Professional Documents
Culture Documents
How Citrix Xenapp Works: Gunnalag Leave A Comment Go To Comments
How Citrix Xenapp Works: Gunnalag Leave A Comment Go To Comments
How Citrix Xenapp Works: Gunnalag Leave A Comment Go To Comments
2. User Rights
3. Local Web Configuration details
5. By launching ICA file user connects to the XenApp server. Below actions take place
during connection establishment
1. Client and Server determine the encryption levels and other capabilities
2.
6. XenApp server validates that RDS (Remote Desktop Services)/ TS (Terminal
Services) Licenses are available
1. If Licenses are available then further connection process proceeds
7. XenApp server passes user credentials to AD and confirms the authentication
1. Verifies if user has access to the Server and Application
8. XenApp server Logons the User, Finds the User profile and Loads it. As part of this
XenApp server does below actions
1. downloads the user roaming profile from the profile/remote server to the XenApp
server, if
1. a copy of the roaming profile doesnt already exist locally
2. the roaming profile on the profile store is newer than the locally existing
copy of the user profile
3.
9. XenApp server checks out a user license from Citrix License Server (over port
27000)
1. Verifies the availability of Citrix XenApp ConCurrent User License to allow the
Citrix session creation
2. An Error message is displayed if licenses are not available.
10. XenApp server queries AD for user GPOs (including logon scripts) and applies them
in the user session
1. Also, applies additional GPO extensions like
1. Folder Redirection
2. Security Policies
3. GPO software/application deployment for user specified
4. Entries found in Run keys
5. User Logon Scripts
6.
7.
11. XenApp server then applies the configured Citrix Policies and Settings, which
include
1. Drive Mapping
2. Session Printers and their Auto-Creation
3. other Citrix User Policies
12. XenApp servers runs the Startup Menu Applications for the user session
1. Any applications or scripts in the users Startup folder are executed.
13. Then User gets the final and fully loaded session on their client device via client
software over ICA protocol
14.
Pictorial Representation of the above steps: (follow the numbering for the flow directions)