Citrix Content Collaboration single sign-on configuration guide for Citrix Endpoint Management 编辑

December 4, 2020 Contributed by:  C

Citrix Content Collaboration single sign-on configuration guide for Citrix Endpoint Management

You can configure the Citrix Endpoint Management server and Citrix Gateway to function as a SAML identity provider (IdP) for Citrix Content Collaboration. In this configuration, a user signing on to Citrix Content Collaboration using a web browser or other Citrix Files clients is redirected to the Citrix Endpoint Management environment for user authentication. After successful authentication by Citrix Endpoint Management, the user receives a SAML token that is valid for sign-in to their Citrix Content Collaboration account.


Prerequisites

A working configuration of Citrix Gateway and Citrix Endpoint Management server, which are already configured.


Configure SAML single sign-on for Citrix Files MDX apps

You can use the Citrix Endpoint Management Server along with Secure Hub to single sign-on (SSO) to Citrix Files MDX-wrapped applications. In this scenario, Secure Hub obtains a SAML token for the Citrix Content Collaboration sign-in using Citrix Endpoint Management server as an IdP.

  1. Sign into the Citrix Endpoint Management Server using the URL https://<Citrix Endpoint Management Server>:4443
  2. Go to Configure > ShareFile.
  3. Use the Content Collaboration User Management Tool for user provisioning. See Provision user accounts and distribution groups
    .

SAML configuration for Citrix Files MDX apps is configured. If you want only to allow access to Citrix Content Collaboration using the Citrix Files MDX-wrapped applications, your configuration is complete. However, if you want to configure access for non-MDX Citrix Files clients, continue using the configuration guide.

Configuring Citrix Content Collaboration MDX SSO also enables user provisioning in the Citrix Endpoint Management server. Any users that are part of the selected roles and do not have an account in Citrix Content Collaboration are automatically provisioned by the Citrix Endpoint Management server based on how they first access Citrix Content Collaboration. To learn more about how Citrix Endpoint Management server provisions Citrix Content Collaboration users, see Knowledge Center article CTX200431
.


Configure Citrix Gateway

The following configuration is required on Citrix Gateway to support using Citrix Endpoint Management as a SAML identity provider:

Disable home page redirection

You must disable the default behavior for requests that come through the /cginfra path, so that the original requested internal URL is served to the user instead of the configured home page.

  1. Edit the settings for the Citrix Gateway virtual server that is used for Citrix Endpoint Management sign-ins. Go to Other Settings and clear the check box labeled Redirect to Home Page:

    Citrix Endpoint Management

  2. For the ShareFile setting, add the internal server name and port of your Citrix Endpoint Management server. For example: xms.citrix.lab:8443.
  3. For the AppController setting, enter the address of your Citrix Endpoint Management server. This configuration authorizes requests to the specified URL through the /cginfra path.

Create a Citrix Content Collaboration session policy and request profile

  1. In the Citrix Gateway configuration utility, select Citrix Gateway > Policies > Session in the left navigation pane.
  2. To create a session policy, on the Policies tab, click Add… and then enter ShareFile_Policy as the name.
  3. To create an action, click Add… The Create Citrix Gateway session profile screen opens.
  4. In Name, enter ShareFile_Profile as the session profile name.
  5. On the Client Experience tab:
    • For Home Page, enter none.
    • For Session Time-out, enter 1.
    • Enable Single Sign-on to Web Applications.
    • For Clientless Access, set to On.
    • For Clientless Access Persistent Cookie, set to Allow.
    • For Credential Index, select PRIMARY.

    Citrix Endpoint Management 2

  6. On the Security tab, set Default Authorization Action to Allow.

    Citrix Endpoint Management 3

  7. On the Published Applications tab:
    • For ICA Proxy, select ON.
    • In Web Interface Address, enter your Citrix Endpoint Management server URL as shown.
    • In Single Sign-on Domain, enter your Active Directory domain name.

    Citrix Endpoint Management 4

    When configuring the Citrix Gateway session profile, the domain suffix entered into the Single Sign-On Domain field must match the Citrix Endpoint Management domain alias defined in LDAP.

  8. Click Create to finish defining the session profile.
  9. For the ShareFile_Policy expression, switch to Classic Policy and click Expression Editor.
  10. Specify the expression using a Value of NSC_FSRD and a Header Name of COOKIE.

    Citrix Endpoint Management 5

  11. Click Done, click Create, and then click Close.

    Citrix Endpoint Management 6

Configure policies on the Citrix Gateway virtual server

  1. In the Citrix Gateway configuration utility, select Citrix Gateway > Virtual Servers in the left navigation pane.
  2. In the Details pane, click your Citrix Gateway virtual server and then click Edit.
  3. Go to Configured policies > Session policies and click Add binding.
  4. Select the ShareFile_Policy.
  5. Edit the auto-generated priority number for the inserted policy so that it has the lowest number (highest priority) compared to any other policies listed.

    Citrix Endpoint Management 7

  6. Click Done and then save the running Citrix Gateway configuration.


Modify single sign-on settings

  1. Sign in to your account as a Citrix Content Collaboration administrator.
  2. In the web interface, navigate to Admin Settings > Security > Login & Security Policy and scroll down to the Single Sign-On settings.
  3. Edit the Login URL.

    Citrix Endpoint Management 9

    • Insert the external FQDN of the Citrix Gateway virtual server plus /cginfra/https/ before the Citrix Endpoint Management server FQDN and :8443 after the FQDN.
    • Change the parameter &app=ShareFile_SAML_SP to use the internal name of the application. The internal name is ShareFile_SAML by default, but with each change to your configuration the internal name changes to append a number (ShareFile_SAML2, ShareFile_SAML3, and so on).
    • Add &nssso=true to the end of the URL. For example: https://nsgateway.acme.com/cginfra/https/xms.citrix.lab:8443/samlsp/websso.do?action=authenticateUser&app=ShareFile_SAML&reqtype=1&nssso=true

Each time you edit or recreate the app, the internal application name is updated with a number appended to the name. You also must update the Login URL to reflect the updated application name. The following example shows how the Login URL needs to change when the internal application name changes from “ShareFile_SAML” to “ShareFile_SAML2”

  1. Under Optional Settings, click the Enable Web Authentication check box.

    Citrix Endpoint Management 10

  2. Click Save.


Validate your configuration

  1. Go to https://subdomain.sharefile.com/saml/login. You are redirected to the Citrix Gateway sign-in form.
  2. Sign in with user credentials that are valid for the Citrix Gateway and Citrix Endpoint Management server environment you configured. Your Citrix Files folders at subdomain.sharefile.com appear.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:62 次

字数:10862

最后编辑:7 年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文