Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

In Citrix Presentation Server 4.5, how can I view what applications are assigned to specific users?

Posted on 2011-02-23
2
Medium Priority
?
528 Views
Last Modified: 2012-05-11
In Citrix Presentation Server 4.5, how can I view what applications are assigned to specific users?

I have full administrator access to the Server 2003 server that has Citrix Presentation Server 4.5 installed on it.

Where exactly do I need to go so that  I view what applications are assigned to specific users?
0
Comment
Question by:Knowledgeable
2 Comments
 
LVL 21

Accepted Solution

by:
snusgubben earned 1000 total points
ID: 34964887
Open Citrix Access Management Consol

Expand Presentation Server > Farm name > Click on the desired application

In the middle pane -> Change view -> Configured Users
0
 
LVL 1

Assisted Solution

by:vinitogupta
vinitogupta earned 1000 total points
ID: 34965407
0

Featured Post

Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question