Citrix

Produktdokumentation



Ganzes Dokument herunterladen

Device Actions

Oct. 08, 2015

When users install Citrix Receiver on their device, when they log on for the first time, App Controller registers the device. Then, the device is included in the App Controller inventory and appears on the Devices tab in the App Controller management console. The inventory displays all devices that connect to App Controller from Receiver. For each device, the list provides the following information:
  • Type of device with which the user logs on
  • Operating system of the user device
  • Model of the user device
  • Name of the user device
  • User ID of the person who owns the device
  • Last time the user logged on with Receiver
  • Action you can take on the device

For each device in the list, you can perform the following actions for each device:

  • Erase application data and documents from the device. If users lose an iOS or Android device and do not locate the device in a specified period of time, or if the user leaves the organization, you can erase application data and ShareFile documents from the user device.
  • Stop erasing data and documents the device. If you determine that the device is safe, you can stop erasing the data and documents on the device. Users can access their apps and ShareFile documents when you stop erasing.
  • Lock and unlock the device. If users lose an iOS or Android device, you can lock applications on the device that App Controller delivers, which prevents unauthorized access to the applications. You can later unlock the same applications.
  • Delete the device. You can delete a device as a part of device inventory maintenance, if, for example, the device is lost or destroyed.

The lock and erase functions take effect after Receiver polls App Controller. The polls occur every 60 minutes by default.

An erased or locked device continues to appear in the inventory in the management console. If users do not need access to the device, you can remove the device from the inventory. When you erase application data from the device, the device listing appears in All Devices and Erased. If you lock a device, the listing appears in All Devices and Locked. These lists allow you to see at a glance the devices that are currently active and the devices that might be compromised.

The following table shows the icons that you can use to perform the preceding actions for all devices, including devices that are connected to App Controller:

Icon Icon name Definition
Delete app.

Delete

Used for deleting a user device from the inventory.

Lock a user device.

Lock

Used to lock a user device.

Unlock user device.

Unlock

Used to unlock a user device after you have locked it.

Wipe a user device.

Erase

Used to erase application data and documents from the user device.

Restore data and docs.

Stop erasing

Used to stop erasing application data, and documents on the user device.

Locking and Unlocking Applications on User Devices

You can lock and unlock user devices in the App Controller management console. This action prevents users from connecting to applications in Citrix Receiver.

To lock applications on a user device

  1. In the App Controller management console, click the Devices tab.
  2. In the center pane, hover over a user device and then under Actions, click the lock icon.
  3. Click Yes to confirm that you want to lock the device.

    The user device appears in the All devices and Locked lists.

To unlock applications on a user device

  1. In the App Controller management console, click the Devices tab.
  2. In the left pane, click Locked.
  3. Hover your mouse over the user device and then under Actions, click the unlock icon.
  4. Click Yes to confirm that you want to unlock the device.

    The user device is removed from the Locked list.

Back to Top