Web results:
Configure single sign-on with Citrix Gateway. You enable single sign-on with Citrix Gateway using the Group Policy Object administrative template. However, you must ensure that you have enabled basic authentication and single factor (nFactor with 1 Factor) authentication on the Citrix Gateway.
To create a new NetScaler Gateway, use ns_gateway_secure_access.sh . To update an existing NetScaler Gateway, use ns_gateway_secure_access_update.sh. Upload these scripts to the NetScaler machine. You can use the WinSCP app or the SCP command. For example, *scp ns_gateway_secure_access.sh nsroot@nsalfa.fabrikam.local:/var/tmp*. Note:
On a Windows-based computer, in the notification area, right-click the NetScaler Gateway icon and then click Configure NetScaler Gateway. Click the Profile tab and then click Change Profile. On the Options tab, click Use the Citrix Secure Access client for logon.
Citrix Secure Private Access Secure Private Access for on-premises - Preview November 15, 2023 Contributed by: C As Citrix customers, you can now access Web and SaaS apps seamlessly along with Citrix Virtual Apps and Desktops using the Citrix Secure Private Access solution for on-premises deployments.
Contributed by: H. The Windows autologon functionality enables Citrix Secure Access client to establish a tunnel with NetScaler automatically once the user logs in to the Windows machine. The authentication methods that support the Windows autologon functionality are LDAP and Kerberos.
You must specify StoreFront and NetScaler Gateway server details to connect Secure Private Access with StoreFront and NetScaler Gateway servers. This connection must be established to enable StoreFront and NetScaler Gateway to route traffic to Secure Private Access.
Important: After you have completed the NetScaler Gateway configuration, and if you see the OAuth Status other than COMPLETE, see the Troubleshooting section. Configuring Microsoft Edge Browser Sign in to https://endpoint.microsoft.com/ and then navigate to Intune > Mobile apps .
To create and bind a Login Schema Policy: Navigate to Security > AAA > Login Schema. Click the Policies tab, and then click Add. In Profile, select the login schema profile created earlier. In Rule, enter the default syntax expression and click Create.
Go to https://citrix.cloud.com and sign in to your Citrix Cloud account. From the Citrix Cloud menu, go to the Identity and Access Management page and connect to Azure Active Directory. Type your administrator sign-in URL and then click Connect. After you sign in, your Azure Active Directory account connects to Citrix Cloud.
Sign in to Citrix Endpoint Management console and then click Settings icon. Click Citrix Gateway under Server. Enable Authentication toggle button. Ensure that the Logon Type of the gateway is Identity provider. Click Save. Prepare on-premises Citrix Gateway