Solved

Need instructions on how to give an Active Directory user access to applications through Citrix 4.5

Posted on 2011-03-10
5
669 Views
Last Modified: 2012-05-11
Need instructions on how to give an Active Directory user access to applications through Citrix 4.5.

I have full administrative access to the Citrix server and Active Directory server as well as the entire domain.

I need instructions on how to give an Active Directory user access to applications through Citrix 4.5.

These instructions need to be detailed, since I don't have any experience configuring Citrix yet.
0
Comment
Question by:Knowledgeable
5 Comments
 
LVL 36

Assisted Solution

by:Carl Webster
Carl Webster earned 200 total points
Comment Utility
http://www.dabcc.com/article.aspx?id=15053

Should be on about the 3rd page.
0
 
LVL 13

Assisted Solution

by:upalakshitha
upalakshitha earned 100 total points
Comment Utility
This is the technet virtuall lab setup.they are with server 2008.but you can improve knoledge in citrix & which'll more helpfull
https://cmg.vlabcenter.com/default.aspx?moduleid=281742e3-2613-42da-bd58-2c3578f039b4
0
 
LVL 36

Assisted Solution

by:Carl Webster
Carl Webster earned 200 total points
Comment Utility
But learning XenDesktop does absolutely nothing for adding users to a published app in XenApp.
0
 
LVL 6

Assisted Solution

by:arunexp
arunexp earned 100 total points
Comment Utility
select the application. right click properties, find the group which have access, go to AD and add the user to the group
0
 
LVL 15

Accepted Solution

by:
Lee Osborne earned 100 total points
Comment Utility
You can change the user access using the Citrix Access Management Console -

Citrix AMC > (Expand) Farm-Name > (Expand) Applications > Right click the application > Properties > Users

Change the 'Select directory type' to 'Operating System User Selector' > Click Add
Change the location to your AD Domain
Enter (or browse for) the AD user or group > OK
OK the application properties window and the change will take effect.

Lee
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

After several days of searching and hunting for limited documentation, I wanted to share this guide to hopefully save someone the hassle of trying to figure this out on their own. I have tested this on Xendesktop 7.1 and PS 4.5 running simultaneous…
#Citrix #Citrix Policies #XenDesktop #VDI #POC #Citrix Univeral Printer Driver #Citrix UPD
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now