Product Documentation

System requirements

May 17, 2017

User device requirements

All devices must meet the minimum hardware requirements for the installed operating system.

Users devices require the Google Chrome operating system (version 50 or later) to access desktops and apps using Citrix Receiver for Chrome. Citrix recommends that you use Citrix Receiver for Chrome with releases from the Google Chrome stable channel. Citrix Receiver for Chrome is supported only on Chrome OS.

Citrix supported server platforms

Citrix Receiver for Chrome supports access to desktops and applications through the following versions of StoreFront. Stores must be accessed through Citrix Receiver for Web sites. Citrix Receiver for Chrome does not support direct access to StoreFront stores, either using the store URL or the XenApp Services URL.

  • StoreFront 2.5 and later
  • Web Interface 5.4

Citrix Receiver for Chrome can be used to access desktops and applications delivered by the following product versions:

  • XenApp and XenDesktop 7.6 and later
  • XenApp 6.5

Secure user connections

In a production environment, Citrix recommends securing communications between Receiver for Web sites and users' devices with NetScaler Gateway and HTTPS. Citrix recommends using SSL certificates with a key size of at least 1024 bits throughout the environment in which Citrix Receiver for Chrome is deployed. Citrix Receiver for Chrome enables user access to desktops and applications from public networks with the following versions of NetScaler Gateway.

  • NetScaler Gateway 10.5 and later
Citrix Receiver for Chrome supports CloudBridge disabling compression and printer compression as well as using HDX Insight analytics to display in CloudBridge Insight Center.
  • CloudBridge 7.4 and later

Secure ICA

Starting with Version 2.1, Citrix Receiver for Chrome supports RC5 (128 bit) encryption.

Note

If any encryption format other than basic is set, Citrix Receiver for Chrome upgrades the encryption format to RC5 (128 bit).

Tip

Citrix recommends that you use a SSL-enabled VDAs for end-to-end SSL encryption.