PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (2024)

Overview

With remote work, users need access to internal web-based applications. Providing a better experience means avoiding a VPN deployment model, which often results in the following challenges:

  • VPN Risk 1: Are difficult to install and configure
  • VPN Risk 2: Require users to install VPN software on endpoint devices, which might utilize an unsupported operating system
  • VPN Risk 3: Require the configuration of complex policies to prevent an untrusted endpoint device from having unrestricted access to the corporate network, resources, and data
  • VPN Risk 4: Difficult to keep security policies synchronized between VPN infrastructure and on-premises infrastructure

To improve the overall user experience, organizations must be able to unify all sanctioned apps and simplify user login operations while still enforcing authentication standards.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (1)

Organizations must deliver and secure SaaS, web, Windows, Linux applications, and desktops even though some of these resources exist beyond the confines of the data center and can access resources outside of the data center. Citrix Secure Private Access service provides organizations with secure, VPN-less access to user-authorized resources through Citrix Workspace.

In this proof of concept scenario, a user authenticates to Citrix Workspace using Active Directory, Azure Active Directory, Okta, Google, Citrix Gateway, or a SAML 2.0 provider of their choice as the primary user directory. Citrix Workspace provides single sign-on services for a defined set of enterprise web applications.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (2)

If the Citrix Secure Private Access service is assigned to the Citrix subscription, enhanced security policies, ranging from applying screen-based watermarks, restricting printing/downloading actions, screen grabbing restrictions, and keyboard obfuscation are applied on top of the web applications.

The animation shows a user accessing an internal Sharepoint web application with Citrix-provided SSO and secured with Citrix Secure Private Access service.

This demonstration shows a flow where the user launches the application from Citrix Workspace, which uses the VPN-less connection to the data center. Because the user accesses an internal web application from an external device, the access request must come from within Citrix Workspace.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (3)

This proof of concept guide demonstrates how to:

  1. Setup Citrix Workspace
  2. Integrate a primary user directory
  3. Incorporate Single sign-on for a Sharepoint web application, which is located within the data center
  4. Validate the configuration

The initial steps for setting up the environment is to get Citrix Workspace prepared for the organization, which includes

  1. Once you establish Citrix Secure Private Access service entitlement with your Citrix account team, you will find the Citrix Secure Private Access icon under My Services. For more information,see.
  2. Set up the Workspace URL
  1. Connect toCitrix cloudand log in as your administrator account
  2. Within Citrix Workspace, accessWorkspace Configurationfrom the upper-left menu
  3. From theAccesstab, enter a unique URL for the organization and select Enabled

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (4)

Before users can authenticate to Workspace, aprimary user directorymust be configured. The primary user directory is the only identity the user requires as all requests for apps within Workspace utilize single sign-on to secondary identities.

An organization can use any one of the following primary user directories:

  • Active Directory: To enable Active Directory authentication, a cloud connector must be deployed within the same data center as an Active Directory domain controller by following theCloud Connector Installationguide.
  • Active Directory with Time-Based One Time Password: Active Directory-based authentication can also include multifactor authentication with a Time-based One Time Password (TOTP). Thisguidedetails the required steps to enable this authentication option.
  • Azure Active Directory: Users can authenticate to Citrix Workspace with an Azure Active Directory identity. Thisguideprovides details on configuring this option.
  • Citrix Gateway: Organizations can utilize an on-premises Citrix Gateway to act as an identity provider for Citrix Workspace. Thisguideprovides details on the integration.
  • Okta: Organizations can use Okta as the primary user directory for Citrix Workspace. Thisguideprovides instructions for configuring this option.
  • SAML 2.0: Organizations can use the SAML 2.0 provider of choice with their on-premises Active Directory (AD). Thisguideprovides instructions for configuring this option.

To successfully integrate web apps with Citrix Workspace, the administrator needs to do the following:

  • Deploy Connector Appliance
  • Configure Web app
  • Authorize Web App and configure enhanced security

Deploy Connector Appliance

  • Within Citrix cloud, selectResource Locationsfrom the menu bar

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (5)

  • Within the resource location associated with the site containing the web app, selectConnector Appliances

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (6)

  • In theAdd a Connector Appliancedialog, download the image associated with the appropriate hypervisor and leave this browser window open
  • Once downloaded, import the image into the hypervisor

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (7)

  • When the image starts, it will provide the URL to use to access the console

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (8)

  • Log into the Connector and change the admin password, and set the network IP address
  • Give the appliance a name and login to the domain for that resource location
  • Select Register and copy the registration code

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (9)

  • Return to the Citrix Cloud page and submit the registration code to complete the Connector Appliance setup

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (10)

Configure Web app

  • Within Citrix cloud, selectManagefrom the Secure Private Access tile
  • SelectApplicationsfollowed byAdd an App
  • In the Choose a template wizard, selectSkip

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (11)

  • In theApp detailswindow, selectInside my corporate network
  • Specify HTTP/HTTPS as theApp Type
  • Provide aApp nameand description for the application
  • (optionally) Select Direct Access to enable access directly via an FQDN resolvable via the public Internet. If selected, you will need to upload the pertinent SSL certificate in .pfx or .pem format. Also, you will need to map a CNAME record for the site FQDN to the Citrix Gateway service
  • Enter theURLfor the web application
  • Add additionalrelated domainsas necessary for the web application
  • Add a customApp iconif desired
  • SelectNext

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (12)

  • In theSingle Sign-Onwindow, select the appropriate SSO option for the web application.
    This often requires help from the web app owner.
    You will have 5 SSO choices to choose from:
  1. Basic: If your backend server presents you with a basic-401 challenge, choose Basic SSO
  2. Kerberos: If your backend server presents you with negotiate-401 challenge, choose Kerberos SSO
  3. Form-Based: If your backend server presents you with an HTML form for authentication, choose Form-based SSO
  4. SAML: Choose SAML for SAML-based SSO into web applications. Enter the configuration details for SAML SSO type.
  5. No SSO: Use no SSO option when you do not need to authenticate the user on the backend server
  • SelectBasic SSOandUser Principal Name (UPN)as username format
  • SelectNext

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (13)

  • In theApp Connectivitywindow, select the Resource Location, where you installed the Connector Appliance earlier, for the URL and Related Domain entries (and verify that your connectors are up)
  • SelectSave

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (14)

  • SelectFinish

Authorize Web App and configure enhanced security

  • Within Secure Private Access menu, selectAccess Policies
  • In the Access Policy section, selectCreate policy
  • Enter thePolicy nameand a briefPolicy description
  • In theApplicationsdrop-down list, search for “The Hub (Intranet)” and select it

NOTE

You can create multiple access rules and configure different access conditions for different users or user groups within a single policy. These rules can be applied separately for HTTP/HTTPS and TCP/UDP applications. For more information on multiple access rules, seeConfigure an access policy with multiple rules.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (15)

  • SelectCreate Ruleto create rules for the policy
  • Enter the rule name and a brief description of the rule, and selectNext

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (16)

  • Add the appropriate users/groups who are authorized to launch the app, and selectNext

NOTE

Click + to add multiple conditions based on the context.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (17)

  • Specify if the HTTP/HTTPS app can be accessed with or without restrictions
    The below screenshot has all restrictions configured.
    Please note that Anti Key-logging and Anti Screen-Capturing require Citrix Workspace desktop clients.
  • Specify the TCP/UDP apps action
    The below screenshot denies access to TCP/UDP apps.
  • SelectNext

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (18)

  • The Summary page displays the policy rule details
    Verify the details and selectFinish

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (19)

  • In theCreate policydialog, verify thatEnable policy on saveis checked, and selectSave.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (20)

  • Log into Citrix Workspace as a user
  • Select the configured web application
  • The user automatically signs in to the app
  • The appropriate enhanced security policies are applied

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (21)

Enhanced Security Policies Failing

Users might experience the enhanced security policies (watermark, printing, or clipboard access) fail. Typically, this happens because the web application uses multiple domain names. Within the application configuration settings for the web app, there was an entry forRelated Domains.

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (22)

The enhanced security policies are applied onto those related domains. To identify missing domain names, an administrator can access the web app with a local browser and do the following:

  • Navigate to the section of the app where the policies fail.
  • In Google Chrome and Microsoft Edge (Chromium version), select the three dots in the upper right side of the browser to show a menu screen.
  • SelectMore Tools.
  • SelectDeveloper Tools
  • Within the developer tools, selectSources. This provides a list of access domain names for that application section. To enable the enhanced security policies for this portion of the app, those domain names must be entered into therelated domainsfield within the app configuration. Related domains are added like the following*.domain.com

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (23)

PoC Guide: Secure Access to Internal Web Applications and Citrix Secure Private Access (2024)

References

Top Articles
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5593

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.