![]() Users perceive the overall duration of the process from the time when they click on the icon until the appearance of the application on their desktops. Some other steps may be necessary if other Citrix components (for example, the Citrix Access Gateway) are included in your infrastructure. Windows executes applications included in the Startup menu and finally launches the requested application. Windows then applies any GPOs and XenApp applies any Citrix policies. If the user has a roaming profile, Windows downloads it from the specified location (usually a file server). ![]() XenApp validates that a Citrix license is available. If the authentication is successful, the server queries account details from the AD, including Group Policies ( GPOs) and roaming profiles. Windows Server authenticates the user against the Active Directory ( AD). Windows Server validates that an RDS/ Terminal Server ( TS) license is available. In the handshake process, client and server agree on the security level and capabilities. The Citrix client running on the user’s PC establishes a connection to the session-host server specified in the ICA file. The Web Interface generates an ICA file and passes it to the client (D). ![]() ![]() The user launches an application (A) and the Web Interface queries the Data Collector (B) that returns the least-loaded server for the requested application (C). ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |