Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

 
This document will assume you have already set up storefront (I shall cover setup of Storefront in another document.)
It will also assume you have installed Netscaler(ADC) appliance and done initial configuration in terms of, licensing, ip, subnet, hostname etc:
Image Removed
CA and server certificates.
Because the Microsoft Certificate Server is known to Active Directory the trusted CA certificate is automatically installed on all domain-joined systems. The engineers then have to manually add the trusted CA certificate to non-domain-joined systems including domestic PCs, thin clients, tablets and smart phones
On the Microsoft Certificate Server (Usually the domain controller)
1. Run mmc and load the Certification Authority Snap-in.
Image Removed
Image Removed
2. Right click the authority > All Tasks > Back up CA.
Image Removed
3. Back up the Private key and CA certificate to a convenient location.
Image Removed
4. Create a password.
Image Removed
5. Click Next.
6. Click Finish.
The backup creates a .p12 file with the name of your Certificate authority.
Image Removed
On the NetScaler GUI
To import the backed up key and certificate, complete the following steps:
1. Go to Traffic Management > SSL > Tools > Import PKCS#12.
Image Removed
2. Output file name is xxxxx.pem in the /flash/nsconfig/ssl folder on the appliance. PKCS12 File is the p12 backup file created.* Password is the password used during the backup
Image Removed
*NOTE: By using the dropdown arrows where it says Choose File, it is possible to read the .p12 file from the local PC/Server where you did the Backup.
Image Removed
Image Removed
Install the CA certificate
Install the CA certificate if you want to use SSL to communicate from the NetScaler Gateway to your StoreFront.
1. Go to Traffic Management > SSL > Certificates > CA Certificates.
Click on Install at the top
Image Removed
Type in the a name for the key-pair.
For the certificate file name, I found I had to select the p12 file I had saved locally.
Image Removed
Click on Install
Image Removed
Create the server certificate
To create the server certificate, complete the following steps:
1. Go to Traffic Management > SSL > Getting Started > Server Certificate Wizard.
Image Removed
First part gets you to create an RSA encryption key.
For my test setup I left the Public Exponent Value and Key format as the defaulted F4 and PEM.
Image Removed
For the CSR I left Key Format defaulted to PEM and Digest Method as SHA1
Image Removed
The common name will be the same as the FQDN for the Citrix Gateway name
Here I left the Key Format and Validity Period as Defaults
Image Removed
For Serial Key File Format browse appliance for ns-root.srl
Image Removed
If you get the green tick it means you have installed the Server certificate successfully
Image Removed
You can check for it under Traffic Management > SSL >Certificates > Server Certificates
Image Removed
Setup Citrix Gateway for integration with Storefront.
Select XenApp and XenDesktop, and click on Get Started
Image Removed
Select Storefront at the top of the Setup Wizard Page:
Image Removed
Type in the FQDN and IP address of your Citrix Gateway: (Also add this to your DNS records)
Image Removed
Select the Server certificate you created (in previous chapter) or one you have installed.
Image Removed
Next you will be ask for the details of your Storefront Server:
You only need to specify FQDN for the server at this point
Image Removed
You can check the FQDN of your Storefront server under Stores > Receiver for websites on you Citrix StoreFront GUI.
Image Removed
Click on Retrieve Stores.
If you are presented by this error message..
Image Removed
Then you will need to enter the web path manually. Again you can get this information from here:
Image Removed
And enter under Receiver for Web Path
Image Removed
The Secure Ticket Authority (STA) is an XML web service that exchanges XenApp server information for randomly generated tickets. It is used to control access for a Citrix Secure Gateway server.
Click on Test STA.
Image Removed
The STA (Secure Ticket Authority) status should show as should show as up.
Troubleshooting STA
If the STA status is showing as down, check your STA server (This is the same server as your delivery controller) is up. Also check the Manage Citrix Gateway, on your Storefront GUI is configured correctly
Check the Gateway FQDN is correct,
Image Removed
Make sure the URL for the STA server is also correct.
Image Removed
And make sure you have correctly specified DNS Name server correctly on the ADC
Image Removed
Next you will be asked for the Authentication server details. This will usually be your domain controller details.
Image Removed
Remember to test the connection to your LDAP server
Also set the Server Logon Name Attribute as sAMAccountName:
Image Removed
And your Citrix Gateway Virtual server should be up and running.
Image Removed
Bind the CA certificate to the Citrix Gateway Virtual Sever
Click on Citrix Gateway and then Citrix Gateway Virtual Sever:
Image Removed
Click on the Virtual Server to edit:
Image Removed
This will take you to the virtual server edit screen.
From here Locate Certificate
Image Removed
The server certificate is showing but not the CA
Click No CA Certificate.
Click on Add Binding:
Image Removed
Click to select CA Certificate:
Image Removed
And choose the CA certificate that we installed earlier:
Image Removed
And then Click on Bind:
Image Removed
With the CA cert now bound to the virtual server, click on Done at the bottom of the edit page.
Pre DualShield Test
Before adding DualShield authentication, methods, lets makesure you are able to access your Xenapps via Citrix Gateway access alone.
Simply launch a browser and type in the FQDN address of the Citrix Gateway server.
Image Removed
Logon using your usual windows username and password.
Image Removed
And there we have it. You can see the Citrix Gateway URL in the address bar, followed by the receiver for web path.
Configuring 2fa using DualShield SSO with SAML authentication
Part 1: Initial configuration on the DualShield Administration Console.
Image Removed

Children Display