Service continuity uses Workspace connection leases to allow users to access apps and desktops during outages. Workspace connection leases are long-lived authorization tokens. Workspace connection lease files are securely cached on the user device. When a user signs in to Citrix Workspace, Workspace co...
-includedClientIPs < Client ip address> [CVADHELP-18783] • Shortcuts for published applications through Citrix Workspace app cannot be created without appropriate permissions. As a result, the icons might be downloaded in the user profile at every refresh, increasing the cache size on the endpo...
You cannot delete or edit any Configuration Logging content from Studio. The Remote PowerShell SDK can be used to schedule periodic data deletion from the log, using cmdletSet-LogSite -LoggingDBPurgeDurationDays. The default value is 0, meaning data is never deleted. If you set a different v...
the root certificate for the organization's certificate authority must be installed on the user device. Then, you can successfully access Citrix resources using Citrix Workspace app for Mac. Note: If the remote gateway's certificate cannot be verified upon connection (because the root certifi‑ ...
p.1 About Receiver for Linux 13.2.x Jun 0 5, 20 15 Citrix Receiver for Linux is a software client that lets you access your desktops, applications, and data easily and securely from many types of Linux devices. Working with a Citrix-enabled IT infrastructure, Receiver gives you the ...
Citrix is responsible for executing these tasks safely and securely, and with minimal impact to the customer. Citrix is also responsible for ensuring any log files are retrieved, transported, and handled safely and securely. Customer VDAs cannot be accessed this way. Backups for non‑domain‑...
between the client 110 and the web server 220 over the secure client-web server communication channel 240, the communications system 205 establishes a secure communication link over the non-secure client-proxy communication channel 135 to remotely display desktop applications securely on the client 110...
In its broadest application, the present invention is directed to a system and method for establishing a virtual private network (VPN) between a client and a private data communication network, wherein the client is securely connected to the private data communication network via a public data com...
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using
a user input policy may specify that the administrator cannot delete emails in an email application. As another example, a user input policy may specify that the administrator cannot access a main homescreen of the device and should be taken to a managed application launcher upon issuing a HOME...