XenMobile

What’s new in XenMobile Server 10.13

XenMobile Server 10.13(PDF Download)

Continued support for the Classic policies deprecated from Citrix ADC

Citrix recently announced the deprecation of some Classic policy based features starting with Citrix ADC 12.0 build 56.20. The Citrix ADC deprecation notices have no impact to existing XenMobile Server integrations with Citrix Gateway. XenMobile Server continues to support the Classic policies and no action is needed.

XenMobile Migration Service

If you’re using XenMobile Server on-premises, our free XenMobile Migration Service can get you started with Endpoint Management. Migration from XenMobile Server to Citrix Endpoint Management doesn’t require you to re-enroll devices.

To start migration, contact your local Citrix salesperson or Citrix partner. SeeXenMobile Migration Service.

Deprecation announcements

For advanced notice of the Citrix XenMobile features that are being phased out, seeDeprecation.

Before upgrading endpoints to iOS 14.5

Citrix recommends that before upgrading any endpoint to iOS 14.5, you perform the following actions to mitigate app crashes:

  • Upgrade Citrix Secure Mail and Secure Web to 21.2.X or higher. SeeUpgrade MDX or enterprise apps.
  • If you use the MDX Toolkit, wrap all third-party iOS applications with MDX Toolkit 21.3.X or higher. Check the MDX Toolkitdownload pagefor the latest version.

Before you upgrade an on-premises Citrix ADC

Upgrading an on-premises Citrix ADC to certain versions can result in a single sign-on error. Single sign-on to Citrix Files or the ShareFile domain URL in a browser with theCompany Employee Sign inoption results in an error. The user is unable to sign in.

To work around this issue: If you haven’t already run the following command from the ADC CLI on Citrix Gateway, run it to enable global SSO:

`set vpn parameter SSO ON` `bind vpn vs  -portalTheme X1`

For more information, see:

After you complete the workaround, users can authenticate to Citrix Files or the ShareFile domain URL using SSO in a browser with the Company Employee Sign in option. [CXM-88400]

Before you upgrade to XenMobile 10.13 (on-premises)

Some systems requirements changed. For information, seeSystem requirements and compatibilityandXenMobile compatibility.

  1. If the virtual machine running the XenMobile Server to be upgraded has less than 8 GB of RAM, we recommend increasing the RAM to at least 8 GB.

  2. Update your Citrix License Server to 11.16 or later before updating to the latest version of XenMobile Server 10.13.

    The latest version of XenMobile requires Citrix License Server 11.16 (minimum version).

    Note:

    The Customer Success Services date (previously, Subscription Advantage date) in XenMobile 10.13 is September 29, 2020. The Customer Success Services date on your Citrix license must be later than this date.

    您可以查看日期旁边的许可icense Server. If you connect the latest version of XenMobile to an older License Server environment, the connectivity check fails and you can’t configure the License Server.

    To renew the date on your license, download the latest license file from the Citrix Portal and upload the file to the Licensing Server. SeeCustomer Success Services.

  3. For a clustered environment: iOS policy and app deployments to devices running iOS 11 and later have the following requirement. If Citrix Gateway is configured for SSL persistence, you must open port 80 on all XenMobile Server nodes.

  4. Recommendation: Before you install a XenMobile update, use the functionality in your VM to take a snapshot of your system. Also, back up your system configuration database. If you experience issues during an upgrade, complete backups enable you to recover.

To upgrade

With this release, XenMobile supports VMware ESXi 7.0. Ensure that you upgrade to 10.13 before installing or upgrading ESXi 7.0.

You can directly upgrade to XenMobile 10.13 from XenMobile 10.12.x or 10.11.x. To perform the upgrade, download the latest binary available: Go to//m.giftsix.com/downloads. Navigate toCitrix Endpoint Management (XenMobile) > XenMobile Server > Product Software > XenMobile Server 10. On the tile for the XenMobile Server software for your hypervisor, clickDownload File.

To upload the upgrade, use theRelease Managementpage in the XenMobile console. SeeTo upgrade using the Release Management page.

After you upgrade

If functionality involving outgoing connections stop working, and you haven’t changed your connections configuration, check the XenMobile Server log for errors such as the following: “Unable to connect to the VPP Server: Host name ‘192.0.2.0’ does not match the certificate subject provided by the peer”.

  • The certificate validation error means you must disable host name verification on the XenMobile Server.
  • By default, host name verification is enabled on outgoing connections except for the Microsoft PKI server.
  • If host name verification breaks your deployment, change the server propertydisable.hostname.verificationtotrue. The default value of this property isfalse.

Platform support updates

  • iOS 14:XenMobile Server and Citrix Mobile productivity apps are compatible with iOS 14, but don’t currently support any new iOS 14 features. Use the MDX Toolkit 20.8.5 or later or prepare the apps using the MAM SDK.

  • Android 11:XenMobile Server supports Android 11. For information about how the deprecation of Google Device Administration APIs impacts devices running Android 10+, seeMigrate from device administration to Android Enterprise. Also see thisCitrix blog.

Configure multiple device and app management modes in a single environment

You can now configure a single XenMobile site to support multiple enrollment configurations. The role of enrollment profiles expanded to include enrollment settings for device and app management.

Enrollment profiles support multiple use cases and device migration paths within a single XenMobile console. Use cases include:

  • Mobile Device Management (MDM only)
  • MDM+Mobile Application Management (MAM)
  • MAM only
  • Corporate-owned enrollments
  • BYOD enrollments (the ability to opt out of MDM enrollment)
  • Migration of Android device administrator enrollments to Android Enterprise enrollments (fully managed, work profile, dedicated device)

Enrollment profiles replace the now deprecated server property,xms.server.mode. This change does not impact your existing delivery groups and enrolled devices.

如果你不需要登记专用设备,你can disable this feature by setting the server propertyenable.multimode.xmstofalse. SeeServer properties.

The following table shows the automated migration path from the existing server property mode to the new enrollment profile feature:

Existing server property New management mode
ENT mode (iOS) Apple device enrollment with Citrix MAM
ENT mode (Android) Legacy device administrator with Citrix MAM
ENT mode (Android Enterprise) Work profile on fully managed (previously COPE), with Citrix MAM
MAM mode (iOS and Android) Citrix MAM
MDM mode (iOS) Apple device enrollment
MDM mode (Android) Legacy device administrator
MDM mode (Android Enterprise) Work profile on fully managed

When you create a delivery group, you can attach an enrollment profile to the group. If you don’t attach an enrollment profile, XenMobile attaches the Global enrollment profile.

注册资料提供以下设备anagement features:

  • Easier migration from Android device administrator (DA) mode to Android Enterprise.For Android Enterprise devices, settings include a device owner mode such as: Fully managed, work profile on fully managed, or dedicated. SeeAndroid Enterprise.

    Enrollment Profile page for Android

    For this upgrade, your current XenMobile configurations for server mode andSettings > Android Enterprisemap to the new enrollment profile settings as follows.

    Current configuration Management setting Device owner mode setting Citrix MAM setting
    MDM. Managed Google Play (Android Enterprise) Android Enterprise Work profile on fully managed Off
    MDM; G Suite (legacy DA) Legacy DA not applicable Off
    MAM Do not manage devices not applicable On
    MDM+MAM. Managed Google Play (Android Enterprise) Android Enterprise* Work profile on fully managed On
    MDM+MAM; G Suite (legacy DA) Legacy DA* not applicable On

    * If enrollment is required,Allow users to decline device managementisOff.

    After the upgrade, your current enrollment profiles reflect those mappings. Consider whether you want to create other enrollment profiles to handle any new use cases as you transition away from legacy DA.

  • Easier iOS management.For iOS devices, settings include a choice between enrolling devices as managed or unmanaged.

    Enrollment Profile page for iOS

    For this upgrade, your prior configurations map to the new enrollment profile settings as follows.

    Server mode Management setting Citrix MAM setting
    MDM Device enrollment Off
    MAM Do not manage devices On
    MDM+MAM Device enrollment On

    If enrollment is required,Allow users to decline device managementisOff.

The following limitations exist for enhanced enrollment profiles:

  • The enhanced enrollment profile feature isn’t available for one-time PIN or two-factor authentication enrollment invitations.

SeeEnrollment profiles.

Support for the latest HTTP/2-based APNs provider API

Apple support for the Apple Push Notification service legacy binary protocol ends as of March 31, 2021. Apple recommends that you use the HTTP/2-based APNs provider API instead. XenMobile Server now supports the HTTP/2-based API. For more information, see the news update, “Apple Push Notification Service Update” inhttps://developer.apple.com/. For help with checking connectivity to APNs, seeConnectivity checks.

The following versions of XenMobile Server enable support for the HTTP/2-based API by default:

  • XenMobile Server 10.13
  • XenMobile Server 10.12 Rolling Patch 5 and above

If you use the following versions of XenMobile Server, you must add the server propertyapple.apns.http2to enable the support:

  • XenMobile Server 10.12 Rolling Patches 2-4 and above
  • XenMobile Server 10.11 Rolling Patch 5 and above

We no longer support XenMobile Server 10.11 and recommend that you upgrade to the latest release.

Use a device-certificate based IPsec VPN with many iOS devices

Instead of configuring a VPN device policy and a credentials device policy for each iOS device that requires a device-certificate based IPsec VPN, automate the process.

  1. Configure an iOS VPN device policy with the connection typeAlways on IKEv2.
  2. SelectDevice certificate based on device identityas the device authentication method.
  3. Select theDevice identity typeto use.
  4. Bulk import your device certificates using the REST API.

For more information about configuring the VPN device policy, seeVPN device policy. For information about importing certificates in bulk, seeUpload certificates in bulk using the REST API).

Auto updates for Apple volume purchase apps

当你添加一个体积购买账户(Settings > iOS Settings), you can now enable auto updates for all iOS apps. See theApp Auto Updatesetting inApple Volume Purchase.

Password requirements for a local user account

When you add or edit a local user account in the XenMobile console, ensure that you follow the latest password requirements.

For more information, seeTo add a local user account.

  • Password requirements:When you add or edit a local user account in the XenMobile Server console, follow the latest password requirements. SeeTo add a local user account.

  • Local user account locking:If a user reaches the maximum number of consecutive invalid login attempts, the local user account locks for 30 minutes. The system denies all further authentication attempts until the lockout period expires. To unlock the account in the XenMobile Server console, go toManage > Users, select the user account, and clickUnlock Local User. SeeTo unlock a local user account.

Device policies

New device policies and device policy settings have been added for Android Enterprise devices.

Hide the tray bar icon on Android Enterprise devices

You can now select whether the tray bar icon is hidden or visible for Android Enterprise devices. SeeXenMobile options device policy.

More certificate management features for Android Enterprise devices in work profile mode or fully managed mode

In addition to installing certificate authorities in the managed keystore, you can now manage the following features:

  • Configure the certificates used by specific managed apps.The Credentials device policy for Android Enterprise now includes the settingApps to use the certificates. You can specify the apps to use the user certificates issued by the credential provider selected in this policy. Apps are silently granted access to certificates during run time. To use the certificates for all apps, leave the apps list blank. SeeCredentials device policy.
  • Silently remove certificates from the managed keystore or uninstall all non-system CA certificates.SeeCredentials device policy.
  • Prevent users from modifying credentials stored in the managed keystore.The Restrictions device policy for Android Enterprise now includes the settingAllow user to configure user credentials. By default, that setting isOn. SeeRestrictions device policy.

Easier use of the certificate alias in Managed configurations

Use the newCertificate aliassetting in theCredentialsdevice policy with theManaged configurationdevice policy. Doing so allows apps to authenticate on the VPN without user action. Instead of finding the credential alias in the app logs, you create the credential alias. Create the alias by typing it in theCertificate aliasfield of theManaged configurationsdevice policy. Then you type the same certificate alias in theCertificate aliassetting in theCredentialsdevice policy. SeeManaged configurations policyandCredentials device policy.

Control the “Use one lock” setting on Android Enterprise devices

The newEnable unified passcodesetting in thePasscodedevice policy lets you control whether a device requires a separate passcode for the device and the work profile. Before this setting, users controlled this behavior with theUse one locksetting on the device. WhenEnable unified passcodeisOn, users can use the same passcode for the device as the work profile. IfEnable unified passcodeisOffusers can’t use the same passcode for the device as the work profile. The default isOff. TheEnable unified locksetting is available for Android Enterprise devices running Android 9.0 or later. SeePasscode device policy.

显示应用程序和快捷键在Android上的企业devices that are not in compliance

The Passcode device policy for Android Enterprise has a new setting,Show apps and shortcuts while passcode is not in compliance. Enable the setting to cause the apps and shortcuts to remain visible when the device passcode is no longer compliant. Citrix recommends you create an automated action to mark the device as out of compliance when the passcode is not in compliance. SeePasscode device policy.

Disable the ability to print on the Android Enterprise work profile devices or fully managed devices

In the Restrictions device policy, theDon’t allow printingsetting lets you specify whether users can print to any printer accessible from the Android Enterprise device. SeeAndroid Enterprise settings.

Allow apps on dedicated devices by adding their package name in the Kiosk policy

You can now enter the package name that you want to allow on the Android Enterprise platform. SeeAndroid Enterprise settings.

Manage keyguard features for Android Enterprise work profile and fully managed devices

Android keyguard manages the device and work challenge lock screens. Use the Keyguard Management device policy to control:

  • Keyguard management on work profile devices. You can specify the features available to users before they unlock the device keyguard and the work challenge keyguard. For example, by default users can use fingerprint unlock and view unredacted notifications on the lock screen. You can also use the keyguard management policy to disable all biometric authentication for devices running Android 9.0 and later.
  • Keyguard management on fully managed and dedicated devices. You can specify the features available, such as trust agents and secure camera, before they unlock the keyguard screen. Or, you can choose to disable all keyguard features.

SeeKeyguard Management device policy.

Publish enterprise apps for Android Enterprise in the XenMobile console

You no longer need to register for a Google Play developer account when you add an Android Enterprise private app. The XenMobile console opens a managed Google Play store UI for you to upload and publish the APK file. For more information, seeAdd an enterprise app.

Publish web apps for Android Enterprise in the XenMobile console

You no longer need to go to managed Google Play or the Google Developer portal to publish Android Enterprise web apps for XenMobile. When you clickUploadinConfigure > Apps > Web link, a managed Google Play store UI opens for you to upload and save the file. The app approval and publishing can take about 10 minutes. For more information, seeAdd a Web link.

Upload certificates to iOS devices in bulk with the XenMobile Server REST API

If uploading certificates one at a time isn’t practical, use the XenMobile Server REST API to upload the certificates to iOS devices in bulk.

  1. Configure an iOS VPN device policy with the connection typeAlways on IKEv2.
  2. Select设备证书e Based on Device Identityas the device authentication method.
  3. Select theDevice identity typeto use.
  4. Bulk import your device certificates with the REST API.

For information about configuring the VPN device policy, seeVPN device policy. For information about importing certificates in bulk, seeUpload certificates to iOS devices in bulk with the REST API.

Refresh encryption keys

TheRefresh encryption keysoption is added in the Advanced Settings of the XenMobile CLI. You can use this option to refresh the encryption keys one node at a time. SeeSystem options.

ESXi 7.0 support

With this release, XenMobile supports VMware ESXi 7.0. Ensure that you upgrade to 10.13 before installing or upgrading ESXi 7.0.

New server properties

The following server properties are now available:

  • Allow hostnames for iOS App Store links:To add public app store apps for iOS using the public APIs rather than the console, configure a list of allowed host names if you want.
  • Local user account lockout limit:Configure the number of sign-in attempts a local user has before their account is locked.
  • Local user account lockout time:配置工程多久一个本地用户被锁定r too many failed sign-in attempts.
  • Maximum size of file upload restriction enabled:Enable restricting the maximum file size for uploaded files.
  • Maximum size of file upload allowed:Set the maximum file size for uploaded files.

For more detailed information about these properties, seeServer properties.

Self-service disk cleanup

A new command-line interface option calledDisk Usageis available in theTroubleshooting Menu. This option allows you to see a list of core dump files and support bundle files. After viewing the list you can choose to delete all of those files through the command-line. For more information about the command-line interface tools, seeCommand-line interface options.