Archive
Bug in Citrix Receiver 13 for Linux – cannot connect with multiple STAs – @CitrixSupport, @CitrixReceiver, #Citrix
Ok, we’ve had some issues with Citrix Receiver version 13 for Linux.. and it’s not just ONE issue. I found one that I thought I just have to share… so it’s lab Saturday for me at the office in a true geek manner with two XenClients and my favourite MacBook!
I guess that some of you have tried the Linux Receiver and knows how hard it is to get working, especially on a 64-bit distribution of Linux like Ubuntu 12.04 LTS och 13.10 LTS.
If you follow these instructions you can get it onto the device and then login through a browser (local Receiver UI may still not be full functioning!)..
https://help.ubuntu.com/community/CitrixICAClientHowTo
What I’m about to show you is that it’s not just only getting Receiver on the device and ensuring that the SSL certificates are trusted. You then have to be able to use it as well externally through a NetScaler Gateway (NSG) into StoreFront and your XenApp/XenDesktop VDA’s.
Just assume that you have a production environment that consists of a NetScaler Gateway and a StoreFront server, if you then in StoreFront have configured your NetScaler Gateway correctly and the appropriate STA configuration (with MULTIPLE STA’s) then you will notice that you can’t launch a session.
BTW, the recommendation from Citrix is to use multiple STA’s, right! See this from edocs:
For all deployments, if you are making resources provided by XenDesktop, XenApp, or VDI-in-a-Box available in the store, list on the Secure Ticket Authority (STA) page URLs for servers running the STA. Add URLs for multiple STAs to enable fault tolerance, listing the servers in order of priority to set the failover sequence. If you configured a grid-wide virtual IP address for your VDI-in-a-Box deployment, you need only specify this address to enable fault tolerance.
Important: VDI-in-a-Box STA URLs must be entered in the form https://serveraddress/dt/sta in the Add Secure Ticket Authority URL dialog box, where serveraddress is the FQDN or IP address of the VDI-in-a-Box server, or the grid-wide virtual IP address.
The STA is hosted on XenDesktop, XenApp, and VDI-in-a-Box servers and issues session tickets in response to connection requests. These session tickets form the basis of authentication and authorization for access to XenDesktop, XenApp, and VDI-in-a-Box resources.
If you want XenDesktop, XenApp, and VDI-in-a-Box to keep disconnected sessions open while Citrix Receiver attempts to reconnect automatically, select theEnable session reliability check box. If you configured multiple STAs and want to ensure that session reliability is always available, select the Request tickets from two STAs, where available check box. Read more…
#Citrix Knowledge Center Top 10 – March 2013
Citrix Support is focused on ensuring Customer and Partner satisfaction with our products.
One of our initiatives is to increase the ability of our Partners and Customers to leverage self-service avenues via our Knowledge Center.
Find below the Citrix Knowledge Center Top 10 for March 2013.
Top 10 Technical Articles
Article Number | Article Title |
---|---|
CTX129229 | Recommended Hotfixes for XenApp 6.0 and Later on Windows Server 2008 R2 |
CTX129082 | Application Launch Fails with Web Interface using Internet Explorer 9 |
CTX804493 | Users Prompted to Download ICA File, Launch.ica, Instead of Launching the Connection |
CTX132875 | Citrix Receiver Error 2320 |
CTX105793 | Error: Cannot connect to the Citrix server. Protocol Driver Error |
CTX127030 | Citrix Guidelines for Antivirus Software Configuration |
CTX115637 | Citrix Multi-Monitor Configuration Settings and Reference |
CTX133997 | Citrix Receiver 3.x – Issues Fixed in This Release |
CTX325140 | Manually and Safely Removing Files after Uninstalling the Receiver for Windows |
CTX101644 | Seamless Configuration Settings |
Top 10 Whitepapers
Article Number | Article Title |
---|---|
CTX131577 | XenApp 6.x (Windows 2008 R2) – Optimization Guide |
CTX132799 | XenDesktop and XenApp Best Practices |
CTX101997 | Citrix Secure Gateway Secure Ticket Authority Frequently Asked Questions |
CTX136546 | Citrix Virtual Desktop Handbook 5.x |
CTX136547 | StoreFront Planning Guide |
CTX133185 | Citrix CloudGateway Express 2.0 – Implementation Guide |
CTX129761 | XenApp Planning Guide – Virtualization Best Practices |
CTX134081 | Planning Guide – Citrix XenApp and XenDesktop Policies |
CTX130888 | Technical Guide for Upgrading/Migrating to XenApp 6.5 |
CTX122978 | XenServer: Understanding Snapshots |
Top 10 Hotfixes
Article Number | Article Title |
---|---|
CTX136714 | Hotfix XS61E016 – For XenServer 6.1.0 |
CTX132122 | Hotfix Rollup Pack 1 for Citrix XenApp 6.5 for Microsoft Windows Server 2008 R2 |
CTX126653 | Citrix Online Plug-in 12.1.44 for Windows with Internet Explorer 9 Support |
CTX136483 | Hotfix XS61E014 – For XenServer 6.1.0 |
CTX133882 | Hotfix Rollup Pack 2 for Citrix XenApp 6 for Microsoft Windows Server 2008 R2 |
CTX133066 | 12.3 Online Plug-In – Issues Fixed in This Release |
CTX136253 | Hotfix XS61E010 – For XenServer 6.1.0 |
CTX136482 | Hotfix XS61E013 – For XenServer 6.1.0 |
CTX136085 | Hotfix XA650R01W2K8R2X64061 – For Citrix XenApp 6.5 |
CTX136674 | Hotfix XS61E012 – For XenServer 6.1.0 |
Top 10 Presentations
Article Number | Article Title |
---|---|
CTX135521 | TechEdge Barcelona 2012 PowerPoint and Video Presentations – Reference List |
CTX129669 | TechEdge 2011 – Overview of XenServer Distributed Virtual Switch/Controller |
CTX121090 | Planning and implementing a Provisioning Server high availability (HA) solution |
CTX133375 | TechEdge 2012 PowerPoint and Video Presentations – Reference List |
CTX135356 | TechEdge Barcelona 2012 – Understanding and Troubleshooting ICA Session Initialisation |
CTX135358 | TechEdge Barcelona 2012 – XenDesktop Advanced Troubleshooting |
CTX133374 | TechEdge 2012 – Monitoring your NetScaler Traffic with AppFlow |
CTX135361 | Troubleshooting Tools: How to Isolate and Resolve Issues in your XA and XD Env Rapidly |
CTX135360 | TechEdge Barcelona 2012 – Planning, Implementing and Troubleshooting PVS 6.x |
CTX135357 | TechEdge Barcelona 2012 – Implementing and Troubleshooting SF and Rec for Windows |
Top 10 Tools
Article Number | Article Title |
---|---|
CTX122536 | Citrix Quick Launch |
CTX135075 | Citrix Diagnostics Toolkit – 64bit Edition |
CTX130147 | Citrix Scout |
CTX111961 | CDFControl |
CTX106226 | Repair Clipboard Chain 2.0.1 |
CTX109374 | StressPrinters 1.3.2 for 32-bit and 64-bit Platforms |
CTX124406 | StressPrinters 1.3.2 for 32-bit and 64-bit Platforms |
CTX113472 | Citrix ICA File Creator |
CTX123278 | XDPing Tool |
Continue reading here!
//Richard
#Citrix #StoreFront Slowness, Join and Replication issue – check list!
Ok, I guess that you may have seen issue with StoreFront before… and it you have not then good for U!
But in the case that you have experience it here are a couple of things that you can do and hopefully it solves your issue with slow StoreFront console startup, server join issues or replication issues. Sometimes I’ve seen that the join, replication and slowness is ok and the process goes through. But then all of a sudden you get an error and the propagation fails… and this can be because of a timeout in the StoreFront process that you’ve initiated.
I already assume that you’ve checked the basic stuff.. that the servers can reach each other (ping server name and FQDN etc. and that there are no FW issues)….
You may have an issue because you/your server cannot reach the Internet, and some of the components of the product is signed with SSL certificates and StoreFront will try to perform a check whether the publishers certificate is ok or not. So if your servers are behind a proxy serevr that you usually configure in your browser to be able to connect from your companies internal network to the Internet then you should do the following.
1. Log on to your first StoreFront server and create a copy of the original aspnet.config file under C:\Windows\Microsoft.NET\Framework\v2.0.50727 (verify which framework version that your app is using in IIS and modify that appropriate aspnet.config file, more info about this change can also be found here and is for Web Interface but is also applicable to StoreFront)
2. Open Notepad as an Admin (if you have UAC of course enabled) and open the asp net.config file
It will have the content as described by the picture above, add this line to it: <generatePublisherEvidence enabled=”false”/>
SSO to StoreFront not working in CVPN mode – #Citrix, #NetScaler, #StoreFront
Single Sign-On from Access Gateway to StoreFront not working in CVPN mode
There is yet another “thing” to have in mind when setting up Access Gateway and StoreFront in CVPN mode!
It’s been an interesting day (or days/weeks/months I must admit) with some “issues” with a NetScaler ADC, Access Gateway with CVPN profiles and StoreFront 1.2. And one thing that we have been struggling with was Single Sign-On to StoreFront when we had the AG configured for CVPN access. And it was just this environment where I’ve seen this issue!!
After a lot of troubleshooting the Citrix guys came up with an explanation on why SSO from AG doesn’t work in this specific environment! And it’s not an obvious one to find I must say… but I now understand why it doesn’t work!
So let’s explain the design reason for why it doesn’t work (so bear with me, solution at the end!!)…
The following picture tries to give a VERY rough picture of how it could look like, clients on the Internet on the left, then a NetScaler ADC with the Access Gateway feature enabled and a vServer configured. This AG vServer has session policies and profiles for ICA proxy (old traditional ICA proxy policy) and the little newer CVPN mode. And YES; I’ve left out a lot of stuff like AD etc. to simplify this picture A LOT…
The overall idea and config is that AG authenticates the user and then shall do SSO to StoreFront. The CVPN policy have been created according to all best practices etc. (Citrix CloudGateway Express 2.0 – Implementation Guide).
But SSO still doesn’t work!! If you login through a browser when having the CVPN policy linked to the vServer you’ll see that authentication works perfectly but then when it tries to passthrough the authentication to StoreFront it fails.
This picture just shows the login to the NetScaler ADC Access Gateway vServer: