Citrix Secure Access™

Supported features

Important:

  • Citrix SSO for iOS/Android is now called Citrix Secure Access. We are updating our documentation and the UI screenshots to reflect this name change.

  • The legacy VPN client was built using Apple’s private VPN APIs that are now deprecated. VPN support in Citrix Secure Access client for macOS/iOS is rewritten using Apple’s public Network Extension framework. NetScaler Gateway plug-in and VPN for iOS and macOS are no longer supported. Citrix Secure Access for iOS/macOS is the recommended VPN client to be used.

  • General availability of nFactor authentication support for Android devices would be available in one of the upcoming releases.

The Citrix Secure Access clients support NetScaler Gateway and Citrix Secure Private Access deployments.

Citrix Secure Access client features supported in NetScaler Gateway

The following table lists some of the commonly used features supported for each VPN client in NetScaler Gateway.

Feature Citrix Secure Access for Windows Citrix Secure Access for macOS Citrix Secure Access for iOS Citrix Secure Access for Linux Citrix Secure Access for Android
Always On (user mode) Yes (11.1 and later) No No No Yes (via MDM)
PAC file Yes (12.0 and later) Yes Yes No No
Client proxy support Yes No No No Yes. See note 1
Max limit of Intranet Applications 512 No limit No limit 128 No limit
Intranet IP (IIP) address support Yes Yes Yes Yes Yes
Split tunnel ON Yes Yes Yes Yes Yes
Split tunnel reverse Yes Yes Yes Yes Yes. See note 5
Split DNS REMOTE Yes Yes Yes Yes Yes. See note 6
Split DNS BOTH Yes Yes Yes Yes. See note 8 Yes. See note 6
FQDN based split tunnel Yes-Only ON (13.0 and later) Yes Yes Yes Yes. See note 5
Client idle timeout Yes Yes No No No
Endpoint analysis Yes Yes No Yes No
Device certificate (classic) Yes Yes No No No
nFactor authentication Yes (12.1 and later) Yes Yes Yes Yes. See note 3
EPA (nFactor) Yes (12.1 and later) Yes No Yes No
Device certificate (nFactor) Yes (12.1 and later) Yes No No No
Push notification Yes (12.1 and later) No Yes No Yes
OTP token autofill support. See note 2 No No Yes No Yes
TLS 1.3 support Yes Yes. See note 7 Yes. See note 7 Yes Yes
DTLS support. See note 5 Yes (13.0 and later) Yes Yes No No
HTTPOnly cookies Yes Yes Yes Yes Yes
Global server load balancing (GSLB) Yes Yes Yes Yes Yes
Local LAN access Yes Always enabled Always enabled No No

Note:

  1. Setting a proxy in the client configuration on the VPN virtual server in the gateway configuration for Android 10 and later is supported. Only basic HTTP proxy configuration with IP address and port is supported.
  2. Only QR code-scanned tokens are eligible for auto filling. Auto filling is not supported in the nFactor authentication flow.
  3. nFactor authentication support for Android devices is under preview and the feature is disabled by default. Contact NetScaler support for enabling this feature. Customers must provide their NetScaler Gateway’s FQDN to the support team for enabling nFactor authentication for Android devices.
  4. For details, see Configure DTLS VPN virtual server using SSL VPN virtual server.
  5. FQDN-based split tunnel support and reverse split tunnel for Android devices is under preview and the feature is disabled by default. Contact NetScaler support for enabling this feature. Customers must provide their NetScaler Gateway’s FQDN to the support team for enabling it for Android devices.
  6. For “Split DNS BOTH” mode, DNS suffixes must be configured on the gateway and only DNS A record queries ending in those suffixes are sent to the gateway. Rest of the queries are resolved locally. Citrix Secure Access for Android also supports “Split DNS LOCAL” mode.
  7. TLS 1.3 is disabled by default in the Citrix Secure Access client for macOS and iOS. If required, contact Citrix Support.
  8. The “Split DNS BOTH” mode functions the same as the “Split DNS LOCAL” mode in the Citrix Secure Access client for Linux.

Citrix Secure Access client features supported in Citrix Secure Private Access

Feature Citrix Secure Private Access - on-premises (Windows) Citrix Secure Private Access - on-premises (macOS) Citrix Secure Private Access - on-premises (Linux) Citrix Secure Private Access service (Windows) Citrix Secure Private Access service (macOS) Citrix Secure Private Access service (iOS) Citrix Secure Private Access service (Linux) Citrix Secure Private Access hybrid (Windows) Citrix Secure Private Access hybrid (macOS) Citrix Secure Private Access hybrid (iOS) Citrix Secure Private Access hybrid (Linux)
Always On (machine + user tunnel) Yes No No Yes No No No Yes. See note 1 No No No
Always On (only user tunnel) Yes No No Yes No No No Yes No No No
Always On service (only machine tunnel) Yes No No Yes No No No Yes. See note 1 No No No
Client idle timeout Yes Yes Yes Yes Yes No Yes Yes Yes No Yes
SSO to Citrix Workspace™ app No No No Yes Yes No No No No No No
Datagram Transport Layer Security (DTLS) Yes Yes No No No No No Yes Yes Yes No
EPA v2 or Device Posture service Yes Yes. See note 4 Yes Yes Yes. See note 4 No Yes Yes. See note 3 Yes. See note 3 and 4 No Yes. See note 3
Exclude domain DNS Yes Yes No Yes Yes Yes No Yes. See note 7 Yes. See note 7 Yes. See note 7 No
Forced timeout Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Global Server Load Balancing (GSLB) Yes Yes Yes No No No No Yes Yes Yes Yes
HttpOnly cookie Yes Yes Yes No No No No Yes Yes Yes Yes
Intranet IP address and Server Initiated Connection (SIC)) Yes Yes Yes Yes. See note 5 Yes. See note 5 Yes. See note 5 Yes. See note 5 Yes Yes Yes Yes
Local LAN access Yes Yes No No No No No Yes Yes Yes No
nFactor authentication Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Device certificate authentication Yes Yes No Yes. See note 2 Yes. See note 2 No No Yes Yes No No
Session timeout Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Smart spoofed IP address Yes No No Yes No No No Yes No No No
Split tunnel OFF No No No No No No No No No No No
Split tunnel ON (hostname-based) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Split tunnel ON (IP address based) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Split tunnel REVERSE (hostname-based) No No No No No No No No No No No
Split tunnel REVERSE (IP address based) No No No No No No No No No No No
Spoofed IP address support for both UDP and TCP DNS Yes Yes. See note 8 Yes Yes Yes. See note 8 Yes. See note 8 Yes Yes Yes. See note 8 Yes. See note 8 Yes
SSO using PRT token Yes No No Yes No No No Yes No No No
SSO using Windows Hello Yes No No Yes No No No Yes No No No
TCP split DNS support Yes No Yes Yes No No Yes Yes No No Yes
Transmission Layer Security (TLS) 1.3 Yes Yes. See note 6 Yes Yes Yes. See note 6 Yes. See note 6 Yes Yes Yes. See note 6 Yes. See note 6 Yes
Plug-in upgrade through Gateway Appliance Configuration Service (GACS) No No No No No No No No No No No
Observability Yes Yes Yes Yes Yes No Yes Yes Yes No Yes

Notes:

  1. The hybrid deployments of Citrix Secure Private Access version 2502 and later supports Always On (machine and user tunnel) and Always On service (only machine tunnel) modes.

  2. In the Citrix Secure Private Access service, device certificate authentication is not supported using third-party issued certificates.

  3. The hybrid deployments of Citrix Secure Private Access version 2502 and later supports Device Posture service.

  4. The Device Posture service for macOS requires a standalone EPA client.

  5. UDP is not supported in Citrix Secure Private Access service. So VoIP, SCCM, and GPO push from the server does not work in the Citrix Secure Private Access service.

  6. For the macOS and iOS platforms, TLS 1.3 is behind a feature flag and is disabled by default. Contact Citrix Support to enable this feature.

  7. The hybrid deployments of Citrix Secure Private Access version 2502 and later supports exclude domain DNS feature.

  8. The spoofed IP address support for TCP DNS in Citrix Secure Private Access for macOS/iOS is behind a feature flag. Contact Citrix Support to enable this feature.

Supported features