Citrix Enterprise Browser to Chrome Enterprise Premium migration
The transition from Citrix Enterprise Browser (CEB) to Citrix Enterprise Premium (CEP) marks a significant step forward in Citrix’s Secure Private Access evolution to provide secure, adaptive, and high-performance Zero Trust Network Access (ZTNA) to all applications. This topic provides contains detailed information for IT administrators and Citrix professionals to plan and execute a successful gradual migration, ensuring minimal disruption and optimal user experience.
This phased migration approach allows organizations to maintain business continuity during the transition period by running both browser solutions in parallel. With the phased migration, customers can validate compatibility of existing applications and workflows with Chrome Enterprise Premium.
The following key steps are involved in the CEB to CEP migration:
- Configure Chrome Enterprise Premium
- Domain mapping for user groups without email addresses
- Configuration changes prior to full migration to CEP
- Rollout CEP to the organization (full migration)
Configure Chrome Enterprise Premium
For existing Secure Private Access customers, the migration wizard in the Secure Private Access console facilitates CEP provisioning, extension installation for users, and a path for gradual application and user migration.
-
In the Secure Private Access admin console, navigate to Chrome Enterprise Premium > Configuration.
You can view the Google integration details.


-
Click Set up Google CEP.
-
Assign Citrix service account details within the Google WorkSecure Private Access console. For details, see Setup Google Chrome integration.
-
Click Save and close.
The Chrome Enterprise Premium provisioning begins.
Policy enrichment for user groups without email
Once the Chrome Enterprise Premium provisioning is successfully completed, a policy update process is automatically triggered for the access policies and session policies.
This update process does the following:
- Review the existing policies (access and session).
- Check for users and user groups without emails in their rules.
- Query the CC Directory service to retrieve their emails, and add them to the policies.
For details, see Domain mapping for user groups without email addresses.
Configuration changes prior to full migration to CEP
The following configuration changes must be applied manually by the Secure Private Access administrator before initiating the full migration to CEP. These updates ensure compatibility and readiness across all applications and policies.
Single sign-on configuration changes
To ensure compatibility with CEP, it is essential to update the single sign-on (SSO) configuration for all existing applications. The Secure Private Access administrators must perform the following steps:
- Navigate to the Application Configuration page (Secure Private Access > App Configuration).
-
Edit the applications to modify the single sign-on configuration.
Under the Single Sign On section, in Which single sign on type would you like to use for your Web app setup?, select Don’t use SSO.
Important:
- This update is mandatory because the SSO step is removed in CEP. By setting the application to Don’t use SSO, you ensure continued functionality and alignment with the new migration flow.
- If the single sign-on configuration is not changed as instructed, the application becomes inaccessible after the migration to CEP.
Access policies and session policies updates
To ensure that the access policies are compatible with CEP standards, specific updates are required in the access and session policies. The Secure Private Access administrators must perform the following steps:
- Navigate to Secure Private Access > Policies > Access Policies.
-
Click Edit on the relevant policy and modify the action settings.
- Within the policy, navigate to the Policy rules section, click the ellipsis icon in line with the policy rule and click Edit.
- Navigate to the Actions page and change the Action settings.
Standardizing actions across applications
When configuring actions for both HTTP/HTTPS and TCP/UDP applications, ensure the following:
- The same action, either Allow Access or Deny Access is selected in both sections.
- If the option Allow access with restrictions is currently enabled for HTTP/HTTPS applications, it must be removed, as this setting is not supported in CEP.
- Replace Allow access with restrictions with either Allow Access or Deny Access, based on your intended policy behavior.
Application requirement for policy updates
Access policies without assigned applications cannot be updated. To modify these policies, first assign an application to the policy.
Important:
If these updates are not performed, applications associated with access policies containing mixed actions become inaccessible or deny actions setting might be ignored.
URL filtering policy update (optional)
To maintain alignment with the new CEP migration standards, it is necessary to update the URL filtering settings within Secure Private Access. Perform the following steps to update URL filtering configuration:
- Navigate to Secure Private Access > Settings > Unsanctioned Websites.
- Delete all websites and Remote Browser Isolation (RBI) entries currently listed under this section.
- After removing these entries, disable the Web filtering toggle located at the top of the page.
These configurations are no longer relevant following the migration to CEP.
Important:
If these steps are not completed, there is no impact on the system’s operation after the full migration. However, the Unsanctioned Websites page will not be visible.
Other policy adjustments (optional)
Review and delete unused conditions:
As part of the migration and policy optimization process, it is recommended to review access and session policies for any conditions that might no longer be applicable. Examples of such conditions include:
- Workspace URL
- User Risk Score
- Desktop and Mobile options
These conditions can be deleted if they are not relevant to your current environment or business requirements.
Note:
If these policy adjustments are not made, there is no impact on the system operations.
Security Groups clean-up (optional)
Review the Security Groups configuration within Secure Private Access.
Navigate to Secure Private Access > Applications > Security Groups to assess any existing entries.
After migration, the Security Groups configuration will no longer be available. Therefore, any entries currently listed under this tab can be deleted, as they will no longer be relevant to the post-migration environment.
Note:
There is no system impact if this configuration is not updated. Removing these entries is optional and helps maintain a streamlined environment, but it is not required for continued operation.
Rollout CEP to the organization (full migration)
After completing the earlier mentioned steps, click Rollout to organization in the Migrate Apps and Users page. This is the last stage of the migration process.

Important:
Once the rollout is complete, CEP becomes the default enterprise browser. Reverting to CEB is not possible, and incompatible settings are hidden in the Secure Private Access admin console.
Summary of the migration process
Follow these steps to migrate applications from CEB to CEP:
- Provision Chrome Enterprise Premium.
- Migrate one application for a specific group of users.
- Enrich the group with email (if not exists).
- Fix any incompatibilities.
- Migrate the application to CEP.
- Verify that the application is accessible via CEP (directly, CWA and WSUI).
- Enrich the users and user groups with emails.
- Migrate more applications and users and user groups.
- Rollout CEP to the organization (full migration).
-
Fix any leftover incompatibilities.
- Run the script again, indicating in the prompt that the CEP rollout has been completed.
- Fix the incompatibilities.
- Verify that the applications are accessible via CEP (directly, CWA and WSUI).
Challenges with the email enrichment process
The email enrichment task can be intricate, as it often involves collaboration among several teams to assign emails to various groups across multiple domains. The Domain Mapping feature facilitates this process. For details, see Domain mapping for user groups without email addresses.
Best practices
- Start with a pilot migration for a small user group before a full-scale rollout.
- Leverage Citrix’s official migration tools and documentation.
- Maintain clear documentation of all changes and configurations.
- Establish a rollback plan in case of critical issues.
Conclusion
Migration from CEB to CEP modernizes your Citrix environment with enhanced capabilities. Careful planning, thorough testing, and proactive user engagement ensure a smooth transition to CEP.
In this article
- Configure Chrome Enterprise Premium
- Policy enrichment for user groups without email
- Configuration changes prior to full migration to CEP
- URL filtering policy update (optional)
- Other policy adjustments (optional)
- Security Groups clean-up (optional)
- Rollout CEP to the organization (full migration)
- Summary of the migration process
- Best practices
- Conclusion