System requirements

This article provides the system requirements for using the MDX Toolkit to wrap mobile apps. The article also provides the requirements specific to app platforms.

Important:

The XenMobile App SDK 10.2 now requires the following components: JavaScriptCore.framework and LocalAuthentication.framework.

  • Java Development Kit (JDK) 1.7 or 1.8:You can download the JDK 1.8 fromJava SE Development Kit Downloadson the Oracle website. For installation instructions, see theJDK 8 and JRE 8 Installation Guideon the Oracle website. Be sure to install the full JDK and set JDK 1.8 as the default.
  • macOS:Use the most recent version. The installer for the MDX Toolkit and XenMobile App SDK must run on macOS. The installer includes macOS tools that wrap both iOS and Android apps and a Java command-line tool that wraps Android apps.
  • XenMobile App SDK:Use the most recent version of the XenMobile iOS SDK and the Xcode; bitcode generation disabled.

Other requirements for wrapping iOS mobile apps

To obtain access to the app wrapping prerequisites for iOS, you must register for an Apple distribution account. There are three types of iOS developer accounts: Enterprise, Individual, and University. Citrix strongly recommends iOS Developer Enterprise accounts. The MDX Toolkit is also compatible with iPadOS.

  • iOS Developer Enterprise accounts:The only type of Apple Developer account that allows you to provision, deploy, and test unlimited apps to unlimited devices, with or without app wrapping. Be sure to distribute your Developer Certificate to your developers so they can sign apps.
  • iOS Developer Individual accounts:Limited to 100 registered devices per year and do not qualify for app wrapping and enterprise distribution with Citrix Endpoint Management.
  • iOS Developer University accounts:Limited to 200 registered devices per year and do not qualify for app wrapping and enterprise distribution with Endpoint Management.

Important:

Be sure to track when the provisioning profiles for your account are due to expire and renew the profiles before they expire. When a profile used to wrap apps expires, you must renew the profile, rewrap the apps, and then reinstall the apps on user devices. To renew a provisioning profile, log on to yourApple Developer account, go toCertificates, Identifiers & Profiles, and then selectProvisioning Profiles.

Download the Xcode command-line tools from theXcode Apple Developerwebsite. macOS 10.10 does not install the tools automatically. To install the tools, follow these steps:

  1. InApplications > Utilities, click Terminal to use the Mac command line interface (CLI).

  2. Type the following command:

    xcode-select --install 

    Be sure to include two hyphens before the word install in the command.

  3. After the Xcode command-line tools install, run Xcode to install any prerequisites.

Other requirements for wrapping Android mobile apps

To wrap Android wraps, you also need a compatible Android software development kit (SDK) and a valid keystore. To download, create, and properly configure the SDK and keystore, follow these instructions:

Android software development kit

The MDX Toolkit is compatible with API Level 26 of the Android SDK.

  1. Go to the Google developer website and download the Android SDK from the SDKdownload page. The full Android Studio is not required. You can download the command-line tools from the section near the bottom of the page.

    Image of Android SDK command line tools button

  2. Install the latest tools, platform-tools, and build-tools. This installation requires using the Android tool inAndroid SDK > toolsto start the SDK Manager:

    • Unzip the SDK file you downloaded.
    • Go to the tools folder and then clickAndroidto run the SDK Manager.

    Image of the tools folder

  3. In the SDK Manager, select the latest versions of the following:

    • Android SDK Tools
    • Android SDK Platform
    • Android SDK Platform-tools
    • Android SDK Build-tools
  4. ClickInstall Packages.

    Android SDK管理器屏幕上的图像

  5. On theChoose Packages to Installscreen, clickAccept Licensefor all the packages you are installing and then clickInstall.

    Image of the Choose Packages to Install screen

  6. To verify that you downloaded the appropriate SDK Tools and APIs, check that the .aapt file is inAndroid SDK > build-tools > 23.0.3.

    Image of the 23.0.3 folder

  7. When updating your SDK, you have to delete all .aapt files from the platform-tools folder. Ensure that the .aapt file is in build-tools only.

  8. If the zipalign file is missing from build-tools, copy the file from the platform-tools folder to the build-tools folder, and then delete it from platform-tools.

    Image of the zipalign folder

  9. Add the location of the newly installed folders to the android_settings.txt file in the MDX Toolkit install folder.

  10. InApplications > Citrix > MDX Toolkit, open the android_settings.txt file and then add the full path for the following folders:

    • Android SDK
    • Android SDK > tools
    • Android SDK > platform-tools
    • Android SDK > build-tools > [version]

    Note:

    Be sure to remove theAndroid SDK > apktoolspath from the android_settings file, as that path is no longer required.

    To find the full path of your SDK folder, right-click on the file, selectGet Infoand then on the Info panel, review the Where information.

    Image of the Get Info panel

  11. Before editing the android_settings file, make a copy of the file.

    1. Go toApplications > Citrix > MDXToolkit > Android_settings.

    2. Add the new paths.

    3. Save the file outside of theApplications > Citrix > MDX Toolkitfolder.

    4. Rename the original android_settings file in theApplications > Citrix > MDX Toolkitfolder; for example, android_settings.old.

    5. Copy the new android_settings file with the added paths into theApplications > Citrix > MDX Toolkitfolder.

    The following example shows the file with the paths added:

    Image of the file with paths added

Valid Keystore

A valid keystore contains digitally signed certificates that you use to sign Android apps. You create a keystore one time and retain this file for current and future wrapping. If you do not use the same keystore when wrapping new versions of apps that you’ve previously deployed, upgrades of those apps don’t work. Instead, users must manually remove older versions before installing new versions.

A keystore can contain multiple private keys. Usually, though, the keystore has only one key.

For details about certificates, seeSigning Your Applications.

Sign your apps with a key that meets the following guidelines:

  • 2048-bit key size
  • DSA or RSA key algorithm (-keyalg)
  • Do not use MD5.

The MDX Toolkit signs apps using SHA1 to support older versions of Android. This algorithm deprecates soon in favor of SHA256. If you want to sign your app with another algorithm, use another tool.

If you don’t want to use the debug keystore, create a keystore. To create a keystore, startTerminaland then enter the command:

keytool -genkey -keystore my-release-key.keystore -alias alias_name -keyalg RSA -key size 2048 -validity 10000

提供要求的信息,如password for the keystore and the domain name of your organization (example: example.com). The key is valid for 25 years.

To sign an app, use this command:

jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystoremy-release-key.keystoremy_application.apkalias_name

You can now wrap Android apps. For details, seeWrapping Android apps.

System requirements