Integrate with Citrix Gateway and Citrix ADC 编辑
Use Citrix Gateway with StoreFront to provide secure remote access for users outside the corporate network and Citrix ADC to provide load balancing.
Plan gateway and server certificate usage
Integrating StoreFront with Citrix Gateway and Citrix ADC requires a plan for gateway and server certificate usage. Consider which Citrix components are going to require server certificate(s) within your deployment:
- Plan to obtain certificates for Internet-facing servers and gateways from external certificate authorities. Client devices may not automatically trust certificates signed by an internal certificate authority.
- Plan for both external and internal server names. Many organizations have separate namespaces for internal and external use—such as
example.com
(external) andexample.net
(internal). A single certificate can contain both of these kinds of name by using the Subject Alternative Name (SAN) extension. This is not normally recommended. A public certificate authority will only issue a certificate if the top-level domain (TLD) is registered with IANA. In this case, some commonly used internal server names (such as example.local) cannot be used, and separate certificates for external and internal names are required anyway. - Use separate certificates for external and internal servers, where possible. A gateway may support multiple certificates, either by binding a different certificate to each interface.
- Avoid sharing certificates between Internet-facing and non-Internet-facing servers. These certificates are likely to be different—with different validity periods and different revocation policies than certificates issued by your internal certificate authorities.
- Share “wildcard” certificates only between equivalent services. Avoid sharing a certificate between different types of server (for example StoreFront servers, and other kinds of servers). Avoid sharing a certificate between servers which are under different administrative control, or which have different security policies. Typical examples of servers which provided equivalent service are:
- A group of StoreFront servers and the server that performs load balancing between them.
- A group of Internet-facing gateways within GSLB.
- A group of Citrix Virtual Apps and Desktops controllers, which provide equivalent resources.
- Plan for hardware-secured private key storage. Gateways and servers, including some Citrix ADC models, can store the private key securely within a hardware security module (HSM) or Trusted Platform Module (TPM). For security reasons, these configurations are not usually intended to support sharing of certificates and their private keys, Consult the documentation for the component. If implementing GSLB with Citrix Gateway, this may require each gateway within GSLB to have an identical certificate, which contains all the FQDNs you wish to use.
For more information about securing your Citrix deployment, see the white paper End-To-End Encryption with Citrix Virtual Apps and Desktops and the Citrix Virtual Apps and Desktops Secure section.
Configure StoreFront Log On when authentication is disabled on Citrix Gateway VIP
Log on to StoreFront when authentication is disabled on Citrix Gateway VIP. This procedure works in two scenarios: Internal networks. App launch fails from remote locations because STAs cannot be used when authentication is disabled on the Citrix Gateway if the X-Citrix-Gateway header is getting passed to StoreFront. Citrix Receiver for Web. Receiver clients do not authenticate if authentication is not enabled at the Citrix Gateway VIP.
Changes on the StoreFront Server
- Disable the Require Token Consistency field:
- StoreFront 3.0
- Edit the
web.config
file for the store website. For example, if a StoreFront store name isNoAuth
, theweb.config
file in the StoreFront server has the path inetpub\wwwroot\Citrix\NoAuth.
- Edit the
Locate the following line in the
web.config
file and change the value from True to False. Before<resourcesGateways requireTokenConsistency="true">
After<resourcesGateways requireTokenConsistency="false">
Note:
On StoreFront 3.x, Require Token Consistency is a checkbox in the GUI. For more information, see Advanced store settings.
Save the
web.config
file and then restart the IIS service.
- StoreFront 3.0
Open the Citrix StoreFront Management console.
Click Manage Receiver for Web Sites for the web.
Select the corresponding Citrix Receiver for Web site, click Configure and then select Authentication Methods.
- Ensure that the Pass-through from Citrix Gateway option is cleared.
Note:
Citrix Gateway and Enable Remote Access are assumed to be set up on the StoreFront server.
Changes on the Citrix Gateway
Open the Citrix Gateway virtual server.
Click the Authentication tab and ensure that Enable Authentication check-box is cleared.
Bind the corresponding session policy to the Citrix Gateway virtual server.
Test the connection.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论