Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

In Citrix 4.5, how can I add applications to a user's Citrix profile?

Posted on 2011-02-23
2
Medium Priority
?
718 Views
Last Modified: 2012-05-11
In Citrix 4.5, how can I add applications to a user's Citrix profile?

Please prvide detailed instructions on how to do this.

While I have a good understanding of Microsoft Windows, I have never configured or used Citrix before. Citrix-Presnetation-Server-conso About-CitrixCitrix-Neighborhood.JPG
0
Comment
Question by:Knowledgeable
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 21

Accepted Solution

by:
snusgubben earned 2000 total points
ID: 34965166
If you have already configured the published application;

Right click the desired Published Application -> Properties -> "Users" -> "Add" -> "Add list of names"

Type in "domain\username" (or "domain\group name")
0
 
LVL 21

Assisted Solution

by:snusgubben
snusgubben earned 2000 total points
ID: 34965188
* You have to do this from the "Citrix Access Management Consol". Not the "Citrix Presentation Server Consol" you have takes screen shot of.
0

Featured Post

Fill in the form and get your FREE NFR key NOW!

Veeam® is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question