Solved

Difference between Citrix ICA client pass thru authentication and sson?

Posted on 2014-09-09
1
466 Views
Last Modified: 2014-09-10
Hello there,

What is the difference between Citrix ICA client pass thru authentication and sson?

Please advise.

Thanks and Regards
0
Comment
Question by:goprasad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
Pedro Gama earned 500 total points
ID: 40311852
Hi,

Basically during Pass-through authentication the user credentials are passed to a Web Interface site and then to the XenApp/XenDesktop servers, preventing users from having to explicitly authenticate at any point during the Citrix application launch process.  
The user's  credentials are actually never exchanged. Instead, the signed hash is provided to IIS, proving that said user had already been authenticated at the Windows desktop.  The web interface user uses the user’s AD context (sometimes referred to as a token) to retrieve the user’s AD group membership and pass this list of groups directly to the XML service for authentication.  At this point, the user has successfully passed through to the Web Interface site, and can now view his/her Citrix resources.

The Citrix Receiver makes sure the user is fully passed through to the application or desktop through a process called SSONSVR.exe, which is the single sign-on component of the client. This process is fully responsible for passing the user credentials to XenApp or XenDesktop and without it pass-through authentication would not work.

There's a very interesting citrix blog talking about pass-through-authentication here:

http://blogs.citrix.com/2013/04/01/explaining-citrix-pass-through-authentication/

Have a read!

Hope it helps
PG
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
2-Factor authentication VPN for staff and suppliers 6 56
CITRIX 1 56
Getting invalid Syntax SQL. 3 33
Citrix Netscaler - management IP that floats with the active? 2 33
#Citrix #Internet Explorer #Enterprise Mode #IE 11 #IE 8
Citrix XenDesktop 7.6 Citrix Policies Disable Peripherals
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question