Decision: Initial Configuration
Citrix Receiver must be configured in order to provide access to enterprise resources. The method of configuration varies by Citrix Receiver edition, the form factor of the device, and lastly the access
method (local or remote) that is involved. Several methods may be viable for an organization. The method utilized is contingent on the resources (people, systems, time) available as well as larger
organizational initiatives such as BYOD programs.
The following methods can be used to configure Citrix Receiver:
• Email based discovery – The latest releases of Citrix Receiver can be configured by entering an email address. Email based Discovery requires Citrix StoreFront as well as an SRV DNS record which points to the FQDN of the StoreFront server.
Note: Any DNS platform should support email-based discovery, however only Windows DNS has been explicitly tested.
For remote access, NetScaler Gateway must be utilized with the corresponding SRV record in DNS. A valid server certificate on the NetScaler Gateway appliance or StoreFront server must be present in order to enable email-based account discovery.
• Group policy – Microsoft Group Policy can be used to configure Citrix Receiver. Once startup scripts have been deployed for Citrix Receiver, edit the corresponding script and ensure there is a value for the following parameter: SERVER_ LOCATION=Server_URL. The default value is blank. Provide the URL of the server running Citrix StoreFront. The URL must be in the format http://servername or https://servername.
• Provisioning file – For environments running StoreFront, it is possible to provide users with a provisioning file that contains store information. Provisioning files are exported from the StoreFront console. The file is saved with a “*.cr” extension and can then be placed on a shared network resource, a Receiver for Web site, or other web based resource. The file can then be launched from an endpoint, which automatically configures Citrix Receiver to use the store.
• Manually – If allowed, it is usually possible to configure Citrix Receiver manually. This method should be reserved for administrators or users that have advanced knowledge.
Decision: Updates
Citrix Receiver and plug-ins are in active development. As such, periodic updates are released that provide enhanced functionality or address user issues. As with any actively developed product, the latest version of these products should be deployed to the endpoints so that users benefit from the latest functionality. There are multiple methods available to update Citrix Receiver and, if applicable, associated plug-ins.
• Citrix.com update service – Citrix Receiver can be configured to use Citrix.com as its source for updates. This configuration, which is set inside the StoreFront administration panel, allows receiver and plugin updates to be downloaded automatically from Citrix.com. Since the updates will be downloaded from an external host, this is inefficient approach when a large number of users at the same site request an update.
• Merchandising Server – For platforms that support the Citrix Receiver updater plug-in (Citrix Receiver, Citrix Receiver Enterprise, and Citrix Receiver Mac). The Citrix Receiver updater plug-in communicates with Merchandising Server and identifies package updates for deployment.
• Enterprise software deployment – ESD tools provide a viable alternative to Merchandising Server with receiver updater. Additional thought must be given to updating unmanaged devices and endpoints outside of the corporate firewall, which is a solution that Merchandising Server can address.
• Manual updates – When no automated solution is available, manual methods can be used to update Citrix Receiver. Whether deployed on Receiver for Web site, StoreFront, an internal Citrix Receiver site, or an external site, these options will require user involvement in updating Citrix Receiver and the associated plugins. Due to the involved nature of manual updates coupled with the opportunity for a user mistake, this option should only be considered as a last resort.
Access Layer
The second layer of the design methodology is the access layer, which is defined for each user group.
Creating an appropriate design for the access layer is an important part of the desktop virtualization process. This layer handles user validation through authentication and orchestrates access to all components necessary to establish a secure virtual desktop connection.
The access layer design decisions are based on the mobility requirements of each user group as well as the endpoint devices used.