Citrix Receiver for Chrome App The Citrix Receiver app provides a great user experience — a secure, contextual, and unified workspace — on any device. It gives you instant access to all your SaaS and web apps, your virtual apps, files, and desktops from an easy-to-use, all-in-one interface. “Please use the Citrix Receiver for Chromebook application to open this URL” This happens even when users have already started the Receiver for Chromebook. One of the districts that we support is looking to roll out Chromebooks later this year if they can overcome one item. They have a software program that requires Java. Chromebooks can't use Java. We already have a citrix infrastructure in place, and I know there is a citrix receiver for chromebooks out there.
Dell Chromebook 13 is designed for professionals. Expect business-class performance from the beautifully designed 13-inch Chromebook that features a vivid Full HD display and connects you to the cloud in just seconds.
Features
- Available with Chrome OS for a fast, versatile PC experience
- Sleek. Smooth. Strong: The carbon fiber finish with magnesium alloy is light, durable, cool to the touch and designed to impress.
- The Google ecosystem at your service: Expect Speed - boots in seconds, Simplicity - easy to use and manage, Secure - with virus protection built-in, encrypted user data and automated updates
- A wide range of magnificence: Bring business projects to full light with industry leading brightness and viewing angles on a 13.3' FHD IPS display with optional scratch-resistant Corning® Gorilla® Glass NBT™ touch display.
- Business class performance - Browse faster using up to core i5 5th gen intel Core processors and experience the performance of Dell's most powerful chromebook
- Battery life: Take your presentation on location knowing you have best-in-class battery life of up to 12 hours.
- Always on time: With a quick start-up time of under 8 seconds, you’ll be up and running in no time.
- Professional looks and productivity: Thoughtfully designed to be sleek and useful with a carbon fiber lid, dark gray alloy chassis, backlit keyboard, glass track pad and 1080p display.
- Work on the go: Securely and easily access servers, mirror desktops and improve lifecycle management with Dell unique IP from KACE, SonicWALL (VPN) and Wyse.
- Manage from the cloud: Easily deploy users and manage access with cloud-based management tools.
- All of the apps: Explore thousands of apps from business to productivity tools on the Chrome Web store.
- Everywhere support: Focus on what matters most with ProSupport Plus. Dell's dedicated staff will have you up and running in no time -and they’re always on call for emergencies.
- Ports & Slots
USB 2.0 Port, Noble Lock Slot, AC Power, HDMI 1.4, USB 3.0 Port, Headphone Jack, Micro SD Card - Dimensions
Height: .51-.84'n Width: 12.93', Depth: 9.03', Weight: 3.23lbs (1.47kg), 3.56lbs (1.62kg) for touch
Installing XenDesktop
Install XenDesktop 7.9 and configure Federated Authentication Service. Refer Citrix Documentation - Federated Authentication Service for more details.
Configuring Active Directory Federation Services (AD FS) and Google Admin Console
- Install and configure Active Directory Federation Service (AD FS) from server manager roles on any Windows 2K8 R2 or Windows 2K12 R2 server. Ensure that, AD FS and AD are not on the same machine.
- Configure AD FS URL in Google Admin console for Single Sign-on as follows:
- Enable Single Sign-on in Google Apps. Log in to your administration console at
http://www.google.com/a/your-domain/. Click Security->Set up Single Sign-on (SSO) - This will take you through to a configuration screen. Select Enable Single Sign-on,
and enter the following values:
Sign-in page URL: https://adfs.yourdomain.com/adfs/ls/
Sign-out page URL: https://adfs.yourdomain.com/adfs/ls/
Change password URL: https://sts.yourdomain.com/startersts/users/password.aspx - Verification certificate: Upload the AD FS Token Signing cert (.cer file) which can be obtained from the AD FS 2.0 Management Console (under Service > Certificates). Click Upload.
- Select “Use a domain specific issuer”.
- Enter network addresses in the Network masks textbox.
- Single sign-on is configured and enabled. Note that the settings take effect immediately. However, it does not affect your login to the Admin Console – that is always accessed by manual login, so that you can get and disable Single Sign-on again.
- Configure SAML Single Sign-on policies on Google Admin Console, refer https://support.google.com/chrome/a/answer/6060880 for more details.
- Configuring AD FS
• Open the AD FS 2.0 Management Console and navigate to Relying Parties section.- Click Add Relying Party Trust
- Choose Enter data about the relying party manually
- Provide a name for the trust (so that you can easily identify it)
- Select AD FS 2.0 profile
- Select Enable support for the SAML 2.0 WebSSO protocol and enter /acs'>https://www.google.com/a//acs in the Relying party SAML 2.0 SSO service URL textbox.
- Enter google.com/a/<your-domains the Relying party identifier
- Complete the wizard steps
- Click on the newly added item and select Properties. Click on the Signature tab and Click Add:
- Add the Token Signing Certificate – it must the AD FS Token Signing Certificate you uploaded to the Google Admin Console AD FS.
- Click OK.
- Click Edit Claim Rules and click Add Rule:
- From the Claim rule drop-down, select Transform an Incoming Claim.
- Provide a Name to the rule, select E-Mail Address as the Incoming Claim Type, set the Outgoing claim type to Name ID and the Outgoing name ID format to Email:
- Complete the Wizard steps.
- Go to your Active Directory. Go to properties of user for whom you want to enable Single sign on and then add the google domain email address of that user in Email field.
- Go to your Active Directory. Go to properties of user for whom you want to enable Single sign on and then add the google domain email address of that user in Email field.
Configuring Citrix NetScaler
- Configure NetScaler SAML to work with AD FS. Before this make sure, XenDesktop works with NetScaler without SSON or FAS configuration.. Refer, http://support.citrix.com/article/CTX133919 to configure NetScaler SAML with AD FS
- On successful completion of all the above steps, you are redirected to AD FS page on entering the SF URL
Configuring Single Sign-on on Chromebook
- Chromebook should be a managed Chromebook
- Install and configure SAML SSO for Chrome app extension on Chrome devices. Refer to the Google website for more information. This extension retrieves SAML cookies from browser and provides to Citrix Receiver. This extension needs to be configured with the following policy to allow Receiver to get SAML cookies:
{
'whitelist' : {
'Value' : [
{
'appId' : 'haiffjcadagjlijoggckpgfnoeiflnem',
'domain' : 'saml.yourcompany.com'
}
]
}
} - If you are repackaging Citrix Receiver for Chrome, change the appId. In addition, change the domain to your company's SAML IdP domain.
- Configure Receiver to user NetScaler Gateway configured for SAML logon. This enables users to use the NetScaler Gateway configured for SAML logon.
- Login to Chromebook using managed user which will redirect you to AD FS page for the first time. user has to enter the password twice for the first time.
- After successful login, you can access the XenDesktop resources without having to re-enter the credentials. providing any credentials.