Citrix Secure Hub For Mac

Although Citrix Secure Hub undefined is launched to work with Android mobile and iOS by Citrix. You can possibly install Citrix Secure Hub on PC for MAC computer. We have to understand the specifications to help you download Citrix Secure Hub PC on MAC or windows computer with not much pain. Citrix Secure Hub is the launchpad for the mobile productivity apps. Users enroll their devices in Secure Hub to gain access to the app store. From the app store, they can add Citrix-developed mobile productivity apps and third-party apps. You can download Secure Hub and other components from the Citrix Endpoint Management downloads page.

downloadWhy can't I download this file?ST_WB_RW_IP_Address Clientless Access ProfileUnder Rewrite tab URL Rewrite
Note: This setting states that any FQDNs or domain suffixes defined under “Clientless Access Domains” in NetScaler Gateway, the NetScaler will rewrite (CVPN) the Web app content accordingly.ns_cvpn_default_inet_url_labelUnder Finding URLs tabAll fields must be emptyUnder Client Cookies tab ST_WB_CKIES_IP_AddressPattern set values
CsrfToken (Index 1)
ASP.NET_SessionId (Index 2)
CtxsPluginAssistantState (Index 3)
CtxsAuthId (Index 4)

NO_RW_IP_Address Clientless Access Profile

NO_RW_IP_Address Clientless Access Profile
Under Rewrite tabAll fields must be empty
Under Finding URLs tabAll fields must be empty
Under Client Cookies tabAll fields must be empty

Note: This Clientless Access Profile should disable all rewrite policies and settings that the NetScaler can apply to web applications. Why? Secure Browse needs to receive the Web URI content ‘untouched’ when traversing through the NetScaler.
This profile mainly applies when mobile users use Secure Web to navigate through Internal/External Web resources.

AC_OS_IP_Address Session Profile

AC_OS_IP_Address Session Profile
Under Client Experience tab Split Tunnel*
*Note: This setting determines whether all MicroVPN traffic between mobile device and NetScaler Gateway should go through the virtual server. If set to OFF (default), all MicroVPN traffic will be intercepted by NetScaler. If set to ON, then, only internal traffic will be intercepted by NetScaler.
For more information, please check this article http://support.citrix.com/article/CTX136914
OFF
Session Time-out (minutes)1440
Clientless AccessON
Clientless Access URL EncodingClear
Plug-in Type*
*Note: This setting determines whether or not, the NetScaler will accept MicroVPN connections. If the value is set to Java, MicroVPN will be disabled at the NetScaler Gateway level.
Windows/Mac OSX
Single Sign-on to Web Applications*
*Note: This setting allows NetScaler and XenMobile Server perform Single Sign-on when users connect remotely to the XenMobile Store but also, to Web links (e.g. Intranet sites) via Secure Web.
ON
Credential Index*
*Note: This setting determines what credentials will be passed over to the XenMobile Server. The “Primary” index is usually associated with the LDAP policy bound to the NetScaler Gateway virtual Server.
If the customer is looking for two-factor authentication (e.g. RSA, Radius, OTP token, etc.), this setting must be changed. Follow the instructions in this article http://support.citrix.com/article/CTX125364 that also applies to the Secure Hub / XenMobile deployment.
Primary
Under Advanced Settings
Split DNS
BOTH
Client ChoicesOFF
Under Security tab
Allow Authorization Action
ALLOW
Secure Browse*
*Note: This is the setting that determines which component (Secure Hub or NetScaler) will rewrite the content in order to properly access Web applications. Secure Browse ON means the NetScaler will not rewrite the content via Client Access (CVPN).
ON
Under Published Applications tab
ICA Proxy

OFF
Account Services Address*
*Note: This value must match exactly the same name defined on the XenMobile Server FQDN. Failure to do so, mobile users will not be able to access the XenMobile Store after enrollment.

XenMobile Server URL (e.g. https://xms.domain.com)

Note: All other settings not overwritten by this Session Profile, the NetScaler Gateway will use the Global Settings and apply them.

AC_AG_PLG_IP_Address Session Profile

AC_AG_PLG_IP_Address Session Profile
Under Client Experience tab
Home Page
XenMobile App Controller – Receiver for Web site URL (Example - https://appc.domain.com/Citrix/StoreWeb)
Split TunnelOFF
Clientless AccessAllow
Clientless Access URL encodingClear
Plug-in TypeWindows/Mac OS X
Single Sign-on to Web Applications*
*Note: This setting allows NetScaler and XenMobile Server perform Single Sign- on when users connect remotely to the XenMobile Store but also, to Web links (e.g. Intranet sites) via Secure Web.
ON
Credential Index*
*Note: This setting determines what credentials will be passed over to the XenMobile Server. The “Primary” index is usually associated with the LDAP policy bound to the NetScaler Gateway virtual Server.
If the customer is looking for two-factor authentication (e.g. RSA, Radius, OTP token, etc.), this setting must be changed. Follow the instructions in this article http://support.citrix.com/article/CTX125364 that also applies to the Secure Hub / XenMobile deployment.
Primary
Under Advanced Settings
Split DNS
BOTH
Client ChoicesOFF
Under Security tab
Allow Authorization Action
ALLOW
Secure Browse*
*Note: This is the setting that determines which component (Secure Hub or NetScaler) will rewrite the content in order to properly access Web applications. Secure Browse ON means the NetScaler will not rewrite the content via Client Access (CVPN).
ON
Under Published Applications tab
ICA Proxy
OFF
Account Services Address*
*Note: This value must match exactly the same name defined on the XenMobile Server FQDN. Failure to do so, desktop users using the NetScaler Gateway Plugin will not be able to access the Receiver for Web site remotely.
XenMobile App Controller URL (e.g. https://appc.domain.com)

Note: All other settings not overwritten by this Session Profile, the NetScaler Gateway will use the Global Settings and apply them.

AC_WB_IP_Address Session Profile

AC_WB_IP_Address Session Profile
Under Client Experience tab
Home Page
XenMobile App Controller – Receiver for Web site URL (Example - https://appc.domain.com/Citrix/StoreWeb)
Clientless AccessON
Single Sign-on to Web Applications*
*Note: This setting allows NetScaler and XenMobile Server perform Single Sign- on when users connect remotely to the XenMobile Store but also, to Web links (e.g. Intranet sites) via Secure Web.
ON
Credential Index*
*Note: This setting determines what credentials will be passed over to the XenMobile Server. The “Primary” index is usually associated with the LDAP policy bound to the NetScaler Gateway virtual Server.
If the customer is looking for two-factor authentication (e.g. RSA, Radius, OTP token, etc.), this setting must be changed. Follow the instructions in this article http://support.citrix.com/article/CTX125364 that also applies to the Secure Hub / XenMobile deployment.
Primary
Under Security tab
Allow Authorization Action
ALLOW
Secure Browse* (This setting is not applicable for Receiver for Web connections)
*Note: This is the setting that determines which component (Secure Hub or NetScaler) will rewrite the content in order to properly access Web applications. Secure Browse ON means the NetScaler will not rewrite the content via Client Access (CVPN).
ON
Under Published Applications tab
ICA Proxy
OFF
Web Interface Address*
*Note: This value must match exactly the same name defined on the XenMobile Server FQDN. Failure to do so, desktop users will not be able to access the Receiver for Web site remotely.
XenMobile App Controller – Receiver for Web site URL (Example - https://appc.domain.com/Citrix/StoreWeb)

Note: All other settings not overwritten by this Session Profile, the NetScaler Gateway will use the Global Settings and apply them.

Additional Resources

Secure
downloadWhy can't I download this file?
  • Go to Developer options on phone and turn on USB debugging
  • 4. To test whether adb is working properly, connect your Android device to your computer using a USB cable and run following command:
    Run the following commands:
    5. If we are capturing ADB logs please use
    adb shell logcat –v threadtime > <logfilename> (replace logfilename with the path to the log file)
    6. Secure/Worx bundle should contain the device properties when we capture the Secure Hub logs and the MDX app logs however in future if we are in a situation where such an option isn’t available we can use
    Steps on how to collect XCODE logs:
    1. Connect your iOS device to your Mac and then open Xcode. Select Window > Devices.

    Citrix Secure Hub Macos

    2. Screen will pop-up which has a list of devices connected to MAC machineCitrix Secure Hub For Mac

    Citrix Secure Hub For Mac Os


    3. Select the device and then collect the logs

    Citrix Secure Hub For Mac Reviews

    Additional Resources

    Comments are closed.