Technical security overview

Citrix Cloud manages the operation for Citrix Gateway Services, replacing the need for customers to manage the NetScaler Gateway appliance. Citrix Gateway Service is provisioned through Citrix Workspace app.

Citrix Gateway Service provides the following capabilities:

HDX Connectivity: The Virtual Delivery Agents (VDAs) hosting the apps and desktops remain under the customer’s control in the data center of their choice, either cloud or on-premises. These components are connected to the cloud service using an agent called the Citrix Cloud Connector.

DTLS 1.2 protocol support: Citrix Gateway Service supports Datagram Transport Layer Security (DTLS) 1.2 for HDX sessions over EDT (UDP-based transport protocol). The following cipher suites are supported:

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

TLS protocol support: Citrix Gateway Service supports the following TLS cipher suites:

  • TLS1.2-ECDHE-RSA-AES256-GCM-SHA384
  • TLS1.2-ECDHE-RSA-AES-256-SHA384
  • TLS1-ECDHE-RSA-AES128-SHA
  • TLS1.2-AES256-GCM-SHA384
  • TLS1-AES-256-CBC-SHA

Endpoint Management integration: When integrated with Citrix Endpoint Management plus Citrix Workspace, the Citrix Gateway Service provides secure remote device access to your internal network and resources. Onboarding the Citrix Gateway Service with Endpoint Management is fast and simple. The Citrix Gateway Service includes full support of Citrix SSO for apps such as Secure Mail and Secure Web.

Data flow

Citrix Gateway Service is a globally distributed multitenant service. End users use the nearest Point-of-Presence (PoP) where the particular function that they need is available, regardless of Citrix Cloud Control plane geo-selection or the location of the applications being accessed. Configuration, such as authorization meta-data is replicated to all PoPs.

Logs used by Citrix for diagnostic, monitoring, business, and capacity planning are secured and stored in one central location.

Customer configuration is stored in one central location and distributed globally to all PoPs.

Data flowing between the cloud and customer premises uses secure TLS connections over port 443.

Encryption keys used for user authentication and single sign-on are stored in hardware security modules.

Data isolation

The Citrix Gateway Service stores the following data:

  • Configuration data needed for the brokering and monitoring of the customer’s applications – data is scoped by the customer when persisted.
  • TOTP seeds for each user device – TOTP seeds are scoped by customer, user, and device.

Audit and Change Control

Currently the Citrix Gateway Service does not make auditing and change control logs available to customers. Logs are available to Citrix which can be used to audit the activities of end-user and administrator.

Credential handling

The service handles two types of credentials:

  • User credentials: End-user credentials (passwords and authentication tokens) might be made available to the Citrix Gateway Service to perform the following:
    • Citrix Secure Private Access - The service uses the user’s identity to determine access to SaaS and Enterprise web applications and other resources.
    • Single sign-on - The service might have access to the user’s password to complete the SSO function to internal web applications using HTTP Basic, NTLM, or forms-based authentication. The encryption protocol used for password is TLS unless you specifically configure HTTP Basic authentication.
  • Administrator credentials: Administrators authenticate against Citrix Cloud. This generates a one-time signed JSON Web Token (JWT) which gives the administrator access to the management consoles in Citrix Cloud.

Points to note

  • All traffic over public networks is encrypted by TLS, using certificates managed by Citrix.
  • Keys used for SaaS app SSO (SAML signing keys) are fully managed by Citrix.
  • For MFA, the Citrix Gateway Service stores the per-device keys used to seed the TOTP algorithm.
  • To enable Kerberos Single Sign-On functionality, customers might configure Connector Appliance with credentials (user name + password) for a service account trusted to perform Kerberos Constrained Delegation.

Deployment considerations

Citrix recommends that users consult the published best practices documentation for deploying Citrix Gateway Services. More considerations regarding SaaS apps and Enterprise web apps deployment, and network connector are as follows.

Selecting the correct Connector: The correct connector must be selected, depending on the use case:

Use Case Connector Form factor
User Authentication: Active Directory Citrix Cloud Connector Windows software
HDX Connectivity Citrix Cloud Connector Windows software
SaaS apps access Citrix Cloud Connector N/A
Enterprise web apps access Citrix Cloud Connector, Citrix Connector Appliance N/A
Enterprise apps and files delivered by Citrix Endpoint Management Citrix Cloud Connector, Citrix Connector Appliance N/A

Citrix Cloud Connector network access requirements

For information on Citrix Cloud Connector network access requirements, see https://docs.citrix.com/en-us/citrix-cloud/overview/requirements/internet-connectivity-requirements.html

Citrix Gateway Service HDX Connectivity

Using the Citrix Gateway Service avoids the need to deploy NetScaler Gateway within the customer data centers. To use the Citrix Gateway Service, it is a prerequisite to use Citrix Workspace delivered from Citrix Cloud.

Customer best practices

Customers are recommended to use TLS within their network and not enable SSO for applications over HTTP.

Deprecated cipher suites

The following cipher suites are deprecated for enhanced security:

  • TLS1.2-AES128-GCM-SHA256
  • TLS1.2-AES-128-SHA256
  • TLS1.2-AES256-GCM-SHA384
  • TLS1.2-AES-256-SHA256
  • TLS1.2-DHE-RSA-AES-256-SHA256
  • TLS1.2-DHE-RSA-AES-128-SHA256
  • TLS1.2-DHE-RSA-AES256-GCM-SHA384
  • TLS1.2-DHE-RSA-AES128-GCM-SHA256
  • SSL3-DES-CBC3-SHA
  • TLS1-ECDHE-RSA-AES256-SHA
  • TLS1-AES-256-CBC-SHA
  • TLS1-AES-128-CBC-SHA
  • TLS1-ECDHE-ECDSA-AES256-SHA
  • TLS1-ECDHE-ECDSA-AES128-SHA
  • TLS1-DHE-RSA-AES-256-CBC-SHA
  • TLS1-DHE-RSA-AES-128-CBC-SHA
  • TLS1-DHE-DSS-AES-256-CBC-SHA
  • TLS1-DHE-DSS-AES-128-CBC-SHA
  • TLS1-ECDHE-RSA-DES-CBC3-SHA
  • TLS1.2-ECDHE-RSA-AES-128-SHA256
  • TLS1.2-ECDHE-ECDSA-AES128-SHA256
  • TLS1.2-ECDHE-ECDSA-AES256-GCM-SHA384
  • TLS1.2-ECDHE-ECDSA-AES128-GCM-SHA256
Technical security overview