active
al
Server Authority Directory
e
or
Citrix StoreFront Controller VDA
di
Gateway
s tri
b
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The next stage is for your connection request to be forwarded to the Citrix Gateway, where the SAML token will be validated against
the identity provider
N
to a username and forwards the request to Provider
StoreFront.
ot
fo
Users
rr
Corporate Network
es
FAS Certificate Active
al
Server Authority Directory
e
or
Citrix StoreFront Controller VDA
di
Gateway
s tri
b
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Once the Citrix Gateway has validated the token, it can then extract the username attribute for forwarding to StoreFront.
Vendor
N
which requests a certificate from the CA Provider
Directory
ot
fo
Users
rr
Corporate Network
es
FAS Server Certificate Active
al
Authority Directory
e
or
Citrix
StoreFront Controller VDA
Gateway
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
Upon receiving the username, StoreFront then forwards it to the Citrix FAS server.
This will contain a request for a certificate from the certification authority to be used with the session.
N
card logon through the rest of the Identity Directory
Provider
process.
ot
fo
Users
rr
Corporate Network
es
FAS Server Certificate Active
al
Authority Directory
e
or
Citrix
StoreFront Controller VDA
Gateway
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
This certificate will then be used to mimic a smart card logon, which will see the user connected to their resources.
N
• Upgrade all components to 7.9 or higher.
ot
• StoreFront must be 3.6 or higher.
fo
• Complete deployment:
rr
• Install and Enable FAS.
es
• Configure Group Policy.
• Deploy templates.
al
• Configure CA.
e
FAS
• Authorize FAS.
or
• Configure User Rules.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• To implement FAS with Citrix Virtual Apps and Desktops the FAS components should be installed on a separate, secured server to all
other Citrix components. The Citrix Virtual Apps and Desktops components must be v7.9 or higher with StoreFront being V3.6 or
higher.
• Once FAS has been installed, it needs to be enabled via PowerShell before group policy is configured and templates are deployed.
• You then need to configure the Certificate Authority and authorize the Federated Authentication Service before configuring the user
rules.
N
For Module 5.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning.
• The lab should finish provisioning in time to start the lab exercise.
N
Citrix Virtual Apps and Desktops 7
ot
environments without the use of the
fo
Federated Authentication Server (FAS)?
rr
No, FAS is required for SAML authentication
es
with Citrix Virtual Apps and Desktops 7.
al
e
or
di
s tri
b ut
io
n
Key Notes:
In order to use SAML with Citrix Virtual Apps and Desktops we are required to implement federated authentication services.
N
ot
• Exercise 5-2: Integrate FAS with Citrix Virtual Apps
and Desktops
fo
rr
• Exercise 5-3: Configure and Test FAS
es
• Exercise 5-4: Integrate FAS with ADFS and SAML
al
• Exercise 5-5: Test SAML authentication using ADFS
e
and FAS
or
di
s
tri
b
ut
io
n
N
Citrix Virtual Apps and Desktops by using
ot
Citrix Gateway.
fo
• The number of smart card PIN prompts that
rr
appear for users will depend on how Citrix
Gateway and Citrix Workspace app are
es
configured.
al
• Citrix Federated Authentication Service allows
e
StoreFront to use a broader range of
or
authentication options, such as SAML.
di
s
tri
utb
io
n
N
ot
Planning: App and Data Security
fo
rr
es
al
e
Module 6
or
di
s
tri
b
ut
io
n
N
attackers can compromise Citrix Virtual Apps
ot
and Desktops Site security using the jailbreak
method.
fo
rr
• Identify the different methods used to
implement Defense in Depth security in a Citrix
es
Virtual Apps and Desktops environment.
al
• Identify the different methods used to minimize
e
the impact of attacks in a Citrix Virtual Apps
or
and Desktops environment.
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
ot
Application Security
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be introducing the concepts behind application security. We will review the concept of breakouts, and how a
“defense in depth” approach can help prevent and mitigate them.
N
approach).
ot
• The strategy is based on the military principle that it
fo
is more difficult for an enemy to defeat a complex
rr
and multi-layered defense system than to penetrate
es
a single barrier.
al
• A Citrix environment is layered and should be
e
secured at each layer.
or
• Securing networks, operating systems,
applications and file systems together is the
di
s
key behind Defense in Depth.
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In a Citrix Virtual Apps and Desktops environment, the StoreFront or Citrix Gateway in the DMZ is merely a pass‐through
authentication service for the backend Citrix resources.
• The applications and environments reside on the Citrix Virtual Apps and Desktops Site, potentially providing an attacker a shell in this
private network when compromised.
• It is, therefore, important to understand the architecture and possible consequences of a Citrix jailbreak should it occur.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
• Now the attacker may have access to the file system and other applications.
ot
• Always assume that the attacker will be able to break out of the application.
fo
rr
es
Server VDA
al
e
App A App C App E
or
Attacker Endpoint Published
di
Resource App B App D App F
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Should an attacker be able to get access to a domain account, perhaps via social engineering or using a test account that was not
properly secured, they could access an application, such as Notepad, that is published to domain users for testing Citrix Virtual Apps
and Desktops functionality. Once accessed, they have established a session inside the secured perimeter with this account.
• A HDX session running on the same server as other potentially more important applications gives the attacker an opportunity to try
to jailbreak from the HDX session application. There are many different options available to an attacker.
• For example, in an unsecured Citrix environment, they can just use Ctrl + F1 to start Task Manager and from there they can start
N
important to consider that publishing filtering, that is reducing access to applications, should not be considered a
ot
security feature as jail breaks are possible.
fo
• Applications that are installed on the same server may be easily accessible should a jailbreak be successful.
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
multifactor authentication for all external HDX
sessions. Will this prevent all attacks on the
fo
environment? Why?
rr
es
No. It is still possible for an attacker to gain
access to credentials and or endpoints through
al
social engineering or a man-in-the-middle
e
attacker (e.g., disgruntled employee).
or
As a result, a defense in depth approach should
di
be used so that additional layers of protection
s tri
can prevent or at least mitigate the damage an
b
attacker can do.
ut
io
n
Key Notes:
• No single security practice, product, or feature discussed in this course is sufficient to prevent all attacks on its own. By implementing
multiple layers of security, performing an attack without detection is made much more difficult.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be looking at methods aimed at preventing jailbreak attacks.
Published Resource
N
Group A
ot
Published Resource
fo
Group B
rr
es
Published Resource
Group C
al
e
or
Group Group Membership
Membership
Remote Desktop Users
di
s
NTFS
tri
User Profiles \
b
CTX-Core Folder Redirection
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• For many years, the best leading practice is to use Active Directory groups for resource assignment, and to not publish applications
for specific users. This is not only for security, but also to simplify management. Another leading practice is to refrain from
publishing applications to all users. Don't publish applications to the domain users’ group. Don't publish applications to all
authenticated users and try to limit the access as much as you can.
• You should avoid publishing resources to non‐specific users, typically anonymous accounts, or user accounts that are shared by
multiple users. If such accounts are required for a certain use case, such as kiosks or hospital stations, additional measures must be
N
published applications and then create one group for Citrix access where we call it, for example, CTX‐Core.
ot
• Next, we add all the individual app groups that are used for publishing as members to this central group.
fo
• Finally, all required permissions are assigned to this new group. When a user is added to any of the published
applications, they will get all the required backend permissions automatically.
rr
• Using the principle of least privilege approach not only makes it easy to provision access, but deprovisioning is much
es
easier as well. Once a user is removed from the last AD group for publishing, they will inherently lose permissions to all
al
shared resources.
• Restricting permissions for Remote Desktop Services Access or Direct Access permissions can also reduce the
e
opportunities for an attacker to gain permissions that can be exploited maliciously, and which are not a requirement for
or
normal business as usual activities.
•
di
It is also important to enforcing restrictions on Local Users and Groups. For example, applying the following restrictions
to the local administrators’ group can improve security.
s tri
• Deny access to this computer from the network.
• Deny log on as a batch job.
b ut
• Deny log on as a service.
• Deny log on through Remote Desktop Services.
io
n
Additional Resources:
• Manage logon rights
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/secure/best‐practices.html#manage‐logon‐rights
• Configure Permissions for Remote Desktop Services Connections
https://technet.microsoft.com/en‐us/library/cc753032(v=ws.11).aspx
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
keys.
ot
• Restrict access to the ICA file.
fo
• Disable unneeded HDX channels and
rr
redirections.
es
• Remove unneeded devices and drivers.
al
• Restrict access to the command-line,
e
PowerShell, and the registry.
or
• Restrict Control Panel access and
di
functionality.
s tri
• Limit local VDA machine and client drive
b
access.
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Depending on the session type and version of Citrix Workspace app used, users could potentially use HDX session shortcuts or help
keys to gain unauthorized access to parts of the operating system. Hotkey sequences are key combinations designed by Citrix to
assist users. For example, in some versions of Workspace app, the Shift+F1 sequence reproduces Ctrl+Alt+Delete, and Shift+F2
switches applications between full‐screen and windowed mode. You cannot use hotkey sequences with virtual desktops displayed in
the Desktop Viewer, but you can use them with published applications. To improve security, determine whether a given published
app uses hotkeys, and whether those hotkeys should be used in an HDX session.
N
• In Desktop Viewer sessions, WIN+L is directed to the local computer.
ot
• Ctrl+Alt+Delete is directed to the local computer.
fo
• Key presses that activate StickyKeys, FilterKeys, and ToggleKeys (Microsoft accessibility features) are normally
directed to the local computer.
rr
• As an accessibility feature of the Desktop Viewer, pressing Ctrl+Alt+Break displays the Desktop Viewer toolbar
es
buttons in a pop‐up window.
• Ctrl+Esc is sent to the remote, virtual desktop (opens Start Menu).
al
• Solutions: Disable the Desktop Viewer via StoreFront; update the default.ica file; and disable Task Manager access via
e
GPO.
or
• Securing the ICA file is another important way to reduce undesired levels of access. It is a good idea to restrict
di
download access to the ICA file in general. This helps to stop amendments to the ICA file to try and control launch
parameters. As the ICA file has no ties to the client for which it was generated, a hijack of a VDI launch is relatively
s tri
simple by simply preventing the ICA file from running on the intended machine and copying it to another machine. This
approach would still require user credentials to generate the ICA file. Some browsers used to access Citrix Workspace
b ut
app for Web may be prompted to download the ICA file when they click on a published resource icon, which can be
subsequently opened with any text editor (Notepad, WordPad, Microsoft Word etc.). To reduce the risk of ICA files
io
being downloaded we have a few options,
n
• For managed endpoints, place the applicable StoreFront and Gateway URLs in the Intranet zone so that ICA file
download is not prompted.
• Offer a fallback to the Citrix Workspace app HTML5 or a download location for Citrix Workspace app in the event that
the endpoint does not already have Citrix Workspace app (this will often cause the .ica file to be downloaded as
well). Additionally, enforcing use of the HTML5 Citrix Workspace app will prevent ICA files from being downloaded to
N
time out after a default amount of time, limiting the potential for misuse.
ot
• Disabling all HDX channels that are not required is also an important tool to protect your connections.
fo
• Redirection (or offloading) is one of the areas where you have to balance user experience with security. Offloading
(Windows Media) essentially allows you to transfer data between the session and endpoint, which is always
rr
potentially dangerous. For environments where security is important, a leading practice is to disable all offloading.
es
• Even if there appears to be no direct security threat, it is important to minimize the attack surface by removing
al
unnecessary functionality.
• Remove access to printers or devices that are not absolutely required. Especially as this often leads to file system
e
access via “Print to File”.
or
• Remove drivers that provide access to devices and services that are not required for example floppy drives or music
di
search.
• Disable or remove floppy drives, USB ports, and other means of connecting external drives to restrict copying of data
s tri
to removable devices.
b ut
Additional Resources:
• How to Configure Desktop Viewer
io
https://support.citrix.com/article/CTX209468
n
• How to Enable or Disable Hotkeys within an ICA File (including Template.ica file)
https://support.citrix.com/article/CTX140219
• Support for ICA files in Citrix Virtual Apps and Desktop Environment
https://support.citrix.com/article/CTX200126
• How the HTML5 plugin & Chrome Connections Work
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
applications. Operating System
ot
• Apply vendor recommended hardening
HDX Session
fo
configuration.
rr
• Be careful with applications that provide a
es
Application Application
development environment. Hardening Hardening
al
• Because web browsers often have external
e
App-to
network access, they tend to pose a significant App
or
Policy
security risk relative to other apps.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• One very important task is to review policies and hardening guides for all applications that are published on a specific server. Apply
the recommended hardening configuration.
• For example, disable context menus, printing (if not required) or diagnostic tools. Be especially careful with applications that
provide a development environment, such as Visual Basic for Applications language.
• Web browsers present a special security concern because, by their nature, they are intended to access content from outside the
internal network.
N
connection.
ot
• Open redirection could be implemented on a vulnerable web page so that users accessing the page are redirected to
fo
an untrusted, malicious website. This is often used in phishing attacks, where the malicious website mimics the
original website to collect personal user information. Preventing open redirection must be implemented by the
rr
website owner by closing known security vulnerabilities in login pages and referrer parameters.
es
• Domain relaxation, also known as same‐origin policy, allows web browsers to permit scripts to run between web
al
pages from the same origin, such as the same root domain. This provides a clear separation between trusted and
untrusted content. Microsoft Edge’s security zones use this concept.
e
• DNS/ARP/cache poisoning is an attack technique where spoofed ARP messages are transmitted over a LAN. This is
or
the precursor to a man‐in‐the‐middle attack, where traffic gets routed through an untrusted machine on its way to
di
the intended target.
• Web proxies are often used as an intermediary between internal endpoints and the Internet. In an enterprise
s tri
environment, proxies are often used to apply content filtering and other security policies to reduce the risk to the
internal network.
b ut
• Encryption of web traffic should be commonplace and HTTPS communications should be enabled through the use of
certificates from Trusted Root CAs. The encryption algorithm and hash used can also affect the level of security
io
provided by a given certificate.
n
• We also need to consider the Session and state management.
• Session persistence, especially SSL session persistence, helps improve the functionality and performance of a web
app. This is typically provided through the use of cookies, which ensure that when users connect to a set of load
balanced web servers, they are directed to the same server for the duration of the session. However, cookies can
potentially be exploited in cross‐site scripting attacks. Cookie security options (HTTPS‐only, domain‐matching, path‐
N
• Content filtering and security allow administrators to focus on controlling specific content or content types. For
ot
example we can restrict access to specific websites and determine how specific files are processed. We also need to be
fo
careful of embedded or hidden objects in web pages which may present risks. Locking down a web page’s ability to run
hidden or unsecure content is highly recommended.
rr
• In Citrix Virtual Apps and Desktops, each of the major browsers can be configured to run using special parameters. This
es
can help to lock down large portions of the browser even before implementing additional policies. These include Kiosk
al
and incognito modes along with the ability to disable extensions. These special modes can be implemented using the
commands here;
e
• Kiosk mode
or
• Google Chrome: ‐‐kiosk ‐‐no‐default‐browsercheck ‐‐no‐first‐run <URL>
• Microsoft Edge and Firefox: ‐k <URL>
di
• Incognito mode
s tri
• Google Chrome: ‐‐incognito
• Microsoft Edge and Firefox: ‐private
b ut
• Disable Extensions
• Google Chrome: ‐‐disable‐extensions see chrome://extensions
io
• Microsoft Edge: ‐extoff
n
• Firefox: ‐safe‐mode
• Web security can be further enhanced through Group Policy settings. This can allow different web browsers such as IE,
Chrome, and Firefox, to attain different levels of security based on the settings available for each. We can manage
browser settings with the help of browser‐specific Administrative Templates.
N
• Quickly and securely delivers SaaS User Layer Access Layer Control Layer Resource Layer
ot
and web applications to any modern Citrix and Microsoft
group policies provide
Delivery
fo
browser. Controller further lockdowns to
the VDA.
• Delivers older/legacy customer
rr
applications more effectively and Domain
es
Controller
reliably. Internal Users StoreFront
al
Multi-session OS
e
built into the on-premises Citrix Virtual
or
Apps and Desktops product. License
Server
di
Compute Layer
s tri
Network Storage Processor Memory Graphics Hypervisor
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• By tightly locking down browser activity we can improve security. Secure Browser is available as a Citrix Cloud service, where
everything will be preconfigured for you – just supply the URLs of the web apps you need users to access; and you have a quick
solution to secure browsing.
• It is also possible to replicate the Secure Browser configuration in an on‐prem deployment. The end‐result is that users can have a
seamless web‐based application experience where a hosted web‐based application simply appears within the user’s preferred local
browser.
N
Additional Resources:
ot
• How to Configure Desktop Viewer Citrix Virtual Apps and Desktops Secure Browser
fo
https://www.citrix.com/digital‐workspace/secure‐browser.html
rr
es
al
e
or
di
s tri
b ut
io
n
N
components.
ot
• Be aware of hidden scripting environments.
fo
• Make use of User Account Controls (UAC) to
rr
prevent unauthorized changes to a system.
es
• Allow users to run executables only from
al
locations where they don’t have write
e
permissions (such as Program Files and
or
Windows folders).
di
s tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• If an attacker is not able to use their own code to break out of a session, they will try to use whatever is available on the box.
• Make sure to secure all administrative tools that could be abused – command prompt (and PowerShell), Registry editor, Task
Manager, and many others. You can also use 3rd party tools to password protect the executables (if you still need to execute them for
troubleshooting purposes).
• Be aware of hidden scripting environments. There are many technologies that are very powerful; and a professional attacker can use
them to their advantage.
N
unintended access to launch executables, data‐mine files, or write malware. This does not only mean Windows
ot
Explorer, but also any other methods that access the file system.
fo
• A good example is the Windows print functionality that allows a user to “Print to File” or use “Save As” dialogs.
Hiding local drives is another common method accomplished either by using Group Policy (hide & prevent access) or
rr
Group Policy Preferences (hide, but do not prevent access).
es
• In general, logon or logoff scripts can limit the number of lockdowns that can be applied to the command‐line,
al
PowerShell ISE, or the registry should the script require silent access to these items. In this scenario, an attacker could
exploit that to run their own scripts so consideration should be given to avoiding logon scripts where possible.
e
or
di
s tri
b ut
io
n
N
control what processes can run on a machine.
ot
• These tools control the executable files,
fo
scripts, Windows installer, and DLL files.
rr
• Use Citrix Workspace Environment
es
Management (WEM) to centrally manage
security. These include Windows AppLocker,
al
process hierarchy and process
e
blacklists/whitelists.
or
• Take a gradual approach to creating rules,
di
when applying to a production environment, to
s tri
ensure needed functionality is maintained.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Various tools can be used to create whitelists, permitted access or blacklists, denied access with Microsoft AppLocker being one of
the most common ones.
• Using AppLocker, you can achieve a number of objectives including:
• Control the applications: executable files (.exe and .com), scripts (.js, .ps1, .vbs, .cmd, and .bat), Windows Installer files (.msi and
.msp), and DLL files (.dll and .ocx).
• Define rules based on file attributes derived from the digital signature, including the publisher, product name, file name, and file
N
rules from all of the rule collections are exported, including the enforcement settings for the rule collections. If you
ot
import a policy, all criteria in the existing policy are overwritten.
fo
• Streamline creating and managing AppLocker rules by using Windows PowerShell cmdlets.
• AppLocker helps reduce administrative overhead and helps reduce the organization's cost of managing computing
rr
resources by decreasing the number of help desk calls that result from users running unapproved applications.
es
• To centrally manage application security across multiple machines, a leading practice is to use Citrix Workspace
al
Environment Management (WEM). WEM is used for machine optimization as well as machine security. It can apply the
Windows AppLocker feature, manage and apply blacklists and whitelists.
e
or
Additional Resources:
• What Is AppLocker?
di
https://technet.microsoft.com/en‐us/library/ee424367(v=ws.10).aspx
s tri
• Requirements to use AppLocker
https://docs.microsoft.com/en‐us/windows/device‐security/applocker/requirements‐to‐use‐applocker
b ut
• WEM Security
https://docs.citrix.com/en‐us/workspace‐environment‐management/current‐release/user‐interface‐
io
description/security.html
N
Does locking down an HDX session involve Citrix
ot
configurations or Microsoft configurations?
fo
rr
es
Ideally, both Citrix and Microsoft configurations should
be implemented to fully lock down an HDX session.
al
e
or
di
s
tri
utb
io
n
fo
rr
es
al
e
or
di
s tri
utb
io
n
Key Notes:
In this lesson, we will look at how we can minimize the impact of attacks.
• If a breakout occurs on a VDA, an attacker could gain access to other applications installed on the same
machine, administrative tools, or sensitive data.
N
• Consider dedicating a group of servers with dedicated security for very sensitive applications.
ot
• Consider separating networks.
fo
rr
es
Server OS VDA 1 Server OS VDA 2
al
e
App A App C App E
or
Attacker Published
Resource
App B App D App F
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• As mentioned earlier, despite of all the lockdowns covered so far, given sufficient time, we can assume that an attacker will find a
way to perform a jailbreak. So, assuming that you cannot prevent this from happening, what can you do?
• By isolating applications that are at higher risk, we can apply different or additional security to reduce the available footprint to the
network in the event of a jailbreak. In effect, you are minimizing the options that are available once a jailbreak has occurred.
• For example, if we publish sensitive HR or accounting apps on dedicated servers, we can lock them down further than, say, office
N
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
ot
fo
rr
es
Server OS VDA
al
e
App A App C
or
Attacker Published Resource
di
App B App D
s
tri
NTFS
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Once you isolate your servers into groups, you can add another layer of protection. Try to isolate all applications from others on the
same server).
• A simple method is to use NTFS permissions to isolate applications from each other. Whenever possible, block access at the folder
level using read and execute permissions.
• Sometimes, if the folder contains libraries like MS Office and Adobe Acrobat, you can secure the executables.
• You can use the same AD group that is used to publish the application. That way, you can also guarantee that when a user sees an
N
ot
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
monitor and identify
ot
inconsistent or suspicious
fo
activities on your networks. It
rr
provides actionable insights
es
such as:
• User behavior.
al
• Usage risk based on indicators
e
identified across users,
or
endpoints, network traffic, and
files.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Once users are discovered by Citrix Analytics, they will (after some time), get a risk score assigned to their account.
• A risk score is a value that indicates the aggregate level of risk a user poses to the network over a pre‐determined monitoring period.
This value is dynamic; and it is based on User Behavior Analytics (UBA) that study and determine patterns of user behavior.
• These algorithms are applied to analyze anomalies that indicate potential threats. For a defined monitoring period, risk score is an
aggregate of the risk indicators that are triggered for a user.
• Risk indicators are user activities that look suspicious or can pose a security threat to the organization. Risk indicators span across
N
• Low risk users ‐ Users who may have some violations detected on their account.
ot
fo
Additional Resources:
• About Security Analytics
rr
https://docs.citrix.com/en‐us/citrix‐analytics/security‐analytics/about.html
es
al
e
or
di
s tri
b ut
io
n
N
SR Policy Delivery
ot
• Faster problem resolution Console Controller
fo
Internal Users StoreFront Multi-session
failure. OS VDA
Domain
Controller
w/ SR Agent
rr
• Quickly troubleshoot errors through time-stamped Firewall
Session Recording
Server
visual records.
es
• Address difficult to reproduce errors. Citrix Single-session
Databases (Includes
SR Database)
al
Firewall
External Users Gateway OS VDA w/ SR
• Enhanced auditing Agent
e
• Record admin screen for change management of Session Recording License
or
Player Server
critical systems.
• Notify users of recording to help deter potential
di
Compute Layer
misdeeds.
s tri
Network Storage Processor Memory Graphics Hypervisor
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Session Recording uses flexible policies to automatically trigger recordings of Citrix Virtual Apps and Desktops sessions. This enables
IT to monitor and examine user activity. This is particularly useful in areas such as financial operations and healthcare patient
information systems. It can be used to demonstrate internal control, thus ensuring regulatory compliance and aids security audits.
Similarly, it also aids in technical support by speeding problem identification and reducing time‐to‐resolution.
• Benefits of Session Recording include:
• Providing a definitive log of activity involving sensitive data access. This enables organizations to record user activity while
N
can enable recording of user sessions. When the issue occurs again, SRT provides a visual record of the error, which
ot
can be used with other event logging tools to troubleshoot user issues faster.
fo
• Session Recording consists of five components:
• Session Recording Agent ‐ A component installed on each Server OS or Desktop OS machine to enable recording. It is
rr
responsible for recording session data.
es
• Session Recording Server ‐ A server that hosts:
• The Broker ‐ An IIS 6.0+ hosted Web application that handles the search queries and file download requests from
al
the Session Recording Player; handles policy administration requests from the Session Recording Policy Console;
e
and evaluates recording policies for each session.
or
• The Storage Manager ‐ A Windows service that manages the recorded session files received from each Session
di
Recording‐enabled computer running Citrix Virtual Apps and Desktops.
• Session Recording Player ‐ A user interface that users access from a workstation to play recorded session files.
s tri
• Session Recording Database ‐ An SQL database for storing recorded session data.
• Session Recording Policy Console ‐ A console used to create policies to specify which sessions are recorded.
b ut
Additional Resources:
io
• Session Recording
n
https://docs.citrix.com/en‐us/session‐recording/2203‐ltsr/
• Install, upgrade, and uninstall Session Recording
https://docs.citrix.com/en‐us/session‐recording/current‐release/install‐upgrade‐uninstall.html
N
Server.
ot
6 1
4. SR Agent records session; sends data to SR
fo
Server. 2 3 5
rr
5. SR Server logs session data; sends metadata 4 Session Recording
es
Server Session Recording
to the database and the recordings to storage. Endpoint Multi-session OS
VDA Database
al
w/ SR Agent
6. SR Player can retrieve and play session
e
5 7
recordings by contacting SR Server.
or
7. Files can be archived via 3rd party archive
di
solutions. 3rd Party Archiving
s
Storage
Solution
tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Once session recording has been configured and activated, the SR Agent is in “capture” mode, monitoring all HDX sessions that start
up and asking the SR Server what to do: record or not, and if record, notify or not.
• If the policy is to record, the session data is sent to the SR Server for processing.
• The actual session recordings are written to storage and various metadata associated with the session is logged.
• Metadata includes session attributes such as the user, the application, the session start time, and the Worker used.
• An authorized user can use the SR Player to search metadata records for items of interest to play back.
Additional Resources:
• Get started with Session Recording
N
https://docs.citrix.com/en‐us/session‐recording/current‐release/get‐started.html
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Please Take a Moment and Provision Your Lab For
ot
Module 6.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to provision; just initiate the provisioning. The lab should finish provisioning in time to start the lab exercise.
N
Definition Capabilities What It Protects What does NOT Protect
ot
fo
rr
es
App protection is an add- Anti-keylogging and anti- • Citrix logon windows. • Items under the Citrix
on feature for the Citrix screen-capturing • Citrix Workspace app Workspace app icon in
al
Workspace app that capabilities. HDX session windows the navigation bar:
e
provides enhanced (example, managed • Connections Center
or
security when using Citrix desktop). • All links under
Virtual Apps and Desktops • Self-Service (Store) Advanced Preferences
di
published resources. • Personalize
windows.
• Check for Updates
s
• Sign Out
tri
b ut
io
n
Key Notes:
• App Protection behaves differently depending on how you access the StoreFront store. When using StoreWeb, apps subject to
protection policies are not enumerated. This also applies where unsupported Citrix Receivers or Workspace App is used. Protection
is applied to all supported Citrix Workspace app versions.
• Protection is applied under the following conditions:
• Anti screen capture – enabled if any protected window is visible on the screen. To disable protection, minimize all protected
windows.
Additional Resources:
• App Protection onPrem
https://www.citrix.com/blogs/2020/02/25/app‐protection‐is‐now‐ga‐for‐on‐prem‐citrix‐virtual‐apps‐and‐desktops/
• App protection
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/secure/app‐protection.html
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
• Text-based session watermarks help to deter and enable tracking data theft.
N
• Traceable information appears on the session desktop as a deterrent to those using photographs and screen
ot
captures to steal data.
fo
• The watermark displays over the entire session screen without changing the content of the original document.
rr
• Text-based session watermarks require VDA support.
es
• The solution does not prevent data theft, but it provides some level of deterrent and traceability.
al
• Session watermark supports only Thinwire and not the Framehawk or Desktop Composition Redirection (DCR)
e
graphic modes.
or
• If you use Session Recording or Windows remote assistance, the recorded session doesn’t include the
di
watermark.
s
tri
b ut
io
n
Key Notes:
• If certain conditions are met in relation to session parameters, it is possible to place a text‐based layer, or watermark on the HDX
session window. This has the advantage of providing a deterrent against data theft through screen captures or independent
recording technologies, such as video or still image recording.
• Watermark limitations:
• Session watermarks are not supported in sessions where Local App Access, Windows media redirection, MediaStream, browser
content redirection, and HTML5 video redirection are used. To use session watermark, ensure that these features are disabled.
Additional Resources:
• Text‐based session watermark
N
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/graphics/session‐watermark.html
ot
• Session watermark policy settings
fo
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/policies/reference/ica‐policy‐settings/session‐watermark‐
policy‐setting.html
rr
es
al
e
or
di
s tri
b ut
io
n
N
Which built-in Windows setting allows
ot
administrators to provide granular access
permissions to individual files and folders?
fo
rr
es
NTFS permissions can be used to accomplish this.
They also provide an additional layer of protection for
al
applications.
e
For ease of management, use the application-specific
or
Active Directory groups when configuring NTFS
di
permissions.
s
tri
b
ut
io
n
N
Administration Components
ot
• Exercise 6-2: Install the Session Recording
fo
Agent
rr
• Exercise 6-3: Configure Director to use the
es
Session Recording Server
al
• Exercise 6-4: Test Session Recording
e
or
di
s
tri
utb
io
n
N
necessary to mitigate that risk.
ot
• Implementing user group nesting assignments for
fo
accessing resources, removing undesired Citrix and
rr
Microsoft functionalities, hardening web and
es
applications, and restricting application access are
different methods used to deploy a Defense in
al
Depth solution.
e
• Utilizing Citrix Analytics for Security, Session
or
Recording, and App protection are a few solutions
di
that can be deployed to minimize the impact of
s
attacks in a Citrix Virtual Apps and Desktops site.
tri
b
ut
io
n
N
ot
Planning: Virtual Delivery Agent Security
fo
rr
es
al
e
Module 7
or
di
s
tri
b
ut
io
n
N
are used to secure machines, devices,
ot
sessions, enforce endpoint compliance, and
fo
users in a Citrix Virtual Apps and Desktops
rr
environment.
es
• Describe how to harden a base image for
al
provisioning secure virtual machines.
e
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
N
Virtual Delivery Agent (VDA)
ot
Encryption
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will look at the use of end‐to‐end TLS encryption to protect traffic to and from the VDA.
SSL/TLS
• By default, the Citrix
Endpoint Devices Citrix Gateway VDA
Gateway does not use SSL
N
(TLS) to secure the HDX
ot
proxy to the session.
fo
• For some industries, Other Industries: All Traffic is secured using SSL (TLS).
rr
securing external traffic is
es
sufficient.
al
• Other industries require SSL/TLS In SSL/TLS
e
companies to secure both
or
external and internal traffic. Endpoint Devices Citrix Gateway VDA
di
s tri
utb
io
n
Key Notes:
• Transport Layer, or TLS encryption between components internally is a requirement for FIPS and PCI compliance. Many industries
also mandate its use for internal traffic.
N
encryption. Secure ICA is available to increase Controller VDAs
ot
this encryption level. StoreFront
Internal
Multi-session OS
fo
Domain Single-session
• TLS encryption improves on basic XOR Users
Controller OS (Assigned
rr
Desktop )
Secure ICA, using cryptographic protocols that Firewall
es
Databases Single-session OS
Firewall Citrix Remote PC
the network. External (Random Desktop)
al
Users Gateway
e
License
Server
like the Citrix Gateway, to achieve end-to-end
or
TLS security. Compute Layer
di
s
Network Storage Processor Memory Graphics Hypervisor
tri
b ut
io
n
Key Notes:
• By default, HDX traffic uses a basic XOR‐based encryption algorithm. It protects the data stream from being read directly, but it can
be decrypted. Rather than use the SecureICA minimum encryption level setting for Citrix Virtual Apps and Desktops 7, a leading
practice is to use TLS to secure HDX traffic if end‐to‐end traffic encryption is desired.
• A SecureICA minimum encryption level Citrix policy is available as a way to increase the encryption level of the HDX logon traffic to
Server OS VDAs by using a 128‐bit RC5 algorithm. Although simple to implement, this policy only covers logon data; it does not
N
• By default, the server uses Basic encryption for client‐server traffic.
ot
• RC5 (128 bit) logon only encrypts the logon data with RC5 128‐bit encryption and the client connection using Basic
fo
encryption. This is the setting that can be selected in Citrix Virtual Apps and Desktops 7 environments.
• RC5 (40 bit) encrypts the client connection with RC5 40‐bit encryption (legacy environments only).
rr
• RC5 (56 bit) encrypts the client connection with RC5 56‐bit encryption (legacy environments only).
es
• RC5 (128 bit) encrypts the client connection with RC5 128‐bit encryption (legacy environments only).
•
al
The settings you specify for client‐server encryption can interact with any other encryption settings in your environment
and your Windows operating system. If a higher priority encryption level is set on either a server or user device, settings
e
you specify for published resources can be overridden.
or
• You can raise encryption levels to further secure communications and message integrity for certain users. If a policy
di
requires a higher encryption level, Citrix Workspace app using a lower encryption level are denied connection.
• It is worth noting that SecureICA does not perform authentication or check data integrity. (To provide end‐to‐end
s tri
encryption for your site, use SecureICA with TLS encryption.) SecureICA does not use FIPS‐compliant algorithms either.
If this is an issue, configure the server and Citrix Workspace app to avoid using SecureICA.
b ut
Additional Resources:
io
• Transport Layer Security (TLS)
n
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/secure/tls.html
• Security policy settings
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/policies/reference/ica‐policy‐settings/security‐policy‐
settings.html
Delivery Controller
N
1
ot
1. Add certificate to VDAs.
fo
2. Enable TLS on VDAs.
rr
2
3. Enable TLS on Controllers. SSL/TLS SSL/TLS
es
Endpoint Devices Citrix
al
VDA
Gateway
e
or
di
s tri
b
ut
io
n
Key Notes:
• To enable TLS encryption, you need to add certificates to the VDAs, and then configure the VDAs and Controllers to use encryption.
We’ll look at each of these steps in more detail because there are some important things to consider.
• In a typical scenario, external connections are secured to Citrix Gateway, but the “last mile” does not leverage TLS by default.
• You should encrypt HDX traffic to prevent an attacker from being able to watch everything that a user is doing. ICA ports 1494, 2598
and 8008 are unencrypted by default (though not plain text).
• With the release of Citrix Virtual Apps and Desktops 7.6, it is now possible to implement TLS encryption that is FIPS approved from
N
script will use TLS_1.0 by default, which should no longer be used due to vulnerabilities. The SSLCiperSuite parameter
ot
allows you to select your preferred cipher suite, which can include Government, Commercial and All. The certificate
fo
thumbprint parameter allows you to specify which certificate you want to use. Most of the time, you won’t need this
parameter as you’ll just have one cert on the VDA.
rr
• The last step is to enable encryption on the controller.
es
• There are two PowerShell commands that you need to run on each controller:
• The first one enables TLS for all delivery groups, although you can also enable TLS for individual delivery groups if
al
you wish.
e
• The second PowerShell command changes the address of the VDA in the ICA file from IP address to FQDN, so that
or
it matches the name in the certificate.
•
di
It is worth noting that, when you change the VDA address from an IP to FQDN, you lose the ability to directly connect
with Quick Launch.
s tri
• A Delivery Group cannot have a mixture of some VDAs with TLS configured and some VDAs without TLS configured.
When you configure TLS for a Delivery Group, you should have already configured TLS for all the VDAs in that Delivery
b ut
Group.
• When you configure TLS on VDAs, permissions on the installed TLS certificate are changed, giving the ICA Service read
io
access to the certificate’s private key, and informing the ICA Service of the following:
n
• Which certificate in the certificate store to use for TLS.
• Which TCP port number to use for TLS connections.
Additional Resources:
• How To Secure ICA Connections in Citrix Virtual Apps and Desktops using SSL
N
https://support.citrix.com/article/CTX220062/ssl‐configuration‐on‐vda
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
ot
XOR-based encryption
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
It is important to remember that XOR based encryption is considered legacy and TLS 1.2 or higher should be used.
ot
(GPOs) and Citrix Policies
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will explain how Microsoft GPOs, Citrix HDX policies, Citrix ADC and Citrix Gateway SmartAccess and SmartControl
are used to secure machines, devices, sessions, enforce endpoint compliance, and users in a Citrix Virtual Apps and Desktops
environment.
N
reduce exposure to threats and provides
ot
secure remote access to an environment and
its resources.
fo
rr
• With Citrix Virtual Apps and Desktops, both
Microsoft Group Policy Objects (GPOs) and
es
Citrix policies (HDX), can be used.
al
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• One of the most common methods of applying lockdowns to a Windows Operating Systems is via policies. Applied using a Group
Policy Object (GPO) to a production environment, settings must be evaluated to determine their appropriateness for your
organization’s environment. Setting should all be tested in a non‐production environment first.
• Depending on your organization’s requirements, Citrix Cloud GPOs may be more or less stringent than the ideal level of lockdowns.
• You can also separate admin from user policies allowing flexibility in your organization to give certain administrators full access to
tasks, and operations while other administrators have limited access.
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
environment access for users and
ot
Administrators.
fo
• Identify and confirm the requirements for each
rr
type of account, defining the identity,
authentication and access rights and
es
privileges.
al
• Separating policies will provide the level of
e
granularity needed to provide the right level of
or
access based on individual needs of users or
di
Administrators.
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• One of the most common methods of applying lockdowns to a Windows Operating Systems is via policies. Applied using a Group
Policy Object (GPO) to a production environment, settings must be evaluated to determine their appropriateness for your
organization’s environment. Setting should all be tested in a non‐production environment first.
• Depending on your organization’s requirements, Citrix Cloud GPOs may be more or less stringent than the ideal level of lockdowns.
• You can also separate admin from user policies allowing flexibility in your organization to give certain administrators full access to
tasks, and operations while other administrators have limited access.
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
Administrators access to specific resources or Virtual Delivery Agent
ot
environments.
fo
• Identify and confirm the requirements for each
rr
type of account, defining the identity,
authentication, and access rights and
es
privileges.
al
• Separating policies will specific user and
e
Policy Policy
administrator needs.
or
di
Admin User
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Separating admin from user policies allows flexibility in your organization to give certain administrators full access to tasks, and
operations while other administrators have limited access. This allows many different levels of lockdowns to be applied to different
user groups, including administrators who may need greater access to the machines.
• As a general leading practice, when applying security lockdown policies, ensure that your core administrator group is not
inadvertently included in settings that would prevent them from effectively performing their duties. At the same time, even
administrators should not have full access to the systems and machines under their control, according the PoLP.
N
Desktops environment.
ot
• Enables the administrator to deny access
fo
to peripheral devices, drive mapping, and
rr
much more.
es
• Allows for a quick and easy way to apply
al
the most restrictive policy to either users or
e
administrators.
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Citrix Virtual Apps and Desktops includes a Citrix Security and Control policy template that contains many settings appropriate to a
locked down environment, such as disabling use of client‐side peripheral devices (like USB drives), drive mapping, client‐side
rendering of media content, and more.
• Note that, applying some of these settings may consume more bandwidth and or reduce user density per server.
N
ot
fo
rr
es
All data:
text, files & folders Only text Only bitmaps
al
e
or
di
s
tri
One-Way One-Way No Clipboard
Two-Way Clipboard (Client-to-Server) Clipboard (Server-to-Client) Clipboard
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Citrix has introduced increasingly granular clipboard redirection settings to enable administrators to choose which type of content
can be transferred between a session and user device via the clipboard, as well as in which direction. Since CVAD 1903, clipboard
data that can be copied and or pasted between sessions. User devices includes files and folders; not just text and bitmaps.
• Client clipboard redirection is recommended for security‐focused environments to be disabled. This setting allows or prevents the
clipboard on the user device being mapped to the clipboard on the server. By default, clipboard redirection is allowed.
• To prevent cut‐and‐paste data transfer between a session and the local clipboard, select Prohibit. Users can still cut and paste data
N
formats to be shared with the client endpoint clipboard or user session clipboard. To use these settings, enable them
ot
and add the specific formats to be allowed.
fo
• The following clipboard formats are system defined:
• CFX_FILE (note: use this format to copy/paste files & folders)
rr
• CF_TEXT
es
• CF_BITMAP
• CF_METAFILEPICT
al
• CF_SYLK
e
• CF_DIF
or
• CF_TIFF
• CF_OEMTEXT
di
• CF_DIB
s tri
• CF_PALETTE
• CF_PENDATA
b ut
• CF_RIFF
• CF_WAVE
io
• CF_UNICODETEXT
n
• CF_ENHMETAFILE
• CF_HDROP
• CF_LOCALE
• CF_DIBV5
• CF_OWNERDISPLAY
N
• HTML Format
ot
• Enabling HTML format clipboard copy support (HTML Format) will copy any scripts (if they exist) from the source
fo
of the copied content to the destination. Check that you trust the source before proceeding to copy.
• If you do copy content containing scripts, they will only be live if you save the destination file as an HTML file and
rr
execute it.
es
• Additional custom formats can be added. The custom format name must match the formats to be registered with the
al
system.
• Format names are case‐sensitive. The restrictions will not apply if either Client clipboard redirection or Restrict client
e
clipboard write is set to Prohibited.
or
• In addition to security of files, and keeping the data internal, we also need to consider denying or limiting what a user
di
can do with the clipboard.
• You can also specify which direction and what content can be copied.
s tri
• One way
• Two ways
b ut
• Only text
• Only bitmaps
io
n
Additional Resources:
• ICA policy settings
https://docs.citrix.com/httpsen‐us/citrix‐virtual‐apps‐desktops/policies/reference/ica‐policy‐settings.html
N
• If CC certification is a requirement, these
ot
product versions should be used.
fo
• The set of Citrix and Microsoft GPOs used
rr
by Citrix to achieve this can be applied to
es
any supported version of Citrix Virtual Apps
al
and Desktops.
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Some Citrix products, including Citrix Virtual Apps and Desktops and Citrix Gateway, have achieved Common Criteria certification.
Details of this are available in the additional resources section.
• An Evaluated Configuration guide provides a more comprehensive review of the environment used to gain the CC certification. These
resources can be used as guidelines to assist in evaluating the relative security of different Citrix Virtual Apps and Desktops
configurations.
Additional Resources:
• Citrix Common Criteria Certification Information
https://www.citrix.com/about/legal/security‐compliance/common‐criteria.html
• Common Criteria Certified Products (expand categories and do a keyword search for Citrix)
N
http://www.commoncriteriaportal.org/products/
ot
• Securing Citrix Virtual Apps and Desktops Environments (see System Hardening Guidance for Citrix Virtual Apps and
fo
Desktops):
rr
https://www.citrix.com/about/legal/security‐compliance/security‐standards.html
es
al
e
or
di
s tri
b ut
io
n
N
Firewall Firewall
ot
fo
rr
Full Access
es
VDAs
Compliant Endpoints
al
e
or
Citrix Gateway StoreFront Delivery Controller
Limited:
di
Copy/Paste
Citrix Virtual Apps
Drive Access
and Desktops Site
s
Non-Compliant Endpoints Print Access
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In contrast to SmartAccess, Smart Control is implemented exclusively through ICA policies on the Citrix Gateway. Each ICA policy is an
expression and access profile combination that can be applied to users, groups, virtual servers, and globally. It is important to note
that ICA policies are evaluated after the user authenticates at session establishment. As a result, session settings can be defined and
applied before the user connection enters the internal network.
• SmartControl requires Citrix Virtual Apps and Desktops Premium licensing.
N
• Requires Universal Licenses:
ot
• Part of ADC.
fo
• Part of Citrix Virtual Apps and Desktops Premium.
• Smart Control is a Citrix ADC only feature so Citrix Virtual Apps and Desktops site does not know about it.
rr
• Allows controlling ICA Virtual Channel behavior on Citrix Gateway such as.
es
• Disabling/enabling client drives, printers, etc.
• Can be controlled by means of ADC syntax policies.
al
• Allows configuration “per Gateway”.
e
• Requires Citrix ADC Premium license.
or
• SmartControl can be used to verify a user device meets connection criteria, for example, checking that when users
di
connect they are running the latest antivirus version and then decide if they can connect.
• SmartAccess and SmartControl are two features which utilize Citrix Gateway to help control which resources and level
s tri
of access a given user and/or endpoint is granted based on pre‐defined criteria.
• SmartAccess allows you to control access to published applications and desktops on a server through the use of
b ut
Citrix Gateway session policies. You use pre‐authentication and post‐authentication checks for access to published
resources.
io
• Other conditions include anything you can control with a Citrix Virtual Apps and Desktops policy, such as
n
printer bandwidth limits, user device drive mapping, clipboard, audio, and printer mapping. You can apply a
Citrix Virtual Apps and Desktops policy based on whether or not users pass an Citrix Gateway check.
• This functionality is achieved by integrating Citrix Gateway components with StoreFront and Citrix Virtual Apps
and Desktops. This integration provides advanced authentication and an access control options to StoreFront
• Smart Control allows administrators to define granular policies to configure and enforce user environment
N
• Restriction of access to the resources based on Active Directory (AD) identify or group membership.
ot
• SmartControl enables:
fo
• Resource access restrictions based on EPA.
• Verification of required security measures enabled on devices.
rr
• Single point of configuration for all Citrix Virtual Apps and Desktops servers behind the Citrix Gateway.
es
al
Additional Resources:
• Configuring SmartAccess
e
https://docs.citrix.com/en‐us/citrix‐gateway/13/integrate‐web‐interface‐apps/ng‐smartaccess‐wrapper‐con.html
or
• Configuring SmartControl
di
https://docs.citrix.com/en‐us/citrix‐gateway/13/integrate‐web‐interface‐apps/smart‐control.html
• Demo Guide for SmartAccess and SmartControl
s tri
https://www.citrix.com/content/dam/citrix/en_us/documents/guide/demo‐guide‐for‐smart‐access‐smart‐control.pdf
b ut
io
n
N
registry changes to remove different menu
ot
options or buttons from various portions of
windows.
fo
rr
• These registry changes are not officially
supported by Microsoft and Citrix and present
es
the risk of corrupting the OS image.
al
• If you choose these methods, always create a
e
registry backup and test with a non- production
or
image before rolling out changes to
di
production.
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• While it is possible to configure many options to make an environment secure, direct editing presents a significant risk.
• Registry backups and non‐production testing are critical to avoiding potential issues when editing the registry.
N
ot
SmartAccess is a feature of?
SmartControl is a feature of?
fo
rr
es
• Smart Access - Feature of Citrix Virtual Apps
al
and Desktops.
e
or
• Smart Control - Feature of Citrix ADC.
di
s
tri
b
ut
io
n
N
For Module 7.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will be looking at how to manage images to ensure leading security practice is followed.
VDA
• Harden all components by using a Gold Disk
N
image when possible.
ot
• Enable cryptographic checksum and hashes on
Gold Disks and OS.
fo
• Patch all components in a timely manner to
rr
Citrix Provisioning Server VDA
include the infrastructure and hosts.
es
vDisk
• Automate the provisioning and de-provisioning (Golden Image)
al
processes with Citrix Provisioning or Machine
e
Creation Services.
or
VDA
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• When building golden images, it is recommended that the virtualized environment uses the same security stack as the non‐
virtualized environment. This includes IDS, IPS, multi‐factor authentication, web proxies, and advanced threat detection appliances.
• It is important to automate Citrix site creation process, via Citrix Life Cycle Management, to bring consistency between development,
test, and production environments.
• You should maintain a consistent development, test, and production environment that can be used to test security policies
successfully prior to deployment.
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
generated by an algorithm based on the
ot
contents of a file.
fo
• This approach can be used to verify that
rr
unauthorized changes have not been made to
an OS image.
es
al
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Checksums are often used to verify that downloaded files have not been tampered with and are the same as when the checksum
was generated. Typically, the hash function used to create the checksum is listed along with the checksum so that it can be verified.
• Tools can then be used to verify a checksum, such as Microsoft Checksum Integrity Verifier, CertUtil, and PowerShell.
Additional Resources:
• Ensuring Data Integrity with Hash Codes
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
what their intended purpose is.
ot
• For example, to avoid using an experimental
template for a production VM, specify “-test” as
fo
part of its name.
rr
• When building a template, make sure it does
es
not include any unnecessary or undesirable
al
networks.
e
• A best leading practice is that you do not
or
assign unnecessary network ports to each
di
guest, just what is needed.
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• A template that was created with only one‐use case in mind, might be re‐used for many other VMs with differing security
requirements. Care should be taken when creating VMs for replication to ensure that the configurations are suitable for all potential
uses of the VM.
• You should also ensure VM templates are considered part of your organization’s patching schedule.
• The following practices can be used to lock down a VM template:
• Remove all undesired Windows and Citrix functionality.
N
Additional Resources:
ot
• Security Recommendations When Deploying Citrix Hypervisor
fo
https://www.citrix.com/content/dam/citrix/en_us/documents/white‐paper/security‐recommendations‐when‐
deploying‐citrix‐xenserver.pdf
rr
• System Hardening Guidance for Citrix Virtual Apps and Desktops
es
https://www.citrix.com/content/dam/citrix/en_us/documents/products‐solutions/system‐hardening‐for‐xenapp‐and‐
al
xendesktop.pdf
e
or
di
s
tri
utb
io
n
N
ot
• Read Only golden image as changes cannot be
made once it is sealed.
fo
rr
es
al
e
or
di
s
tri
utb
io
n
N
• Exercise 7-2: Enable TLS on the VDA
ot
• Exercise 7-3: Enable TLS on the Controller
fo
• Exercise 7-4: Implement Citrix Security and Control
rr
Template
es
• Exercise 7-5: Import and Apply Common Criteria
al
GPO Security Template
e
• Exercise 7-6: Configure Citrix Gateway
or
SmartControl Policies
di
• Exercise 7-7: Test Citrix Gateway SmartControl
s
Policies
tri
b
ut
io
n
N
and encryption setup on the VDAs and
ot
Controllers.
fo
• Policies can be configured to reduce exposure
rr
to threats and provide secure remote access
for users and administrators.
es
• SmartAccess and SmartControl provide
al
enhanced security within a Citrix Gateway and
e
Citrix Virtual Apps and Desktops infrastructure.
or
• Cryptographic checksum (and hashes) can be
di
enabled on base images and files to verify if
s
tri
any tampering, or unauthorized changes were
b
made.
ut
io
n
N
ot
Introduction to Troubleshooting
fo
rr
es
al
e
Module 8
or
di
s
tri
b
ut
io
n
N
when troubleshooting Citrix Virtual Apps and
ot
Desktops site(s) to quickly identify issues.
fo
• Identify the capabilities of tools and utilities
rr
commonly used to troubleshoot and monitor a
Citrix Virtual Apps and Desktops environment.
es
• Demonstrate how to use PowerShell Cmdlets
al
to troubleshoot a Citrix Virtual Apps and
e
Desktops site.
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
N
methodology when
ot
troubleshooting will allow
you to quickly identify
fo
current or impending Understand the problem Fix the problem
rr
issues.
es
al
e
or
di
Take pro‐active steps to
Recover the service
avoid repetition
s tri
b ut
io
n
Key Notes:
• It is important that you have a consistent approach to troubleshooting. One key methodology is described here:
• Detecting the Problem, in other words issue identification is the first step in the troubleshooting methodology. Most issues are
reported in one of three ways, end users request helpdesk tickets, monitoring tools or observation by administrators. An
additional troubleshooting method is often overlooked is regular feedback retrieved directly from the end users. Citrix consulting
has had many encounters in which partners or customers were struggling with consistent issues, but the root cause couldn’t be
discovered until consulting directly approached the end users to discuss the problem.
N
• Use resources such as online searches; it is a strong first step in identifying a problem which may be a known issue or
ot
already have documentation, potential workarounds for an issue or answers that prevent an administrator from “re‐
fo
inventing the wheel.” However, caution must be exercised as to the relevancy and authenticity of public material. In
real life, this stage is often very flexible Also, this might actually be a very good stage at which to involve vendor
rr
support. If the issue prevents end users from working and impacts a large amount of users, you might want to
es
escalate it immediately. The question that you ask during this step is actually quite simple – “Why was it working
al
yesterday and is not working today?”
• Recovering the Service:
e
• Recover the service quickly if you can provide a suitable workaround for end users. This allow users to continue
or
working while you troubleshoot the issue.
• In most companies, the IT department is responsible for providing technical support for core business of the
di
company. As soon as a technical issue affects the core business, you should address the problem even if you
s tri
cannot immediately fix the cause.
• At this stage, very often you may not know what the problem is and are not actively trying to fix it; you are just
b ut
trying to make the environment fully functional again. This is very often a decision between quickly recovering the
environment and finding the root cause. For example, if you have a problem that is repeated on a daily basis and
io
the quick solution is the recovery of the database, you might invest time to actually identify the root cause. If the
n
problem occurs once a year on an unimportant component and is solved by restarting one service, finding the root
cause might be a lower priority.
• Isolating the Problem: Conditions to consider when isolating the problem:
• Is the problem limited to certain individuals or geographical locations?
• How many machines are affected?
N
• Does the problem exist if an end user with higher (or different) privileges launches the application?
ot
• This course addresses the most common problem areas for troubleshooting:
fo
• M03 – Problems between STF and DDC
• M04 – Problems between DDC and SQL (or FMA services)
rr
• M05 – Problems between VDA and DDC
es
• M06 – Problems between endpoint and VDA
• Fixing the Problem: When implementing a fix, it is important to verify and test it to ensure that it corrects the
al
problem, as well as confirm that it causes no different disruptions to the production infrastructure.
e
• Fix implementation guidelines:
or
• Verify the fix in a test environment first.
• Test the fix after making one change at a time.
di
• Document any changes made.
s tri
• Allow ample time to confirm that the fix resolved the issue.
• Implement the fix during non‐production hours when possible.
b ut
• Apply fix to all impacted production machines.
• Taking Pro‐active Steps: After resolving a problem, capture as much data as possible for root cause analysis:
io
• You may wish to implement monitoring software within the infrastructure to trigger alerts if there is a risk of the
n
issue recurring.
• Update a maintenance schedule for the infrastructure if required.
• Update your disaster recovery plan if appropriate.
• This is an often‐overlooked step in troubleshooting methodology. Think about what you could do to prevent
the issue from occurring again. Was the whole process flawless? Did you waste too much time on some steps?
N
ot
fo
rr
es
al
e
or
di
s
tri
utb
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will look at a selection of tools and utilities you can use to assist in troubleshooting.
N
Delivery Controller
real-time data, as well as
ot
Citrix Director
historical trends for session
fo
activity within a Citrix Virtual
rr
Apps and Desktops Administrator
infrastructure.
es
• Citrix Director metrics include:
al
• Session usage
e
WMI Data
• Logon performance
or
• Connection and machine VDA
failures
di
• Load evaluation
s
• Machine and application
tri
usage
b
• Licensing status
ut
io
n
Key Notes:
• Citrix Director allows an administrator to quickly resolve real‐time issues, by performing actions such as ending nonresponsive
applications or processes.
• Additionally, real‐time shadowing operations on the end user's machine, restarting the machine, or resetting the user profile, can
also be performed.
• The Dashboard provides an overview of the key aspects of a deployment, such as the status of sessions, user logons, and the site
infrastructure.
N
ot
fo
rr
es
al
e
or
di
s tri
but
io
n
N
and executing tests to
ot
evaluate the state of a Citrix
fo
Virtual Desktops site:
rr
• It can be accessed and run
using Citrix Studio or
es
PowerShell cmdlets.
al
• More than 200 tests are
e
available for reviewing
infrastructure.
or
di
Test site… Test catalog… Test delivery group…
s tri
b ut
io
n
Key Notes:
• Environment Tests are one of the very underrated features in Citrix Virtual Apps and Desktops which can give a great snapshot into
the environment.
• A good leading practice is to run environment tests regularly within a Site to check database connectivity, Active Directory
information, MCS availability, and the state of the delivery groups and machine catalogs, in addition to other parameters.
N
both Citrix and third-party vendors.
ot
• Tool examples include:
fo
• Citrix Scout
rr
• CDF Monitor
es
• Stress Printers
• Print Detective
al
• Wireshark
e
• System Dump Checker
or
• Process Monitor and Explorer
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• It is important to understand how to use various tools useful for troubleshooting. They should be tested outside of a working issue
when you have time to learn and understand the output and how it can be used.
• All third‐party tools are downloaded and installed on demand.
• Toolkit contains tools from Citrix, Microsoft, and other 3rd party vendors.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
used by administrators to diagnose various
ot
environmental issues.
fo
• Scout gathers information on items such as:
rr
• Broker Service Status
• Site and Zone Information
es
• Machine Catalogs
al
• License Server information
• Hypervisor information
e
• Perform Health Checks
or
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Citrix Scout is run from a single Delivery Controller to capture key data points and diagnostic traces. Then, the data can be securely
uploaded as a package to Citrix Technical Support.
• Key data points collected include: Hardware information, such as BIOS, and CPU information, as well as SW ‐ such as Windows
registry and event log information.
• Data captured can be upload to Citrix for automated analysis or submitted to Citrix support for review.
• Scout can be configured to capture event log messages, CDF trace messages, and machine settings.
Additional Resources:
• Citrix Scout
N
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/cis.html
ot
• Citrix Scout
fo
https://support.citrix.com/article/CTX130147
rr
es
al
e
or
di
s tri
b ut
io
n
N
tools, including the Citrix Diagnostic Toolkit,
ot
designed to help diagnose and troubleshoot
Citrix Virtual Apps and Desktops products:
fo
• Tools help customers and partners save time and
rr
effort when testing.
es
• They are not designed to replace system
administration features that Citrix Virtual Desktops
al
provides for day-to-day system management.
e
• Includes both Citrix and third-party tools.
or
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• The tools in this pack are not intended to replace system administration features that Citrix Virtual Apps and Desktops provides for
day‐to‐day system management. This collection of tools are specialized utilities for advanced troubleshooting in very specific areas.
• Installing Supportability Pack:
1. If you have an older version of Supportability Pack on your system, e.g., v1.1.x, a leading practice is that you completely remove
the existing Supportability Pack including all tools and files, before downloading the latest version. Version 1.2.x+ provides a
new Updater utility, which you can use it to keep all tools up to date.
N
environment. The tool provides GUI and command line operation.
ot
• The tool conducts the following health checks on a VDA, and reports check results in the GUI and in a log file:
fo
• VDA registration
• Session Launch
rr
• Time Zone Redirection
es
• Citrix Provisioning Event Log
• Profile Management Configuration
al
e
Additional Resources:
or
• The Citrix Supportability Pack
di
http://support.citrix.com/article/CTX203082
• Citrix Health Assistant ‐ Troubleshoot VDA Registration and Session Launch
s tri
https://support.citrix.com/article/CTX207624?recommended
b ut
io
n
N
• Configure the level of
disrupting running services or end users: details to capture.
ot
• It can be configured to run locally in real-time,
• Configure the trace
at startup, or remotely by utilizing the remote
fo
buffers.
registry service.
rr
• You can enable trace providers with the ability
es
to filter the retrieved data.
• There are three main components to the CDF
al
trace process:
e
• Controllers
or
• Providers
• Consumers CDF
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• CDFControl is an event tracing tool that is designed towards capturing Citrix Diagnostic Facility (CDF) trace messages that are output
from the various Citrix components.
• There are two primary ways to use CDF logging: CDFControl and Citrix Scout.
• CDFControl can be used to both capture as well as analyze CDF traces. It can be customized to parse trace messages from a
particular time period or particular component.
• Citrix Scout Captures the CDF traces; and then, securely uploads the data to Citrix Support.
Additional Resources:
• CDFControl
https://support.citrix.com/article/CTX111961
• How to Collect a Citrix Diagnostic Facility (CDF) Trace at System Startup
https://support.citrix.com/article/CTX127131
N
• How To Collect Remote CDF Tracing
ot
https://support.citrix.com/article/CTX237216
fo
• Recommendations for Collecting the CDF Traces
https://support.citrix.com/article/CTX121185
rr
• Citrix Scout
es
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/2203‐ltsr/manage‐deployment/cis/scout.html
al
e
or
di
s tri
b ut
io
n
N
ot
Management GUI (MMC)
fo
Scripts
rr
GUI
es
Windows/server product functionality
al
e
Command .NET Framework, WWI and PowerShell
WMI COM
or
line
di
s
Windows / server product functionality
tri
Scripts
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• PowerShell is most commonly used through different consoles (PowerShell and PowerShell ISE being the most popular ones);
however, the PowerShell system can be directly accessed from C#.
• With the “SDK”, it is not referring to any set of APIs or libraries; it is referring to the regular PowerShell.
• In Citrix Virtual Apps and Desktops, there are no APIs or libraries to import, and the same language is used for administrators or
scripters, as well as professional software developers.
• For most legacy software products, the majority of functionality could be accessed using a GUI. Automation was always very painful.
Additional Resources:
• SDKs and APIs
N
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops‐service/sdk‐api.html
ot
• SDKs
fo
https://docs.citrix.com/en‐us/citrix‐cloud‐government/manage/sdk‐api.html
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
Which tools can assist in identifying the
source of errors in VDA communication?
fo
rr
es
Citrix Scout > Health Check
al
CDF trace
e
Citrix Diagnostic Toolkit
or
di
s
tri
b
ut
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will explore PowerShell topics including: the two main components that make up PowerShell, the PowerShell verb‐
noun structure, and PowerShell search commands (Get‐Command, Get‐Help, and Show‐Command).
Cmdlets Modules
N
ot
• Commands based on .NET • A set of related functionalities
framework classes. (cmdlets, providers, aliases,
fo
variables).
rr
• Perform an action.
• Module can contain multiple
es
• Differ from other CLI cmdlets.
al
commands in other CLI-
• Allows for the modularization
e
shell based structures, of Windows PowerShell code.
or
such as Windows CLI.
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Cmdlets are members of a module. If you know the module, you can find out all cmdlets that are members of that module; or if you
know the cmdlet, you can find the parent module and then list all members.
• For example, if you know the command Start‐ScheduledTask, you can find the module it belongs to (Get‐Command Start‐
ScheduledTask | Select Module), and then find all the commands that are available for scheduled tasks (Get‐Command –Module
ScheduledTasks).
• This is a very important concept of PowerShell. You can easily spend hours just discovering new modules and cmdlets without using
Additional Resources:
N
• Citrix Virtual Apps and Desktops SDK PowerShell
ot
https://citrix.github.io/delivery‐controller‐sdk/
fo
• Citrix Virtual Apps and Desktops: Basic PowerShell Cmdlets for Delivery Controller's Health Check
https://support.citrix.com/article/CTX238581
rr
• SDKs and APIs
es
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops‐service/sdk‐api.html
• SDKs
al
https://docs.citrix.com/en‐us/citrix‐cloud‐government/manage/sdk‐api.html
e
or
di
s tri
b ut
io
n
Verb Noun
Predefined list Variable: Examples
N
ot
Get Date
fo
rr
New Process
es
al
Start Task
e
or
Remove Event Log
di
s tri
•• Etc…
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• PowerShell utilizes a "verb‐noun" naming system to perform actions. Each cmdlet name consists of a standardized verb, which is
then hyphenated with a specific noun to create a specific function.
• This is one of the most important early concepts of PowerShell. All cmdlets use the verb‐noun syntax, where “verb” part is a
predefined list of approved verbs that does not change.
• Actual syntax is: module\verb‐noun – for example, Get‐Process can be called using Microsoft.PowerShell.Management\Get‐Process.
This allows you to use same cmdlet names in multiple modules; however, it’s not recommended and should be avoided if possible.
Additional Resources:
• Technet
https://social.technet.microsoft.com/wiki/contents/articles/4537.powershell‐approved‐verbs.aspx
N
• Learning PowerShell command names
ot
https://docs.microsoft.com/en‐us/powershell/scripting/learn/learning‐powershell‐names?view=powershell‐6
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
PowerShell under the
ot
hood.
fo
• Follows leading practices
rr
from Microsoft.
es
• Contains over 40
modules.
al
e
• Contains over 700
or
cmdlets.
di
s tri
but
© 2021 Citrix Authorized Content
io
n
Key Notes:
• This is a very short introduction to PowerShell. Its capabilities are extensive.
• Everything you do in Citrix Studio is actually executed as a PowerShell command, and Virtual Apps and Desktops is one of the
products where not only everything in UI is supported for automation, but you have actually more options when you use the CLI
interface.
• The latest release of Citrix Virtual Apps and Desktops contains over 700 PowerShell cmdlets.
• The most important lesson is that PowerShell is not a scripting language that needs to be memorized.
Additional Resources:
• Citrix Virtual Apps and Desktops SDK PowerShell
N
https://citrix.github.io/delivery‐controller‐sdk/
ot
• Citrix Virtual Apps and Desktops Basic PowerShell Cmdlets for Delivery Controller's Health Check
fo
https://support.citrix.com/article/CTX238581
• SDKs and APIs
rr
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops‐service/sdk‐api.html
es
• SDKs
al
https://docs.citrix.com/en‐us/citrix‐cloud‐government/manage/sdk‐api.html
e
or
di
s tri
b ut
io
n
Verb-ModuleNoun:
• Citrix Virtual Desktops cmdlets are based on Microsoft’s naming conventions.
N
• Noun is prefixed with the Citrix Virtual Desktops service name.
ot
fo
Broker MCS AD Identity Service
rr
• Prefix: Broker • Prefix: Prov • Prefix: Acct
es
• Examples: • Examples: • Examples:
al
• Get-BrokerDesktop • Get-ProvTask • Get-AcctIdentityPool
e
or
• Get-BrokerSite • New-ProvScheme • Get-AcctADAccount
• Get-BrokerController
di
s tri
b ut
io
n
Key Notes:
• While many people are familiar with a verb‐noun syntax (which was covered previously), not many people know that the full syntax
actually includes a module name, at least in a shorter version.
• The actual full syntax includes the module prefix as well – Module\Verb‐ModuleNoun.
• With a simple verb‐noun syntax, there is a big risk of running into conflict with other modules. For example, Get‐Session cmdlet
could be applied to multiple different products; therefore, in Citrix Virtual Desktops implementation it is prefixed by a short module
name (Get‐BrokerSession). With the full syntax,
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
For Module 8.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision; just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
N
• Use Get-Command to find the specific command
ot
you need.
• * Wildcards are supported.
fo
Examples:
rr
• Get-Command Get-*User –Module Citrix*
es
• Get-Command –Module
al
Citrix.Broker.Admin.V2
• Get-Command *IP* -Module *Net*
e
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• You can’t run a command without knowing its name. This is why Get‐Command is one of the most important cmdlets.
• Get‐Command on its own has limited usefulness, as it will only lists all the available commands. However, when used either to list
the cmdlets in a single module or when used with wildcards, it provides much more detail and can greatly assist an administrator in
isolating the commands they need.
• You can use the Auto‐complete feature, via the TAB key, as another approach to finding commands.
• Auto‐complete is a very useful feature of PowerShell, as you can start typing a command and press Tab to auto‐complete it.
Additional Resources:
N
• Get‐Command Module: Microsoft.PowerShell.Core
ot
https://technet.microsoft.com/en‐us/library/hh849711.aspx
fo
rr
es
al
e
or
di
s tri
but
io
n
N
PowerShell commands and concepts.
ot
• Once you identify the command using
fo
Get-Command you can learn how to use it
using Get-Help.
rr
Examples:
es
• Get-Help Start-EnvTestTask –
al
Examples
e
• Get-Help Get-BrokerController –Full
or
di
s tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The Get‐Command allows you to find the right command to do the task you have to perform.
• The next step is to use Get‐Help to find more information about it, such as what are the arguments, what are the examples of usage,
and so on.
• Get‐Help also has some useful switches:
• To show examples of usage ‐ Get‐Help Start‐EnvTestTask –Examples
• To display the entire help topic for a cmdlet ‐ Get‐Help Get‐BrokerController –Full
N
ot
fo
rr
es
al
e
or
di
s
tri
utb
io
n
N
UI for any PowerShell command.
ot
• It can be used as a replacement for both
fo
Get-Command and Get-Help.
rr
Examples:
• Show UI to browse available cmdlets.
es
• Show-Command.
al
• Show UI for Get-Process cmdlet.
e
• Show-Command Get-Process.
or
di
s tri
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The Show‐Command allows you to use any existing cmdlet and build a GUI for it automatically.
• It allows you to browse through available modules and cmdlets.
• While more senior administrators will probably prefer to use a combination of Get‐Command\Get‐Help, Show‐Command can be very
helpful for anyone, especially during their first interactions with PowerShell.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s
tri
utb
io
n
N
ot
•Which PowerShell command can be used to
fo
review available loaded commands?
rr
es
Get-Command
al
e
or
di
s
tri
b
ut
io
n
N
• Exercise 8-2: Use Get-Help
ot
• Exercise 8-3: Use Show-Command
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
issues will quickly isolate and identify solutions to
ot
reduce downtime in the environment.
fo
• Citrix Director is a prime administrator tool for
rr
reviewing real-time and historical data and resolving
issues.
es
• There are several resources available to assist in
al
troubleshooting and monitoring a Citrix Virtual App
e
and Desktops site, such as the Citrix Supportability
or
Pack.
di
• PowerShell provides an advanced approach to
s
identifying and troubleshooting the Citrix Virtual App
tri
and Desktops site.
b
ut
io
n
N
ot
Troubleshoot Access Issues
fo
rr
es
al
e
Module 9
or
di
s
tri
b
ut
io
n
N
enumeration, and Store subscription problems
ot
and their troubleshooting methods.
fo
• Describe session launch workflow when
rr
accessing published resources through Citrix
ADC or Citrix Gateway.
es
• Identify common Citrix ADC and Citrix
al
Gateway access issues and how to
e
troubleshoot them.
or
• Identify common Citrix ADC/Gateway resource
di
launch issues and how to troubleshoot them.
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• In this lesson, we will look at how to troubleshoot Citrix StoreFront enumeration and session launch related issues.
N
ot
End User PC
fo
rr
Connection issues
es
al
Enumeration Registration issues
e
StoreFront Issues (DDC) Controller VDA
or
Site issues License issues
di
s tri
Site Database
b
License Server
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Depending whether you are logging in, viewing apps and or desktops, or connected to a session, different elements of Citrix Virtual
Apps and Desktops and communications will influence where you need to begin troubleshooting.
N
ot
• Allows multiple authentication requests to be serviced without
fo
prompting for username and password.
rr
• Uses a Windows service that stores encrypted passwords in an in-
es
memory cache, used later for authenticating users. This service
should be checked for hung or error states when troubleshooting
al
issues with username + password authentication.
e
or
• Setting the Citrix Credential Wallet service to a delayed start can
reduce hangs.
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The credential wallet retains credentials temporarily to allow them to be entered automatically by the operating system reducing the
need for multiple prompts to the user.
• If authentication fails, check the Event Viewer on each StoreFront server to ensure that no credential errors are present.
• When troubleshooting authentication issues, ensure that the Citrix Credential Wallet service is set for a delayed start, and that it is
started on the StoreFront server checking for an un‐started or hung Credential Wallet service when troubleshooting.
N
unavailable. User StoreFront
ot
• Authentication failed for
fo
the end user.
• End user has not been
rr
granted access to
es
desktops or applications.
• SQL server is
al
unavailable.
e
• Troubleshooting
or
• Use Citrix toolkit to Database Delivery Controller
di
validate configurations.
s
• Verify SQL ports, user
tri
accounts and
b
databases are correct.
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Subscription Store issues do not prevent enumeration from proceeding. When access to the Subscription Store fails, StoreFront
continues enumeration, but indicates that subscription is not available. This impacts personalisation and other non‐critical features.
• The XML Broker being unavailable will result in failed enumeration and can occur for a number of reasons, such as the XML service
being offline.
• If pass‐through or smart card authentication are being used, you must enable Trust requests sent to the XML service on the Delivery
Controller, to trust any XML requests sent from StoreFront. To achieve this:
N
Additional Resources:
ot
• StoreFront Current Release
fo
https://docs.citrix.com/en‐us/storefront/current‐release.html
• Troubleshoot StoreFront
rr
https://docs.citrix.com/en‐us/storefront/current‐release/troubleshoot.html
es
• XML service‐based authentication
al
https://docs.citrix.com/en‐us/storefront/current‐release.html https://docs.citrix.com/en‐us/storefront/current‐
release/configure‐authentication‐and‐delegation/xml‐authentication.html
e
• User authentication
or
https://docs.citrix.com/en‐us/storefront/current‐release/plan/user‐authentication.html
• User authentication Citrix Broker Service Events
di
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/downloads/broker_events.htm
s tri
b ut
io
n
N
• Problems may include:
ot
• The Citrix StoreFront
fo
Subscriptions Store
Service.
rr
• Subscription replication or Failure
es
synchronization
problems.
al
e
• Troubleshooting
or
• Use PowerShell to
validate synchronization
di
status.
s
• Verify replication times
tri
are configured correctly
b
for different time zones.
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Subscription store facilitates a user’s ability to customize their apps and desktop's view in Citrix StoreFront. If the StoreFront
Subscriptions Service stops, then users customized views might not be available.
• To address some of the most common subscription‐related issues, start by restarting the Citrix Subscriptions Store service.
Additional Resources:
• Citrix StoreFront 3.0 Unable to save favorites in StoreFront
N
• What Subscriptions and Server Groups Mean for StoreFront Designs
ot
https://www.citrix.com/blogs/2014/10/10/what‐subscriptions‐and‐server‐groups‐mean‐for‐storefront‐designs/
fo
rr
es
al
e
or
di
s tri
but
io
n
N
ot
fo
rr
es
• Problems with one or more of the XML brokers
in a Site.
al
e
• Authentication failures for end user(s).
or
• Published desktops or applications not
di
properly configured for end user(s).
s
tri
utb
io
n
fo
rr
Workflow and Troubleshooting Overview
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will look at the workflow of Citrix ADC and Citrix Gateway connections to assist with troubleshooting.
N
• Problems accessing published resources through
ot
Citrix ADC/Gateway fall into the following
categories:
fo
• Authentication
rr
• Enumeration
es
• Launching
al
• Test direct access through StoreFront, in order to
isolate the issue to the Gateway component.
e
or
di
s
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• When issues occur accessing resources through the Citrix Gateway, we can quickly isolate if the issue is indeed with the Citrix
Gateway by testing connectivity directly with StoreFront. It is important to ensure that StoreFront be able to provide the same
access as through Citrix Gateway in the design of any Citrix Virtual Apps and Desktops site.
• Testing access via Citrix StoreFront may require internal access. Once verified, it can be determined if the root of the issue is with
the Citrix Gateway or not. If you can access the resource using Citrix StoreFront but not Citrix Gateway, then the investigation can
focus on the Citrix Gateway component.
N
ot
fo
rr
es
al
e
or
di
s tri
utb
io
n
N
Infrastructure Zone 1 (Primary)
ot
3 Resources
1
fo
Citrix StoreFront Active 4 License Delivery Controller SQL
Users
rr
Gateway Directory Server Site DB Desktops Desktops Apps Apps
es
2
al
San Francisco (SFO) Miami (MIA)
e
Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
End User
or
Device Resources Resources
di
Citrix
Gateway
Delivery Controller
s
Desktops Apps Desktops Apps
tri
StoreFront
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• It is important to understand the process under which authentication, enumeration, and session traffic flows.
• If we look at the external Process using Citrix Gateway, shown in purple, we can troubleshoot each stage using the guidance below;
• (1) End User device accesses Citrix Gateway authentication page via remote access URL.
• Ensure URL is externally accessible and not blocked by firewall.
• Certificates on Citrix Gateway should be valid and up‐to‐date.
• (2) User enters authentication credentials.
N
server.
ot
• (4) The Domain Controller validates the credentials.
fo
• Consider implementing a virtual IP (VIP) in order to load balance multiple LDAP servers in order to provide
redundancy.
rr
es
Additional Resources:
al
• Manage Authentication Methods
e
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/configure‐
authentication‐service.html
or
• How to Configure LDAP Authentication on Citrix ADC or Citrix Gateway
di
https://support.citrix.com/article/CTX108876
• StoreFront 2203 XML Service‐Based authentication
s tri
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/xml‐
b
authentication.html
ut
io
n
N
Infrastructure Zone 1 (Primary)
ot
Resources
fo
Citrix StoreFront 3 Active License Delivery Controller SQL
Users 4
rr
Gateway Directory Server Site DB Desktops Desktops Apps Apps
es
2
al
1
San Francisco (SFO) Miami (MIA)
e
Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
End User
or
Device Resources Resources
di
Citrix
Gateway
Delivery Controller
s
Desktops Apps Desktops Apps
tri
StoreFront
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• It is important to understand the process under which authentication, enumeration and session traffic flows.
• If we look at the Internal Process for StoreFront direct access, shown in green, we can troubleshoot using the below steps.
• (1) End user device access StoreFront authentication page via internal URL.
• The URL must be accessible to any users expected to access it directly. Making this URL available to external users presents a
security risk because you are allowing external traffic to communicate directly with a Windows machine, which is more
vulnerable to malicious attacks (compared to a hardened network appliance like a Citrix ADC).
N
• (3) StoreFront submits credentials to a Domain Controller for validation.
ot
• Ensure the appropriate authentication methods are selected for the Store. For more complex methods such as
fo
Smart Card, Domain pass‐through, or SAML authentication, additional configuration will be required.
• (4) The Domain Controller validates the credentials.
rr
es
Additional Resources:
al
• Manage Authentication Methods
e
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/configure‐
authentication‐service.html
or
• How to Configure LDAP Authentication on Citrix ADC or Citrix Gateway
di
https://support.citrix.com/article/CTX108876
• StoreFront 2203 XML Service‐Based authentication
s tri
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/xml‐
b
authentication.html
ut
io
n
N
Infrastructure 3 Zone 1 (Primary)
ot
4 Resources
fo
Citrix StoreFront Active License Delivery Controller SQL
Users
rr
Gateway Directory Server Site DB Desktops Desktops Apps Apps
es
2
al
San Francisco (SFO) Miami (MIA)
e
Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
End User
or
Device Resources Resources
di
Citrix
Gateway
Delivery Controller
s
Desktops Apps Desktops Apps
tri
StoreFront
but
© 2022 Citrix Authorized Content
io
n
Key Notes:
• A key element of troubleshooting is to understand what occurs internally between the Citrix Virtual Apps and Desktops components.
• The internal Process are XML Service‐Based and shown in yellow in the diagram. Troubleshooting internal communications should
begin with the steps below;
• (1) End user device accesses StoreFront authentication page via internal URL.
• The URL must be accessible to any users expected to access it directly. Making this URL available to external users presents a
security risk because you are allowing external traffic to communicate directly with a Windows machine, which is more
N
passwords without opening a support ticket.
ot
• (3) StoreFront submits credentials to the XML port of a Delivery Controller.
fo
• For this to occur, the “Validation Password Via” setting must be configured to “Delivery Controllers.”
rr
• (4) The Delivery Controller submits the credentials to a Domain Controller.
• Ensure that communications between the Delivery Controllers and AD Domain Controllers are allowed in the
es
firewalls of your environment.
al
• (5) The Domain Controller validates the credentials.
e
or
Additional Resources:
• Manage Authentication Methods
di
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/configure‐
s tri
authentication‐service.html
• How to Configure LDAP Authentication on Citrix ADC or Citrix Gateway
b ut
https://support.citrix.com/article/CTX108876
• StoreFront 2203 XML Service‐Based authentication
io
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/xml‐
n
authentication.html
N
should we remove from the process to help
ot
troubleshoot it further?
fo
rr
es
Citrix Gateway
al
e
or
di
s
tri
b
ut
io
n
fo
rr
Troubleshooting Access and Authentication
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will further investigate access and authentication issues when using the Citrix ADC or Citrix Gateway.
N
is Denied. • The Citrix Gateway session policy settings for the
ot
Store URL and Name are not spelled correctly.
• Authentication to the Citrix Gateway via
fo
StoreFront can receive a 403 error for several • The StoreFront address in the Citrix Gateway
Session Profile does not match the site address in
rr
reasons. Issue can occur post-authentication StoreFront.
as well.
es
• The call back address is not set to HTTPS.
al
• There is not a DNS Host entry on StoreFront to
point to Citrix Gateway virtual server.
e
or
• The Root CA is an internal CA certificate, and the
Root CA certificate is not added to both
StoreFront as well as on Citrix Gateway. So,
di
therefore, there is not a trust between them.
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• When you receive a 403 error post‐authentication, there is normally a trust issue with certificates.
• Rebuild the trust issue between the StoreFront server and the Citrix Gateway. This can include expired or incorrectly linked
certificates along with naming and DNS issues.
• Some common parameters, or configurations to check are highlighted in the slide.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
• Issue: The aaad.debug log displays an attempt to • Isolation: Authentication processing in Citrix
ot
authenticate with the RADIUS server- the user Gateway is handled by the Authentication,
fo
trying to log on is, however, rejected. Authorization, and Auditing (AAA) daemon.
rr
• Problem: The RADIUS server is rejecting the data • Troubleshooting: Review the raw event
es
being sent from the Citrix Gateway. output from the audit daemon using the
aaad.debug module.
al
• The aaad.debug is a “pipe” as opposed to a flat
e
file and does not display the results or log them.
or
• The cat command can be used to view the
output or sent it to a file.
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• Use of the aaad.debug command is key in understanding where errors occur in the Citrix Gateway or Citrix ADC authentication
process.
• In this example, if the aaad.debug log displays an attempt to authenticate with the RADIUS server, and the user trying to log on is
rejected, then the RADIUS process will send a reject ,for example code 4001.
• This rejection occurs as a result of the RADIUS server rejecting the data being sent from the Citrix Gateway.
• This can be reviewed, verified and corrected by:
N
Authorization, and Auditing (AAA) daemon. The raw event output from the audit daemon can be reviewed in the
ot
aaad.debug module.
fo
• This process is useful for troubleshooting authentication issues such as:
• General authentication errors
rr
• Username/password failures
es
• Authentication policy configuration errors
• Group extraction discrepancies
al
e
Additional Resources:
or
• The Two Factor Authentication Fails on Citrix Gateway
di
https://support.citrix.com/article/CTX200402
• Troubleshooting Authentication Issues Through Citrix Gateway with aaad.debug Module
s tri
https://support.citrix.com/article/CTX114999
b ut
io
n
• This error can occur when there is a misconfiguration in the Authentication policy on the Citrix
Gateway, or possibly an issue with Load Balancing, if multiple LDAP servers are used.
N
• A policy misconfiguration results in communication failure between the Citrix Gateway and LDAP
ot
server.
fo
rr
es
al
e
or
Active Directory LDAP Server
di
Citrix Gateway
End Users
s tri
StoreFront
b ut
io
n
Key Notes:
• In this example we look at LDAP configuration issues. Some steps used to troubleshoot this issue include:
• Test LDAP reachability from the Citrix Gateway LDAP settings and validate end‐to‐end LDAP authentication, to verify the location
of the issue.
• From within the StoreFront MMC, go to Citrix Gateway > select the gateway you are configuring > Change General
Settings window, and confirm the Logon Type is set to Domain if using LDAP authentication on the Citrix Gateway.
• Under the Citrix Gateway VIP go to Authentication > LDAP Policy > Edit Server and confirm the following settings:
N
ot
Additional Resources:
fo
• Error: "Cannot Complete Your Request" Due to Authentication Misconfiguration on Citrix Gateway
https://support.citrix.com/article/CTX235888
rr
• Common Resolutions to “Cannot Complete Your Request” Error
es
https://support.citrix.com/article/CTX207162
• How to Configure LDAP Authentication on Citrix Gateway
al
https://docs.citrix.com/en‐us/citrix‐gateway/current‐release/authentication‐authorization/configure‐ldap/ng‐ldap‐
e
authen‐configure‐tsk.html
or
di
s tri
b ut
io
n
Common Misconfigurations
• User error
N
Mistyping or forgetting credentials
ot
Client-side network connectivity issue.
fo
• Un-started or hung Credential Wallet service on
rr
StoreFront server(s).
es
al
• Citrix Gateway LDAP authentication settings
e
misconfigured.
or
di
s
• Firewall or monitor issues causing Citrix ADC load
tri
balancing of the StoreFront servers to fail.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Some of the most common causes of authentication issues include:
• In multi‐factor authentication scenarios, communication issues with the RADIUS server due to firewalls or misconfiguration on the
Citrix ADC or the RADIUS server.
• Active Directory could be experiencing issues that cause it to be unresponsive to authentication requests.
• DNS issues preventing Citrix ADC GSLB from functioning (if configured).
Additional Resources:
• Troubleshooting Methodology for Citrix ADC, StoreFront with Virtual Apps and Desktops
https://support.citrix.com/article/CTX140153
• Troubleshoot StoreFront
https://docs.citrix.com/en‐us/storefront/current‐release/troubleshoot.html
N
• StoreFront SDK
ot
https://docs.citrix.com/en‐us/storefront/current‐release/sdk‐overview.html
fo
• Wireshark webpage
rr
https://www.wireshark.org/
• Overview (Citrix Application Delivery Management Current Release)
es
https://docs.citrix.com/en‐us/citrix‐application‐delivery‐management‐software/current‐release/
al
• How to Troubleshoot Authentication Issues Through Citrix ADC or Citrix Gateway with aaad.debug Module
e
https://support.citrix.com/article/CTX114999
or
di
s tri
b
ut
io
n
N
• Windows Event Logs – Citrix Delivery Services
ot
fo
• PowerShell
rr
es
al
• Wireshark
e
or
di
• Citrix Application Delivery Management (for external
access scenarios using Citrix Gateway)
s tri
• aaad.debug Module (on Citrix ADC)
• StoreFront console
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The Citrix Delivery Services view, within the Windows Event Logs on the StoreFront server, is helpful for troubleshooting common
application launch issues.
• Windows PowerShell commands can be run on the StoreFront servers to verify that the Citrix services are running and functioning as
expected. It can also restart Services as needed if they are unresponsive.
• WireShark is a packet analyzer that can be used to capture network data for analysis. It is helpful for pinpointing where a
N
aaad.debug module and serves as a valuable troubleshooting tool.
ot
Additional Resources:
fo
• Troubleshooting Methodology for Citrix ADC, StoreFront with Virtual Apps and Desktops
rr
https://support.citrix.com/article/CTX140153
• Troubleshoot StoreFront
es
https://docs.citrix.com/en‐us/storefront/current‐release/troubleshoot.html
al
• StoreFront SDK
e
https://docs.citrix.com/en‐us/storefront/current‐release/sdk‐overview.html
or
• Wireshark webpage
https://www.wireshark.org/
di
• Overview (Citrix Application Delivery Management Current Release)
s
https://docs.citrix.com/en‐us/citrix‐application‐delivery‐management‐software/current‐release/
tri
• How to Troubleshoot Authentication Issues Through Citrix ADC or Citrix Gateway with aaad.debug Module
b
https://support.citrix.com/article/CTX114999
ut
io
n
N
authentication process?
ot
fo
rr
es
The aaad.debug module
al
e
or
di
s
tri
utb
io
n
N
For Module 9.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
fo
rr
Troubleshooting App/Desktop Launch
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will be looking at how to troubleshoot application and desktop launch issues.
Troubleshooting Checks
• When an STA ID error is returned this may
N
indicate communication or configuration errors with the
ot
STA.
fo
• Confirm STA servers on Citrix Gateway virtual server do
rr
match those on the StoreFront servers.
es
al
• Confirm that the usage or Role on the StoreFront server
e
is set to Authentication and HDX Routing.
or
di
• Confirm communication on port 1494/2598 from the
s
Subnet IP/Mapped IP to the Citrix Virtual Apps and
tri
Desktops servers is functional.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Issues with application or desktop launch can be verified as Citrix Gateway issues by attempting to launch directly via StoreFront. If
the published applications or desktops launch without any issues and the problem only happens via the Citrix Gateway, then the
Citrix Gateway is the focus for troubleshooting.
Additional Resources:
• Error: "Unable to launch your application." When Launching Published Applications or Desktops Through Citrix Gateway
N
ot
fo
rr
es
al
e
or
di
s
tri
utb
io
n
N
https://staserver1.company.com/Scripts/CtxSt
ot
a.dll.
fo
Will the app launch work ?
rr
es
No. We need to make sure that the STA address
on the Citrix Gateway and StoreFront server are
al
the same.
e
or
di
s
tri
b
ut
io
n
N
ot
• Exercise 9-2: Troubleshoot Failed Authentication
Issues Using PowerShell On StoreFront
fo
rr
• Exercise 9-3: Export and Restore the Subscription
Store Database On StoreFront
es
• Exercise 9-4: Investigating XML Service
al
Communications Issues Between StoreFront and
e
Delivery Controller
or
• Exercise 9-5: Manually Rewrite Subscription Store
di
on StoreFront using PowerShell
s
tri
b
ut
io
n
N
ot
sources of issues.
fo
• Understanding the processes behind
authentication, enumeration, and session
rr
launch helps to identify the source of user app
es
and or desktop launch issues.
al
• Testing Direct Access mode through
e
StoreFront is a strong step towards isolating
or
an issue within the Citrix Gateway.
di
• The aaad.debug module can be used to
s
tri
review authentication issues with the Citrix
b
Gateway.
ut
• Citrix Gateway issues are commonly focused
io
n
N
ot
Troubleshoot Delivery Controller Issues
fo
rr
es
al
e
Module 10
or
di
s
tri
b
ut
io
n
N
Management Architecture (FMA) services and
ot
how to validate them using PowerShell.
fo
• Describe HDX session enumeration workflow
rr
and common failure causes.
es
al
e
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
ot
Architecture (FMA) Services
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will explain how an administrator can validate the status of key services in a Citrix Virtual Apps and Desktops
environment.
N
Delivery
Controller
ot
Internal StoreFro
Server OS Assigned
Users nt Domain Desktop OS
Controller
Firewall Delivery Controller
fo
Database Random Remote PC
External Firewall Citrix
rr
ADC Desktop OS
Users FMA Services
Gateway
License
es
Server
Services
Hardware Layer Central Delegated
Core
Configuration
Configuration Administration
Logging Service
al
Service Service
Network Storage Processo Memory Graphics Hypervisor
r
e
• Each FMA Service communicates
or
with one another, but function AD
Apps and Desktops
Supporting
Service
di
Services
Services
s
Machine
provide management functionality for Broker Citrix App Environmental
tri
Creation Library
Service Orchestration Test Service
Service
Studio, Director, and PowerShell.
utb
© 2022 Citrix Authorized Content
io
n
Key Notes:
• FlexCast Management Architecture (FMA) is a Service Oriented Architecture (SOA) that allows Citrix engineers to easily add new
services when needed. This SOA also makes troubleshooting easier, as CDF traces have multiple providers, which can be selected
depending on which area you wish to investigate.
• The FMA Services diagram shows three groups of FMA Services:
• Core Services
• These services are involved in almost all operations with the Citrix Configuration Service acting as a centralized directory
N
• The Host Service is used to manage all Resource Connections between the Citrix Virtual Apps and Desktops Site
ot
and the Hypervisor Hosts and or Resource Pools and perform power management actions; while the Broker
fo
Service is used for a lot of actions including, brokering user connections to sessions, validating STA tickets, and
communicating with the deployed Virtual Delivery Agents (VDA).
rr
• Supporting Services
es
• These services are used to support additional functionality of the Citrix Virtual Apps and Desktops Site and
al
include:
• The Analytics Service, which is used to collect data from the other services for reporting.
e
• The StoreFront Service, which is used to manage the StoreFront Deployment that allows for some StoreFront
or
management through Studio.
• The Monitoring Service, which is used to monitor the overall FMA architecture and to produce alerts and
di
warnings when it finds something is potentially wrong, such as a failing service.
s tri
• The Citrix Trust Service is not currently in use. (This is why this service is greyed out on the diagram.)
• The Citrix Orchestration Service is not currently in use. (This is why this service is greyed out on the diagram.)
b ut
• The App Library Service, which is used to support management and provisioning of AppDisks, AppDNA
io
integration and App‐V where used.
• The Environmental Test Service, which is used to manage tests for evaluating the state of the Citrix Virtual Apps
n
and Desktops infrastructure, such as when an environment test is triggered through the Studio.
• The FMA Services all use Windows Communication Foundation (WCF) for inter‐service communication. This allows
each service to run independently of each other, so a failure of one service typically will not cause a disruption in the
functionality of another service. There are exceptions to the “typical” failure. For example, if the Citrix Configuration
Service fails, then there is no centralized directory for all the services, which causes a communication break down
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
all services.
N
FMA Services
ot
• Allows services to register
and unregister.
fo
Services
Central Delegated
Core
Configuration
Configuration Administration
Logging Service
rr
Service Service
• All services hold cache for
five minutes to prevent
es
overloading CCS with too
al
many queries. Apps and Desktops
AD Identity Host Analytics StoreFront Monitoring Citrix
e
Service Service Service Service Service Trust
Supporting
Services
Services
or
Machine
Broker Citrix App Environmental Test
Creation
di
Service Orchestration Library Service
Service
s tri
utb
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The Central Configuration Service (CCS) acts as a global directory for FMA architecture. It knows each FMA service WCF address and
is a central point of contact, which is why it’s one of the core FMA services. It is involved in any operation across services. It allows
services to register and unregister. You can use Get‐ConfigRegisteredServiceInstance to retrieve the list of registered services.
• When one service wants to talk to another one, it will start by querying the CCS about the WCF address first, and CCS will reply
only to services that are already registered.
N
• For example, services are registered during the installation of the Delivery Controller server with the DNS name of
ot
this Delivery Controller server. If the Delivery Controller is ever renamed, the FMA services will stop registering with
CCS. In this case, the easiest solution is to unregister existing instances and register new instances.
fo
• You can use Get‐ConfigRegisteredServiceInstance to retrieve the list of registered services. The output will specify
rr
the FQDN of the Delivery Controller original name.
es
• To un‐register existing services use Get‐ConfigRegisteredServiceInstance | Unregister‐
ConfigRegisteredServiceInstance. If the environment has more than one Delivery Controller, the –ServiceAccountSID
al
argument must be used to specify the Delivery Controller.
e
• To retrieve the FMA service instances and re‐register them, use Get‐Command Get‐*ServiceInstance –Module Citrix*
or
| For Each {.$_.name| Register‐ConfigServiceInstance}.
di
• Now that the FMA Services are registered to the CCS service, the service access permissions and configuration
s
service locations must be reset using $ServiceInstance = Get‐ConfigServiceInstance; Get‐Command Reset‐
tri
*ServiceGroupMembership | ForEach {. $_.Name –ConfigServiceInstance $ServiceInstance}
• Remember:
b ut
• All FMA services need to register their instances with the CCS.
• The CCS needs to be aware of every service that is part of the Citrix Virtual Apps and Desktops site.
io
• Each FMA service needs to know the address of the CCS.
PowerShell
Citrix Services Description Validating with PowerShell
Prefix
N
Brokers new session requests, handles disconnected sessions and resource
Citrix Broker
ot
Broker enumeration, processes STA ticket verification and user validation. Get-BrokerServiceStatus
Service
Additionally, it handles all communication to and from the VDA desktop.
fo
Citrix Machine
rr
Prov Handles the creation of new virtual machines (not physical machines). Get-ProvServiceStatus
Creation Service
es
Citrix Configuration
Config Handles all inter-service communication between FMA services. Get-ConfigServiceStatusGet
Service
al
e
Citrix AD Identity Handles all Active Directory accounts related to any Citrix virtual or physical
Acct Get-AcctServiceStatus
Service workload.
or
Citrix Hosting Manages all connections XDC, and the Hypervisor; supporting vSphere,
di
Hyp Get-HypServiceStatus
Service Citrix Hypervisor or SCVMM. Responsible for power management.
s tri
Supports management and provisioning of AppDisks, AppDNA integration,
Citrix App Library AppLib Get-AppLibServiceStatus
and management of App-V.
b ut
© 2021 Citrix Authorized Content
io
n
N
Citrix Delegated
Manages the creation, configuration and administration of all
ot
Administration Admin Get-AdminServiceStatus
delegated administrative permissions.
Service
fo
Monitors the overall FMA architecture and produces alerts and
rr
Citrix Monitoring Get-
Monitor warnings when it finds something is potentially wrong, such as a
Service MonitorServiceStatus
es
failing service.
Citrix
al
Manages tests for evaluating the state of Citrix Virtual Desktops Get-
Environment EnvTest
e
infrastructure. EnvTestServiceStatus
Test Service
or
Citrix
Monitors and logs all configuration changes made within a Citrix
Configuration Log Get-LogServiceStatus
di
Virtual Desktop site, to include all administrator activity.
Logging Service
s tri
Citrix Analytics Get-
Analytics Collects analytical data from Citrix products.
Service AnalyticsServiceStatus
b ut
© 2021 Citrix Authorized Content
io
n
N
PowerShell Validating with
ot
Citrix Services Description
Prefix PowerShell
fo
Citrix StoreFront
SF Manages the StoreFront deployment. Get-SFServiceStatus
rr
Service
Citrix
es
Orchestration Orch Not currently used (must be enabled, do not disable) Get-OrchServiceStatus
al
Service
e
Citrix Trust
Trust Not currently used (must be enabled, do not disable) Get-TrustServiceStatus
or
Service
di
s tri
b ut
© 2021 Citrix Authorized Content
io
n
N
Get‐BrokerSite
• Each FMA Service follows a standard Get‐BrokerController
ot
PowerShell structure. Get‐BrokerSession
fo
• There are various commands within Citrix Machine Creation Service
rr
Prefix
PowerShell that assist with reviewing and Prov
es
troubleshooting issues within the FMA Use Examples:
architecture.
al
Get‐ProvServiceStatus
Reset‐ProvServiceGroupMembership
e
• PowerShell provides the ability to: Reset‐ProvEnabledFeatureList
or
• Review current site or session information. Host Service
• Investigate FMA service status and Delivery
di
Prefix
Controller health. Hyp
s
• Review and reset Machine Creation Services Use Examples:
tri
Test‐HypDBConnection
tasks.
b
Get‐HypServiceStatus
• Test and review hypervisor host conditions.
ut
Get‐HypVMMacAddress
• And more…
io
n
Key Notes:
• The SDK that installs with the current release of Virtual Apps and Desktops comprises several PowerShell snap‐ins that are installed
automatically when you install a Delivery Controller or Studio.
• The Citrix FMA services can be managed through PowerShell, which must be run using an identity that has Citrix administration
rights.
• This slide provides some examples of PowerShell use when interacting with Citrix FMA services.
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
For Module 10.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
• Each Citrix service establishes its own direct connection to the site database.
• Some services, such as Configuration Logging, have an additional separate connection to a secondary database.
N
ot
fo
Monitoring Service Configuration Configuration
rr
Monitoring Service
Database Logging Service Logging Database
es
al
e
AD Delegated Machine
Citrix Citrix Analytics Broker Configuration Environmental Host StoreFront App
Identity Administration Creation
Trust Orchestration Service Service Service Test Service Service Service Library
or
Service Service Service
di
s
SITE Database
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Considering SQL server connections, it is important to note that each service has a separate connection to the database.
• FMA services leverage the Delivery Controller’s machine account to authenticate to SQL, where data for the Site from the FMA
services is stored in the Site.
• Leveraging the Delivery Controller’s computer AD account for authentication to SQL enhances security by preventing the service
account password from being stored and by having the machine password change every 30 days.
• The principal Database is the site database, which contains configuration information for the running of the
N
the database and server names when prompted.
ot
• Should you need to reset a DB connection, reset it to $Null first (for example “Set‐BrokerDBConnection –DBConnection
fo
$Null”). This is by design to prevent accidental changes to the database configuration. After resetting the connection to
an empty state, you can define a new server.
rr
es
al
e
or
di
s tri
b ut
io
n
N
(2) (4) Resources
(3)
ot
(1)
Citrix StoreFront Active License Delivery SQL
fo
Users Gateway Directory Server Controller Site DB Desktops Desktops Apps Apps
rr
es
(5)
al
San Francisco (SFO) Miami (MIA)
e
End User Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
Device
or
Resources Resources
Citrix
di
Gateway
Delivery
s
Controller Desktops Apps Desktops Apps
Internal User
tri
External User StoreFront
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• It is important for troubleshooting to understand how communications with the databases can impact user connections. We will
look here at how some messages interact with the database.
• The steps below describe the general process of communications with consideration on which elements require communication with
the SQL servers.
• (1) External (Green): Citrix Gateway communicates with StoreFront (after successful user authentication) to begin the resource
N
(via the Manage Delivery Controllers setting in the console) and the Delivery Controllers (via BrokerService.exe).
ot
• Additionally, ensure firewall rules allow communication on the selected port.
• (3) The Controller queries the site database for resource information.
fo
• If high availability is a high priority for a given organization, strongly consider implementing HA for the SQL Site
rr
database. The other Citrix Virtual Apps and Desktops databases (Monitoring and Configuration Logging) and
es
supporting product databases (Citrix Provisioning / Workspace Environment Management) can be located on the
same HA SQL deployment.
al
• (4) Based on the results of the SQL query, the Controller returns a list of all available resources for the user to
e
StoreFront.
or
• If the Controller cannot communicate with the Site database, the local host cache is used to provide limited resource
di
information. Each method has considerations that should be included in the environment design.
s
• (5) StoreFront builds a web page with the available resources, which is either communicated directly to the end user
tri
device (internal) or proxied to the end user device via Citrix ADC (external).
b
• If no resources have been assigned to a user or any of the AD groups, they are a member of, no resource icons will be
ut
visible to the user.
io
n
Additional Resources:
• How to Change the XML Port in Virtual Desktops
https://support.citrix.com/article/CTX127945
• Local host cache (FMA)
https://docs.citrix.com/en‐us/citrix‐virtual‐apps‐desktops/manage‐deployment/local‐host‐cache.html
Common Misconfigurations
N
ot
• No published resources have been made available
fo
rr
es
• Expired SSL certificates
al
e
• Citrix Gateway and or StoreFront information
or
misconfigured
di
s
• Delivery Controllers are offline or unresponsive
tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In addition to ensuring database connections are correct and functional, the use of encryption can create another layer of
complication and potential errors.
• For example, expired SSL certificates on the Delivery Controllers will impact communications between the StoreFront servers and
Delivery Controllers if SSL is enabled between them. Switching to the HTTP transport type is a workaround; but it will lower the
security of the environment until new certificates are installed on the Delivery Controller(s).
• In addition, XML communication port mismatch will occur if the configured port was changed on either the StoreFront server(s) or
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
• Citrix Studio
N
ot
• Windows Event Logs
• Citrix Delivery Services
fo
rr
• CAPI2 Operational Log
es
• PowerShell/Command Prompt
• Windows Registry
al
e
• Active Directory Users and
Groups
or
di
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Citrix Studio can be used to verify that resources have been published to a user or user group. Remember to check any application‐
level assignments and the “limit visibility” setting.
• The CAPI2 operation log within Windows Event Logs can help to identify PKI‐related errors (e.g., expired or invalid certificates). This
log is not enabled by default; and it takes up additional resources on the machine. So, it should only be enabled during
troubleshooting.
N
validating FMA services?
ot
fo
rr
es
• Asnp Citrix*
al
e
or
di
s
tri
b
ut
io
n
N
ot
• 10-2: Validate the FMA Services Using PowerShell
on the Delivery Controller
fo
rr
• 10-3: Performing a Site Recovery when no Delivery
Controllers are Available
es
• 10-4: Remove Defunct Delivery Controllers from the
al
SQL database
e
or
di
s
tri
b
ut
io
n
N
ot
functionality for Studio, Director, and
PowerShell.
fo
• The Citrix Configuration Service is the global
rr
directory for the FMA architecture and all other
es
FMA services must register with it.
al
• StoreFront Enumeration is a multi-step
e
process in which specific misconfigurations or
or
failure points (such as database
di
communications or certificate errors) will cause
s
enumeration failure to occur.
tri
utb
io
n
N
ot
Troubleshoot Virtual Delivery Agent (VDA)
fo
Registration Issues
rr
es
al
e
Module 11
or
di
s
tri
b
ut
io
n
N
troubleshooting methods for VDA registration
ot
failures.
fo
• Explain the VDA registration process in a
rr
multi-zone Citrix Virtual Apps and Desktops
environment.
es
al
e
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
ot
Agent (VDA) Registration
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
In this lesson, we will look at ways to troubleshoot Virtual Delivery Agent registration.
N
ot
End User PC
fo
Network or
Connection issues
rr
es
al
Enumeration Registration issues
Issues
e
StoreFront ( VDC ) Controller VDA
or
Site issues License issues
di
s tri
b
Site Database License Server
ut
© 2022 Citrix Authorized Content
io
n
N
communication.
ot
fo
Obtain Kerberos ticket
Validate each DDC found 8 for communication with
rr
3 in AD by DNS entry. BrokerService.exe VDA.
7 attempts to validate
es
Kerberos ticket and
VDA details from AD.
al
5 Make a call for
VDA uses Desktop Service “Registration”.
e
(BrokerAgent.exe) to initiate the
registration process over TCP Port 80
Virtual Desktop Controller Site Database
or
(BrokerAgent.exe)) (BrokerService.exe)
2 -Way test for Callback made. Needs to Validate VDA
9 6 identity and
di
be confirmed by both VDA and controller
Check if Auto-update of Check registry entry for for hard registration to be successful. functionality level.
s
1 DDCs is enabled. If so, 2 ListOfDDCs (manually or
gather list of all available GPO populated).
tri
controllers.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• The VDA and Controller servers act in a client server relationship with two independent connections between them. This is used to
prevent a man‐in‐the‐middle attack, as the attacker would also need to compromise the Active Directory environment.
• The first stage in a VDA registering with controllers is to acquire a list of controllers. There are a few locations, including Active
Directory and manual input, that this can be achieved from. Steps 1‐2 describe these.
• You can see in steps 3‐4 and 7‐8, where the controller doesn’t trust the information provided by the VDA; and it contacts the AD
to confirm the SPN record. This process, which happens as the registration progresses, ensures that we avoid man‐in‐the‐middle
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
ot
• Domain membership
fo
• Service Principal Name (SPN) records
rr
es
BrokerAgent.exe attempts to
register on port 80
al
Registration attempt fails!
e
or
di
s
Firewall configured to block port 80 inbound – Registration request is blocked
tri
Virtual Delivery Agent and never reaches the Delivery Controller Delivery Controller
b ut
io
n
Key Notes:
• There are several reasons why VDA registration may fail; such as a network failure, or a firewall blocking communication. Other
issues can be related to Domain, DNS or encryption (TLS). Principal areas an engineer should investigate include;
• Issues with DNS preventing the Controller and VDA communication.
• The ListOfDDCs registry value is not updated or mistyped after a Delivery Controller is replaced or removed from the Site, where
configuration has been done manually.
• We can also suffer from GPO or network firewall rules introduced outside the Citrix environment which block necessary
N
take place Some possible causes for this include:
ot
• The Delivery Controller receiving too many registration requests and becoming overloaded and unresponsive.
fo
• The Delivery Controller has failed for another reason, such as a technical problem with the machine.
• The Delivery Controller has been taken offline for maintenance.
rr
es
Additional Resources:
• Virtual Delivery Agent (VDA) Registration Troubleshooting Tips and Flowchart
al
https://support.citrix.com/article/CTX136668
e
or
di
s tri
b ut
io
n
N
For Module 11.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
N
environment, to include VDA issues. Results are
ot
reported both in a GUI and log file.
fo
• Event Log Entries: For display entries for controller or
rr
VDA issues.
es
al
• CDFControl: Event trace tool that can be used to
e
capture information in real time and the output captured
or
for review.
di
s
• XDPing: Part of Citrix Scout Health Checks this is a
tri
command-line based application check for common
configuration issues on controllers and VDA machines.
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• There are several tools available for use in troubleshooting a Citrix Virtual Apps and Desktops environment.
• XDPing, which performs checks on a Citrix Virtual Apps and Desktops environment can be used for the items below. It is important,
when using XDPing, to run it two ways – VDA ‐> VDC as well as VDC ‐> VDA.
• Validate network settings and connections.
• DNS lookups (including reverse lookups).
• Provide details on time synchronization and Kerberos Authentication time checks.
N
diagnosing data for the registration process.
ot
• The Citrix Health Assistant Part of Citrix Scout is a Windows (or CLI ) tool that help administrators troubleshoot
fo
configuration issues in a Citrix environment. The tool conducts the following health checks on a VDA, and reports check
results in the GUI and in the log file. It is operated using the command “Citrix Health Assistant.exe" –start.
rr
• VDA registration:
es
• VDA Software Installation
• VDA Machine Domain Membership
al
• VDA Communication Port Availability
e
• VDA Services Status
or
• Windows Firewall Configuration
• Communication with Controller
di
• Time Sync with Controller
s tri
• VDA Registration Status
• Session Launch:
b ut
• Session Launch Communication Port Availability
• Session Launch Services Status
io
• Session Launch Windows Firewall configuration
n
• VDA Remote Desktop Services Client Access Licenses
• VDA Application Launch Path
• Windows Event Viewer will list various registration warnings or failures related to the Delivery Controller or VDA. The
VDA and Delivery Controller components both generate event log messages for successful and unsuccessful
registrations, which can be used to validate registration or narrow down the cause of a registration issue.
N
• The Citrix Policy Reporter Tool can be used to validate how Citrix and Microsoft Group Policies are being applied to a
ot
VDA, which can be used to validate the ListOfDDCs setting.
fo
• The VDA Cleanup Utility is designed to assist with the following scenarios:
• When errors occur during upgrade from an earlier version of VDA.
rr
• When unexpected behavior or performance is experienced after upgrade from an earlier VDA.
es
• If VDA upgrade is not possible due to feature incompatibility and/or a clean uninstall is required.
• The VDA Clean‐Up Utility removes components, files, and registry values of VDA 5.6 afterwards.
al
e
Additional Resources:
or
• How to troubleshoot Virtual Delivery Agent (VDA) Registration issues
di
https://support.citrix.com/article/CTX136668
• Citrix Supportability Pack (bundles many useful tools
s tri
https://support.citrix.com/article/CTX203082
• Citrix Policy Reporter ‐ RSOP CtxCseUtil Tool
b ut
https://support.citrix.com/article/CTX138533
• VDA Cleanup Utility
io
https://support.citrix.com/article/CTX209255
n
• CDF Control
https://support.citrix.com/article/CTX111961
N
6 Resources
ot
Citrix StoreFront Active License Delivery SQL
fo
Users Gateway Directory Server Controller Site DB Desktops Desktops Apps Apps
rr
es
2
al
San Francisco (SFO) Miami (MIA)
e
End User Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
Device
or
Resources Resources
Citrix
di
Gateway
Delivery
s
Controller Desktops Apps Desktops Apps
tri
StoreFront 3 1
b
4 7
ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
The registration process, when multiple zones are involved, is different than a single zone deployment. It may also vary based on factors
such as zone preference. Generally, a VDA will register with a controller in its local zone, if one is available. If no local controller is
available, registration will be attempted with a controller in the primary zone. If no controller exists in the local zone, registration will
always be attempted with a controller in the primary zone.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
N
Infrastructure 3 Zone 1 (Primary)
ot
4 Resources
fo
Citrix StoreFront Active License Delivery SQL
Users
rr
Gateway Directory Server Controller Site DB Desktops Desktops Apps Apps
es
2
al
San Francisco (SFO) Miami (MIA)
e
Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
End User
or
Device Resources Resources
di
Citrix
Gateway
s
Delivery
Controller Desktops Apps Desktops Apps
tri
StoreFront
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• A key element of troubleshooting is to understand what occurs internally between the Citrix Virtual Apps and Desktops components.
• The internal Process are XML Service‐Based and shown in yellow in the diagram. Troubleshooting internal communications should
begin with the steps below;
• (1) End user device accesses StoreFront authentication page via internal URL.
• The URL must be accessible to any users expected to access it directly. Making this URL available to external users presents a
security risk because you are allowing external traffic to communicate directly with a Windows machine, which is more
N
passwords without opening a support ticket.
ot
• (3) StoreFront submits credentials to the XML port of a Delivery Controller.
fo
• For this to occur, the “Validation Password Via” setting must be configured to “Delivery Controllers.”
rr
• (4) The Delivery Controller submits the credentials to a Domain Controller.
• Ensure that communications between the Delivery Controllers and AD Domain Controllers are allowed in the
es
firewalls of your environment.
al
• (5) The Domain Controller validates the credentials.
e
or
Additional Resources:
• Manage Authentication Methods
di
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/configure‐
s tri
authentication‐service.html
• How to Configure LDAP Authentication on Citrix ADC or Citrix Gateway
b ut
https://support.citrix.com/article/CTX108876
• StoreFront 2203 XML Service‐Based authentication
io
https://docs.citrix.com/en‐us/storefront/current‐release/configure‐authentication‐and‐delegation/xml‐
n
authentication.html
N
ot
failed with all delivery controllers. Where
could an engineer look to identify the reason
fo
behind communication failures?
rr
es
• Change Control logs indicating a network or
firewall change.
al
e
or
di
s
tri
b
ut
io
n
N
Tracing tools
ot
• 11-2: Verifying and Resolving Time Synchronization
fo
Issues
rr
• 11-3: Verifying and Resolving Network Connectivity
es
Issues between VDA and Delivery Controller
al
• 11-4: Troubleshooting Name Resolution Issues
e
or
di
s
tri
b
ut
io
n
N
ot
Active Directory. If communications are
interrupted by network or security issues
fo
registration can fail.
rr
• Troubleshooting steps into VDA registration
es
issues should include policy, firewall and DNS
al
communications.
e
• VDA registration in a multi-zone environment
or
can involve both local and primary zones.
di
s
tri
b
ut
io
n
N
ot
Troubleshoot HDX Connection Issues
fo
rr
es
al
e
Module 12
or
di
s
tri
b
ut
io
n
N
assist in quickly isolating common session
ot
launch failures.
fo
• Identify the common causes of HDX session
rr
launch failures and how to resolve the failure
causes.
es
al
e
or
di
s
tri
b
ut
© 2022 Citrix Authorized Content
io
n
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
ot
End User PC
fo
Connection issues
rr
es
Enumeration Issues
al
Registration issues
e
StoreFront ( VDC ) Controller VDA
or
Site issues License issues
di
s tri
b
Site Database License Server
ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• In order to assist troubleshooting issues with HDX connections, it is important to identify in what area the issues are in. This allows
us to focus more clearly on the potential resolution.
• The main areas to investigate when it comes to troubleshooting HDX connections are the connection, enumeration, registration, site
and license.
N
connection, or reconnection, attempts to sessions within the site.
ot
fo
• When connecting via StoreFront, you can automatically download
rr
an .ica file to the local client machine by setting the LogICAFile
Verify Connection
es
string value to “true” on the workstation.
Parameters • HKLM\SOFTWARE\Citrix\ICA
al
Client\Engine\Configuration\Advanced\Modules\Logging
e
or
• A downloaded ICA file can be viewed to verify all connection
specific details, for example:
di
Verify Connection
• IP or DNS address of worker
s
Settings • Application settings
tri
• Proxy information
b ut
© 2022 Citrix Authorized Content
io
n
• User sessions connecting to either desktops or applications are distributed evenly across all VDA
within a given Delivery Group. Load values can assist in identifying errors.
• Normal range load values run from 0 no load to 10,000 full load.
N
• A server with a load of 10,000 will not allow new connections.
ot
• A server showing a load of 20,000 indicates a licensing issue.
fo
rr
Delivery Group
es
Session 1
al
e
Session 3
4 HDX Session Requests
or
Published Desktop
di
Controller
s
tri
Published Desktop
Session 4
b
ut
io
n
Key Notes:
• When connection requests are made, they are load balanced over all the VDAs in the delivery group. This can be customized using
policies either through Active Directory or Citrix policies.
• HDX Policy load Management settings include the following parameters that can be set based on specific infrastructure
requirements:
• Concurrent logons tolerance
• CPU usage
N
• Range from 0 to 10000 (full load)
ot
• Report 20000 for licensing issues
fo
• Report a full server load at 250 sessions (default)
• You can query load index using the cmdlets Get‐BrokerMachine, Get‐BrokerMachine ‐SessionSupport MultiSession ‐
rr
Property DnsName, LoadIndex, SessionCount
es
al
Additional Resources:
• How to Calculate the Load Evaluator Index on DDC
e
http://support.citrix.com/article/CTX202150
or
di
s tri
but
io
n
N
For Module 12.
ot
fo
rr
es
al
e
or
di
s tri
b ut
io
n
Key Notes:
• If needed, please refer to Module 0 for instructions regarding how to access labs.
• Do not wait for the labs to fully provision, just initiate the provisioning. The lab should finish provisioning in time to start the lab
exercise.
N
(10b) (8) (9) (3) (14) Resources
(10a) (2)
ot
(1a) (7)
Citrix (12)
StoreFront Active License Delivery SQL
fo
Users Gateway Directory Server Controller Site DB
(4) (5) Desktops Desktops Apps Apps
rr
(11) (13)
es
(6)
al
(1b)
San Francisco (SFO) Miami (MIA)
e
End User Infrastructure Zone 2 (Satellite) Zone 3 (Satellite)
Device
or
Resources Resources
di
Citrix
Gateway
s
Delivery
Internal User Controller Desktops Apps Desktops Apps
tri
External User StoreFront
b ut
© 2021 Citrix Authorized Content
io
n
Key Notes:
• A HDX session can connect either directly to a resource or via a Citrix Gateway.
• When using a Citrix Gateway, traffic will first pass to the Gateway using encryption before being processed by the
Gateway and any rules or restrictions applied. Once traffic has been processed, it will be forwarded on to the host
device.
• When a Citrix Gateway is not used, such as in scenarios where no encryption is required, the HDX traffic will pass
directly to the resource. It is important to recognize how traffic is routing in your environment to aid in troubleshooting.
Additional Resources:
• Create a single Fully Qualified Domain Name (FQDN) to access a store internally and externally
N
https://docs.citrix.com/en‐us/storefront/current‐release/advanced‐configurations/configure‐single‐fqdn.html
ot
• Users Prompted to Download, Run, Open Launch.ica File, Instead of Launching Connection
fo
https://support.citrix.com/article/CTX804493
• Error: You Cannot Access this Session Because no Licenses are Available. Event ID 1163
rr
https://support.citrix.com/article/CTX210104
es
al
e
or
di
s tri
but
io
n
Common Misconfigurations
N
• All VDAs hosts are reporting full load, unregistered,
ot
offline, or in maintenance mode.
fo
rr
• No Citrix licenses are available due to unplanned
increase in users.
es
al
• Are there Secure Ticket Authority (STA) issues when
e
launching via Citrix Gateway.
or
• Unexpected behavior or performance after an upgrade
di
from an earlier version of Citrix Workspace app.
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• There are a number of common errors made when configuring Citrix Virtual Apps and Desktops that can lead to issues with HDX
sessions. These can include licensing, incorrect server details being used and VDA’s becoming unregistered or showing fully loaded
due to misconfigurations.
Additional Resources:
• Citrix Supportability Pack (bundles many useful tools)
N
• Tools To Simulate CPU / Memory / Disk Load (includes CPUStress Tool)
ot
https://blogs.msdn.microsoft.com/vijaysk/2012/10/26/tools‐to‐simulate‐cpu‐memory‐disk‐load/
fo
• Autoruns for Windows v13.7
https://technet.microsoft.com/en‐us/sysinternals/bb963902.aspx
rr
es
al
e
or
di
s tri
but
io
n
N
ot
• Windows Event Logs
• Citrix Studio
fo
rr
• Citrix Director
es
• PowerShell/Command Utility
• CPUStress Tool
al
e
• Resource Monitor
or
• Process Explorer
di
• AutoRuns utility
s tri
b ut
© 2022 Citrix Authorized Content
io
n
Key Notes:
• Principal tools used to troubleshoot are Citrix Studio and Director, Windows event logs, and PowerShell. Other tools, including a
number already covered in this course can be used to gather additional information on the status of a Citrix Virtual Apps and
Desktops environment to assist troubleshooting.
Additional Resources:
• Citrix Supportability Pack (bundles many useful tools)
N
• Tools To Simulate CPU / Memory / Disk Load (includes CPUStress Tool)
ot
https://blogs.msdn.microsoft.com/vijaysk/2012/10/26/tools‐to‐simulate‐cpu‐memory‐disk‐load/
fo
• Autoruns for Windows v13.7
https://technet.microsoft.com/en‐us/sysinternals/bb963902.aspx
rr
es
al
e
or
di
s tri
but
io
n
N
"no server configured at the specified
ot
address. What is the most likely cause?
fo
A network error is resulting in the HDX
rr
connection request from the client device being
es
directed to a device that is not the intended
al
Citrix VDA.
e
or
di
s
tri
b
ut
io
n
N
ot
• 12-2: Troubleshooting Published App Launch
Failures Caused by a Missing Dependency
fo
rr
es
al
e
or
di
s
tri
b
ut
io
n
N
ot
parameters for connection to the VDA, either
directly or through a Citrix Gateway.
fo
• An .ICA file, which contains incorrect details or
rr
a misconfigured dependent component, will
es
cause HDX sessions to fail.
al
• HDX or CLI commands such as Get-
e
BrokerConnectionLog can be used to review
or
HDX connection details or session activity
di
along with other Citrix and third-party tools.
s
tri
utb
io
n