XenMobile

SmartAccess for HDX apps

This feature allows you to control access to HDX apps based on device properties, user properties of a device, or applications installed on a device. You use this feature by setting automated actions to mark the device as out of compliance to deny that device access. HDX apps used with this feature are configured in Virtual Apps and Desktops by using a SmartAccess policy that denies access to out-of-compliance devices. XenMobile communicates the status of the device to StoreFront using a signed, encrypted tag. StoreFront then allows or denies access based on the access control policy of the app.

To use this feature, your deployment requires:

  • Virtual Apps and Desktops 7.6
  • StoreFront 3.7 or 3.8
  • XenMobileServer configured to aggregate HDX apps from a StoreFront server
  • XenMobileServer configured with a SAML certificate to be used for signing and encrypting tags. The same certificate without private key is uploaded on StoreFront server.

To start using this feature:

  • Configure the XenMobile Server certificate to the StoreFront store
  • Configure at least one Virtual Apps and Desktops delivery group with the required SmartAccess policy
  • Set the automated action in XenMobile

Export and configure the XenMobile Server certificate and upload it to the StoreFront store

SmartAccess uses signed and encrypted tags to communicate between the XenMobile and StoreFront servers. To enable that communication, you add the XenMobile Server certificate to the StoreFront store.

For more information about integrating StoreFront and XenMobile when XenMobile is enabled with domain and certificate-based authentication, see theSupport Knowledge Center.

Export the SAML certificate from the XenMobile Server

  1. 在XenMobile控制台,点击the gear icon in the upper-right corner. TheSettings页面出现。点击Certificates.

  2. Locate the SAML certificate for XenMobile Server.

    SmartAccess configuration

  3. Ensure thatExport private keyis set toOff. ClickExportto export the certificate to your download directory.

    SmartAccess configuration

  4. 找到证书your download directory. The certificate is in PEM format.

    SmartAccess configuration

Convert the certificate from PEM to CER

  1. Open the Microsoft Management Console (MMC) and right-clickCertificates > All Tasks > Import.

    SmartAccess configuration

  2. When the certificate import wizard appears, clickNext.

    SmartAccess configuration

  3. Browse to the certificate in the download directory.

    SmartAccess configuration

  4. SelectPlace all certificates in the following storeand selectPersonalas the certificate store. ClickNext.

    SmartAccess configuration

  5. 回顾你的选择和clickFinish. ClickOKto dismiss the confirmation window.

  6. In the MMC, right-click the certificate and then chooseAll Tasks > Export.

    SmartAccess configuration

  7. When the certificate export wizard appears, clickNext.

    SmartAccess configuration

  8. Choose the formatDER encoded binary X.509 (.CER). ClickNext.

    SmartAccess configuration

  9. Browse to the certificate. Type a name for the certificate and then clickNext.

    SmartAccess configuration

  10. Save the certificate.

    SmartAccess configuration

  11. Browse to the certificate and clickNext.

    SmartAccess configuration

  12. 回顾你的选择和clickFinish. ClickOKto dismiss the confirmation window.

    SmartAccess configuration

  13. 找到证书your download directory. Note that the certificate is in CER format.

    SmartAccess configuration

Copy the certificate to the StoreFront Server

  1. On the StoreFront server, create a folder calledSmartCert.

  2. Copy the certificate to theSmartCertfolder.

    SmartAccess configuration

Configure the certificate on the StoreFront store

On the StoreFront server, run this PowerShell command to configure the converted XenMobile Server certificate on the store:

Grant-STFStorePnaSmartAccess –StoreService $store –CertificatePath “C:\xms\xms.cer” –ServerName “XMS server” 

SmartAccess configuration

If there are any existing certificates on the StoreFront store, run this PowerShell command to revoke them:

Revoke-STFStorePnaSmartAccess –StoreService $store –All 

SmartAccess configuration

Alternatively, you can run any of these PowerShell commands on the StoreFront server to revoke existing certificates on the StoreFront store:

  • Revoke by name:
$store = Get-STFStoreService –VirtualPath /Citrix/Store Revoke-STFStorePnaSmartAccess –StoreService $store –ServerName “My XM Server" 
  • 由thumbpr撤销int:
$store = Get-STFStoreService –VirtualPath /Citrix/Store Revoke-STFStorePnaSmartAccess –StoreService $store –CertificateThumbprint “ReplaceWithThumbprint” 
  • Revoke by server object:
$store = Get-STFStoreService –VirtualPath /Citrix/Store $access = Get-STFStorePnaSmartAccess –StoreService $store Revoke-STFStorePnaSmartAccess –StoreService $store –SmartAccess $access.AccessConditionsTrusts[0] 

Configure the SmartAccess policy for Virtual Apps and Desktops

To add the required SmartAccess policy to the delivery group delivering the HDX app:

  1. On the Virtual Apps and Desktops server, open Citrix Studio.

  2. SelectDelivery Groupsin the Studio navigation pane.

  3. Select a group delivering the app or apps you want to control access to. Then selectEdit Delivery Groupin theActionspane.

  4. On theAccess Policypage, selectConnections through NetScaler GatewayandConnection meeting any of the following.

  5. 点击Add.

  6. Add an access policy whereFarmisXMandFilterisXMCompliantDevice.

    SmartAccess configuration

  7. 点击Applyto apply any changes you made and keep the window open, or clickOKto apply changes and close the window.

Set automated actions in XenMobile

The SmartAccess policy that you set in the delivery group for an HDX app denies access to a device when the device in out of compliance. Use automated actions to mark the device as out of compliance.

SmartAccess configuration

  1. From the XenMobile console, clickConfigure > Actions. TheActions页面出现。

  2. 点击Addto add an action. TheAction Information页面出现。

  3. On theAction Informationpage, type a name and description for the action.

  4. 点击Next. The行动的细节页面出现。In the following example, a trigger is created that immediately marks devices as out of compliance if they have the user property nameeng5oreng6.

    SmartAccess configuration

  5. In theTriggerlist, chooseDevice property,User property, orInstalled app name. SmartAccess doesn’t support event triggers.

  6. In theActionlist:

    • ChooseMark the device as out of compliance.
    • ChooseIs.
    • ChooseTrue.
    • To set the action to mark the device as out of compliance immediately when the trigger condition is met, set the time frame to0.
  7. Choose the XenMobile delivery group or groups to apply this action to.

  8. Review the summary of the action.

  9. 点击Nextand then clickSave.

When device is marked out of compliance, the HDX apps no longer appear in the Secure Hub store. The user is no longer subscribed to the apps. No notification is sent to the device and nothing in the Secure Hub store indicates that the HDX apps were previously available.

If you want users to be notified when a device is marked out of compliance, create a notification and then create an automated action to send that notification.

This example creates and sends this notification when a device is marked out of compliance: “Device serial number or telephone number no longer complies with the device policy and HDX applications will be blocked.”

SmartAccess configuration

Create the notification users see when a device is marked as out of compliance

  1. 在XenMobile控制台,点击the gear icon in the upper-right corner of the console. TheSettings页面出现。

  2. 点击Notification Templates. TheNotification Templates页面出现。

  3. 点击Addto add on theNotification Templatespage.

  4. When prompted to set up the SMS server first, clickNo, set up later.

    SmartAccess configuration

  5. Configure these settings:

    • Name:HDX Application Block
    • Description:Agent notification when device is out of compliance
    • Type:Ad Hoc Notification
    • Secure Hub:Activated
    • Message:Device ${firstnotnull(device.TEL_NUMBER,device.serialNumber)} no longer complies with the device policy and HDX applications will be blocked.

    SmartAccess configuration

  6. 点击Save.

Create the action that sends the notification when a device is marked out of compliance

  1. From the XenMobile console, clickConfigure > Actions. TheActions页面出现。

  2. 点击Addto add an action. TheAction Information页面出现。

  3. On theAction Informationpage, enter a name and description for the action:

    • Name:HDX blocked notification
    • Description:HDX blocked notification because device is out of compliance
  4. 点击Next. The行动的细节页面出现。

  5. In theTriggerlist:

    • ChooseDevice property.
    • ChooseOut of compliance.
    • ChooseIs.
    • ChooseTrue.

    SmartAccess configuration

  6. In theActionlist, specify the actions that occur when the trigger is met:

    • ChooseSend notification
    • ChooseHDX Application Block, the notification you created.
    • Choose0. Setting this value to 0 causes the notification to be sent as soon as the trigger condition is met.
  7. Select the XenMobile delivery group or groups to apply this action to. In this example, chooseAllUsers.

  8. Review the summary of the action.

  9. 点击Nextand then clickSave.

For more information on setting automated actions, seeAutomated actions.

How users regain access to HDX apps

Users can gain access to HDX apps again after the device is brought back into compliance:

  1. On the device, go to the Secure Hub store to refresh the apps in the store.

  2. Go to the app and tapAddto the app.

After the app is added, it appears in My Apps with a blue dot next to it, because it is a newly installed app.

SmartAccess configuration