Citrix Application Delivery Management service

Release Notes for Citrix ADM service March 01, 2022 Release

This release notes document describes the enhancements and changes, fixed and known issues that exist for the Citrix ADM service release Build March 01, 2022.

Notes

This release notes document does not include security related fixes. For a list of security related fixes and advisories, see the Citrix security bulletin.

What’s New

The enhancements and changes that are available in Build March 01, 2022.

Management and Monitoring

Invite users or groups to ADM from the Azure AD

As a super administrator, you can now invite users or groups to Citrix ADM from the connected Azure AD to Citrix ADM. Before doing so, ensure that the Azure AD is connected to Citrix Cloud, see Connect Azure Active Directory to Citrix Cloud. Earlier, you were only able to invite users with Citrix Identity.

When you select Azure AD as the identity provider, you can specify only Custom Access for the selected user or group. The users can log in to Citrix ADM using their Azure AD credentials. With this feature, you don’t require to create a Citrix Identity for the users who are part of the selected Azure AD. If a user is added to the invited group, you don’t require to send an invite for the newly added user. This user can access Citrix ADM using the Azure AD credentials.

[NSADM-81039]

Certificates and Key files uploaded to ADC are saved by ADM and the information is stored in the ADM database

When you upload certificates and Key files to Cert Store using the SSL Dashboard in the ADM Service GUI, only the metadata and the encrypted contents of the certificate file are saved in ADM Database. The key and password used to decrypt the content are saved in Cloud Wallet.

[NSADM-72475]

New network reports in ADM

The following new network reports are added as the total counters:

  • Authentication Success vs Failures

  • HTTP Authentication Success vs Failures

  • Non-HTTP Authentication Success vs Failures

  • AAA Sessions

  • Current AAA Sessions

  • Current ICAOnly Sessions

  • Current ICAOnly Connections

  • Current ICA(Smart Access) Connections

You can use these counters to add thresholds and receive notifications. For more information see Network reporting.

[NSADM-62239]

Action policy - Configure Bot and WAF notifications with transaction details

In Action Policies, when you configure an action policy, you can now select Bot Violation per Client and WAF Violation per Client options. These options enable you to configure and receive notifications with transaction details such as client IP, total attacks, violation type, and so on.

For more information, see Configure an action policy to receive application event notifications.

[NSADM-80630]

Opt out of Security Advisory Custom Scans

Citrix Application Delivery Management Service UI now allows you to opt out of security advisory custom scans. When you opt out of these Security Advisory Custom scans, the impact of the CVEs that need a custom scan will not be evaluated for your ADC instances in the Security Advisory.

To opt out of Security Advisory Custom Scans, see Custom Scan settings.

[NSADM-80288]

StyleBooks

Use HTML formatting tags in the StyleBook description and header

In the StyleBook definition, you can now include a header field and use HTML formatting tags for the text. You can also include images as part of the header and it will be rendered at the top of the configuration form. This feature allows you to add infographics for the StyleBook users that help in understanding the StyleBook configuration. If you use images in the header, ensure to use base64 encoded image format in the image tag.

name: app-stylebook-with-HTML-tags
namespace: com.examples.stylebooks
version: `1.0`
display-name: `Example App StyleBook`
header: 'This <b> StyleBook </b> defines all the app configuration for <i>Load Balanced Application </i>. The following image describes the target deployment for the app <img id=`b64img` src=`data:image/png;base64,` />'
<!--NeedCopy-->

[NSADM-80699]

Deliver Autoscale applications that are outside of ADC instances’ virtual network or VPC

When application servers and ADC instances are situated on different Virtual networks, VPC Networks, and Subnets, provide the CIDR block of a subnet or VPC where you have application servers. Specify the CIDR block in the Origin Server field while configuring the provision parameters. This way you can deliver apps from the application servers that are situated outside of the ADC instances’ virtual network or VPC network.

Earlier, this feature was available only for the Autoscale groups in AWS, now you can use this feature in Azure and Google Cloud also.

For more information, see:

Release Notes for Citrix ADM service March 01, 2022 Release

In this article