Using Device Certificates for Authentication
Citrix Gateway supports device certificate check that enables you to bind the device identity to a certificate’s private key. The device certificate check can be configured as part of classic or advanced EPA policies. In classic EPA policies, device certificate can be configured only for preauthentication EPA.
If you install two or more device certificates on Citrix Gateway, users need to select the correct certificate when they start to log on to Citrix Gateway or before the endpoint analysis scan runs.
When you create the device certificate, it must be an X.509 certificate.
Important: By default, Windows mandates admin privileges for accessing device certificates. To add device certificate check for non-admin users, you must install the VPN plug-in. The VPN plug-in version must be the same version as the EPA plug-in on the device.
For more information about creating device certificates, see the following:
- Network Device Enrollment Service (NDES) in Active Directory Certificate Services (AD CS) on the Microsoft website.
- Step-by-Step Example Deployment of the PKI Certificates for Configuration Manager: Windows Server 2008 Certification Authority on the Microsoft System Center website.
- How to request a certificate from a Microsoft Certificate Authority using DCE/RPC and the Active Directory Certificate profile payload on the Apple support website.
- iPad / iPhone Certificate Issuance on the Ask the Directory Services Team Microsoft support blog.
- Setting Up Network Device Enrollment Service on the Windows IT Pro website.
To enable and bind device certificates on a virtual server for classic EPA policy
After you create the device certificate, you install the certificate on Citrix Gateway by using the procedure for Importing and Installing an Existing Certificate to Citrix Gateway. After you install the certificate, you bind the certificate to the virtual server.
- In the configuration utility, navigate to Citrix Gateway > Virtual Servers.
- In the details pane, click a virtual server and then click Edit.
- In the Virtual Server details pane, click the pencil icon then expand More.
- Select Enable Device Certificate.
- In the selection dialog that appears, select Add and then click a device certificate to enable. Click the plus icon next to the chosen device certificate and then click OK.
Note: For information on enabling and binding device certificates on a virtual server for advanced EPA policy, see Device Certificate in nFactor as an EPA component.