Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Relation between Citrix Receiver server URL address and IE Proxy setting?

Posted on 2014-09-10
3
Medium Priority
?
422 Views
Last Modified: 2014-09-30
Hello there,

I would like to know the relation between Citrix Receiver server URL address and IE Proxy setting? I need to understand this as there has been lot of SD tickets generated from mulitple sites where the Citrix Online Plugin pop-up "The server has invalid root certificate, so this may be a malicious server. Connection dropped"

I have added the URL to the trusted sites in IE, but still the pop-up appears.

Please advise.

Thanks and Regards
0
Comment
Question by:goprasad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 23

Accepted Solution

by:
rhandels earned 2000 total points
ID: 40314375
For as far as i'm aware there is no relation between those 2 settings.
Do all users get this setting or when a user does get this setting, will it never work for him or just this once and after he retries it does work?

What happens if the user refreshes the page using Shift + F5 (info is not taken out of cache then to refresh). The only thing i can think of is that the certificate chain isn't trusted by all of your machines. Is this a self signed certificate or created by your own PKI and certificate server??

Adding it to the trusted sites doesn't make the certificate trusted.
0
 

Author Comment

by:goprasad
ID: 40348144
Sorry for the delay its signed wild card certificate
0
 
LVL 23

Expert Comment

by:rhandels
ID: 40348282
Sorry for the delay its signed wild card certificate

What is the wild card certificate? Is it a certificate from a central security organisation like verisign?? Even if you use a root certificate, if no root certificate is in the local certificate store it will not be trusted,
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following article is comprised of the pearls we have garnered deploying virtualization solutions since Virtual Server 2005 and subsequent 2008 RTM+ Hyper-V in standalone and clustered environments.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question