Configure

Content Collaboration Service integration in Citrix Workspace app

This release introduces integration of Citrix Content Collaboration Service with Citrix Workspace app. Citrix Content Collaboration enables you to easily and securely exchange documents, send large documents by email, securely handle document transfers to third parties, and access a collaboration space. Citrix Content Collaboration provides many ways to work, including a web-based interface, mobile clients, desktop apps, and integration with Microsoft Outlook and Gmail.

You can access Citrix Content Collaboration functionality from the Citrix Workspace app using the Files tab displayed within Citrix Workspace app. You can view the Files tab only if Content Collaboration Service is enabled in the Workspace configuration in the Citrix Cloud console.

Note: Citrix Content Collaboration integration in Citrix Workspace app is not supported on Windows Server 2012 and Windows Server 2016 due to a security option set in the operating system.

The following image displays example contents of the Files tab of the new Citrix Workspace app:

Filetab

Limitations:

  • Resetting Citrix Workspace app does not cause Citrix Content Collaboration to log off.
  • Switching stores in Citrix Workspace app does not cause Citrix Content Collaboration to log off.

To enable Citrix Workspace app for Chrome for users to access resources hosted on Citrix Virtual Apps and Desktops, you must create a StoreFront store. You must also enable WebSocket connections on Citrix Gateway, Citrix Virtual Apps, and Citrix Virtual Apps and Desktops, as required.

Configuring multiple StoreFront support

You can change the Store address without having to restart Citrix Workspace. Existing Citrix Workspace sessions, if any, continue to run uninterrupted.

To add multiple stores and switch between them using Chrome:

  1. Click Settings in Citrix Workspace app for Chrome and, in the Account pane, click Add a store.

    Settings image

  2. Enter the StoreFront URL in the Store Address field.
  3. Click Apply to save the new store.

    Store address image

  4. You can select an existing store from the drop-down list.

    Select an existing store image

  5. To delete a store from the list, click the Delete icon next to the store address you want to delete and confirm deletion.

    Delete a store from the list image

  6. When you select a different store from the drop down-list, the Apply button changes to Switch.

  7. Click Switch to confirm that you want to switch to a different store.

    Switch to a different store image

Limitations

  • This feature is supported in user and public modes but not in kiosk mode.
  • This feature supports adding up to five stores.

Configuring Selective H.264

Configuring Selective H.264 in StoreFront using the web.config file

To change the Selective H.264 configuration using the web.config file:

  1. Open the web.config file for Citrix Workspace for Web site. This file is typically located in the C:\inetpub\wwwroot\Citrix\<Storename> Web folder, where Storename is the name specified for the store when it was created.
  2. Locate the chromeAppPreferences field and set its value with the configuration as a JSON string; for example: chromeAppPreferences=’{“graphics”:{“ selectiveH264”:false}}

Configuring Selective H.264 using the configuration.js file

The configuration.js file is located in the ChromeApp root folder. Edit this file to make changes to Citrix Workspace app for Chrome.

By default, selective H.264 is set to true.

To disable the Selective H.264 configuration using the configuration.js file:

  1. Open the configuration.js file and set the selectiveH264 attribute to false.

    selective attribute false

Note

  • Citrix recommends that you back up the configuration.js file before making any changes to it.
  • Citrix recommends using this method only when Citrix Workspace app for Chrome is repackaged for users.
  • Administrator -level credentials are required to edit the configuration.js file; after editing the file, repackage the app for the changes to take effect.

Configuring full-screen mode for a published desktop in public sessions

To configure your desktop session to always open in full-screen mode, edit the Google Admin Policy by including the following:

{

      "settings": {

                     "Value": {
                     "settings\_version": "1.0",
                     "engine\_settings": {
                     "ui": {
                     "sessionsize": {
                     "windowstate": "fullscreen"
                              }
                                      }
                                               }
                            }
                }
}

Configuring multi-monitor display

By default, the multi-monitor feature is set to enabled.

Note

  • If you are using Citrix Workspace app for Chrome running on XenApp 6.5, set the shadowing policy to Disabled to use the multi-monitor feature.
  • In a desktop session, when the window is set to full screen, the Display Resolution option in Preferences is deactivated.
  • UI dialogs and toolbars appear only on primary monitor. However, USB and smart card authentication dialogs span across monitors.

To use enhanced multi-monitor display in kiosk mode

Enhanced multi-monitor display in kiosk mode is enabled by default.

To disable kiosk mode, edit the configuration.js file or the Google Admin Console policy and set the value of kioskMultimonitor property to false.

{
    "settings": {
        "Value": {
            "settings_version": "1.0",
            "engine_settings": {
                "features": {
                    "graphics": {
                        "kioskMultimonitor": false
                  }
              }
           }
       }
    }
 }

Note

To be able to launch a session in kiosk mode, you must enable Unified Desktop mode.

  1. Launch a web browser and enter the following command: chrome://flags

  2. From the list of flags, search for UnifiedDesktopMode and set it to Enabled.

To configure Unified Desktop mode using Google Admin policy

  1. Log on to the Google Admin console.
  2. Go to Device management > Chrome Management > User Settings.
  3. Set the Unified Desktop policy to Make Unified Desktop mode available to user.
  4. Click Save.

To disable multi-monitor feature in Citrix Workspace app for Chrome

By default, multi-monitor is enabled.

  1. Launch Citrix Workspace app for Chrome.
  2. Select Settings > General.
  3. Uncheck Use all the monitors to span display.

    Multimonitor image

    Multi-monitor display is available on both desktops and applications.

    When using multi-monitor display, the desktop session can span across multiple monitors in two ways:

  4. Windowed mode: The desktop session displays in single monitor mode.
  5. Full-screen mode: When a desktop session is switched to full-screen mode, the session displays in multi-monitor mode only when Use all the monitors to span display is selected.

    For the display to span across monitors in a desktop session, select Use all the monitors to span display option and click full-screen mode when the two monitors are connected.

    In an application session, when two monitors are connected and Use all the monitors to span display option is selected, the session automatically displays in a multi-monitor mode.

HDX SDK for Chrome

Procedure to consume the API in the third-party Chrome app

  1. Install the latest version of Citrix Workspace app for Chrome. See Citrix downloads page for details.
  2. Whitelist the third-party Chrome app by adding the policy file for Citrix Workspace app for Chrome using Chrome management settings. For more details, see Manage Chrome Apps by organizational unit on Google support. The Sample policy.txt file to whitelist the third-party Chrome app is as below:

    {
          "settings": {
                 "Value": {
                 "settings_version": "1.0",
                 "store_settings": {
                 "externalApps": [“<3rdParty_App1_ExtnID>”,“<3rdParty_App2_ExtnID>”]
                                   }
                           }
                    }
    }
    

    Note

    <3rdParty_App1_ExtnID> is used as an example for the name of externalApps and can send messages to Citrix Workspace app for Chrome. Get your appid from the chrome://extensions site.

  3. Launch the application or desktop session in Citrix Workspace for Chrome by following the steps below:
  • Get the workspaceappID

    var workspaceappID = “ haiffjcadagjlijoggckpgfnoeiflnem “;

    Note

    In this example, workspaceappID indicates the store version of Citrix Workspace app for Chrome. If you are using a repackaged version of Citrix Workspace app for Chrome, use the appropriate workspaceappID.

  • Convert ICA data from INI to JSON format.

    Note

    Typically, the ICA file is retrieved from StoreFront as an INI file. Use the following helper function to convert a ICA INI file into JSON.

//Helper function to convert ica in INI format to JSON function convertICA_INI_TO_JSON(data){ var keyVals = {}; if (data) { var dataArr; if(data.indexOf(‘\r’)==-1){ dataArr = data.split(‘\n’); }else{ dataArr = data.split(‘\r\n’); } for (var i = 0; i < dataArr.length; i++) { var nameValue = dataArr[i].split(‘=’, 2); if (nameValue.length === 2) { keyVals[nameValue[0]] = nameValue[1]; } // This is required as LaunchReference will contain ‘=’ as well. The above split(‘=’,2) will not provide // the complete LaunchReference. Ideally, something like the following should be used generically as well // because there can be other variables that use the ‘=’ character as part of the value. if (nameValue[0] === “LaunchReference”) { var index = dataArr[i].indexOf(‘=’); var value = dataArr[i].substr(index + 1); keyVals[nameValue[0]] = value; } } console.log(keyVals);//to remove return keyVals; } return null; }

  • Send an ICA message from the third-party Chrome app to Citrix Workspace app for Chrome.

     var icaFileJson = {...}; // ICA file passed as JSON key value pairs.
     var message = {
     "method" : "launchSession",
     "icaData" : icaJSON
     };
     chrome.runtime.sendMessage(workspaceappID, message,
     function(launchStatus) {
     if (launchStatus.success) {
     // handle success.
     console.log("Session launch was attempted successfully");
     } else {
     // handle errors.
     console.log("error during session launch: ", launchStatus.message);
     }
     });
    
    

For more details on sendmesage API commands, see the following links:

https://developer.chrome.com/extensions/runtime#event-onMessageExternal

https://developer.chrome.com/extensions/runtime#method-sendMessage

Configuring Citrix Workspace app for Chrome features and functionalities

You can configure the features and functionalities of Citrix Workspace app for Chrome using any of the following methods:

  • Google Admin Policy
  • Web.config in StoreFront
  • default.ica
  • configuration.js

Note

The splash screen is disabled in kiosk and public session modes.

Using Google Admin policy

Note

Citrix recommends using this method only when Citrix Workspace app for Chrome is repackaged for users.

Before Version 2.1, only store/beacon related configurations could be pushed through Google Admin Policy. For additional information about this policy, see the Knowledge Center article CTX141844.

With Citrix Workspace app for Chrome Version 2.1, other Chrome configurations can also be pushed through the Google Admin Policy.

For more information, see the sample policy text below:

    {
        "settings": {
          "Value": {
         "settings_version": "1.0",
          "store_settings": {
            "name": "RTST",
            "gateways": [
             {
             "url":“https://yourcompany.gateway.com",
             "is_default": true
               }
               ],
               "beacons": {
              "internal": [
              {
            "url": “http://yourcompany.internalwebsite.net"
              }
              ],
              "external": [
             {
             "url": “http://www.yourcompany.externalwebsite.com"
              }
              ]
              },
             "rf_web": {
             "url": “http://yourcompany.storefrontstoreweb.net”
              }
              },
              "engine_settings":{
              "ui":{
              "sessionsize": {
              "windowstate": "fullscreen",
              "available" : {
               "default" : "Fit_To_Window",
             "values" : ["Fit_To_Window", "Use_Device_Pixel_Ratio","1280x800","1440x900","1600x1200"]
                }
                },
               "toolbar": {
               "menubar":true,
               "usb": true,
               "fileTransfer":true,
               "about":true,
                "lock":true,
                "disconnect":true,
                "logoff":true,
                "fullscreen":true,
                "multitouch":true,
                "preferences":true,
                "gestureGuide":true
                }
                }, “features”:{
                “com”:{
                “portname” :”COM5”
                 },
                 "graphics" : {
                "features" : {
                "graphics" : {
                 "jpegSupport" : true,
                 "h264Support" : {
                 "enabled" : true,
                 "losslessOverlays" : true,
                 "dirtyRegions" : true,
                 "yuv444Support" : false
                  }
                  },
                  "filetransfer" : {
                  "allowupload" : true,
                  "allowdownload" : true,
                  "maxuploadsize"               : 2147483647,
                  "maxdownloadsize" : 2147483647
                   }
                   },
                   "nacl" : {
                   "supportNacl" : true,
                   "graphics": {
                   "enable": true
                   },
                   "video": {
                   "enable": true
                    },
                    "audio": {
                   "enable": true
                    }
                    }
                    }
                    }
                    }  }

To disable the splash screen using the google policy, you must add “splashScreen”: false under engine_settings > ui.

Using Web.config

Note

Citrix recommends that you use the web.config file method for configuration purposes only when a store version of Citrix Workspace app for Chrome is being used.

To change the configuration using the Web.config file:

  1. Open the web.config file for the Citrix Workspace for Web site. This file is typically located in C:\inetpub\wwwroot\Citrix\storenameWeb, where storename is the name specified for the store when it was created.
  2. Locate the chromeAppPreferences field and set its value with the configuration as a JSON string.

For example:

chromeAppPreferences = ‘{“ui”: {“toolbar”: {“menubar”: false}}}’

Using the default.ica file

Note

Citrix recommends that you use the default.ica file method for configuration purposes only for Web Interface users.

Citrix Workspace app for Chrome allows Custom .ica files without any initial program value.

To change the configuration using the default.ica file:

  1. Open the default.ica file typically located at C:\inetpub\wwwroot\Citrix\<site name>\conf\default.ica for Web interface customers, where sitename is the name specified for the site when it was created. In case of Storefront customers, default.ica file is typically located at C:\inetpub\wwwroot\Citrix\<Storename>\App_Data\default.ica, where storename is the name specified for the store when it was created.
  2. Add a new key at the end of the file, chromeAppPreferences with its value set to configuration as the JSON object.

For example:

chromeAppPreferences={“ui”:{“toolbar”: {“menubar”: false}}}

A sample default.ica file looks like below:

```
;

; ICA Override File

;

; Add ICA file settings that you want to be sent to client devices

; to this file. Settings contained in this file override any

; settings generated by Delivery Services.

;


[WFClient]

Version=2

RemoveICAFile=yes

ProxyTimeout=30000

ProxyFavorIEConnectionSetting=Yes

ProxyUseFQDN=Off


[ApplicationServers]

Application=


[Application]

TransportDriver=TCP/IP

DoNotUseDefaultCSL=On

BrowserProtocol=HTTPonTCP

LocHttpBrowserAddress=!

WinStationDriver=ICA 3.0

ProxyTimeout=30000

AutologonAllowed=ON

;EncryptionLevelSession=RC5 (128 bit)


[EncRC5-0]

DriverNameWin16=pdc0w.dll

DriverNameWin32=pdc0n.dll


[EncRC5-40]

DriverNameWin16=pdc40w.dll

DriverNameWin32=pdc40n.dll


[EncRC5-56]

DriverNameWin16=pdc56w.dll

DriverNameWin32=pdc56n.dll


[EncRC5-128]

DriverNameWin16=pdc128w.dll

DriverNameWin32=pdc128n.dll


[Compress]

DriverNameWin16=pdcompw.dll

DriverNameWin32=pdcompn.dll

chromeAppPreferences={"ui" : {"toolbar" : { "menubar" : false}}}
```

Using the configuration.js file

The configuration.js file is located in the ChromeApp root folder. Access this file directly to make changes to Citrix Workspace app for Chrome.

Note

  • Citrix recommends that you back up the configuration.js file before making any changes to it.
  • Administrator-level credentials are required to edit the configuration.js file; after editing the file, repackage the app to make additional modifications to toolbar elements.
  • In kiosk mode, the toolbar is hidden by default. When editing the configuration.js file to enable the toolbar, ensure that kiosk mode is disabled. Citrix recommends that you use one of the alternative methods (for example, the default.ica file) to enable the toolbar.

To disable the splash screen using the configuration.js file, you must add "splashScreen” : false under chromeApp > ui.

Smart card authentication

Citrix Workspace app for Chrome provides support for USB smart card readers with StoreFront. You can use smart cards for the following purposes:

  • Smart card logon authentication to Citrix Workspace app for Chrome.
  • Smart card-aware published apps to access local smart card devices.
  • Applications such as Microsoft Word and Outlook that are launched in ICA sessions can access smart cards for signing documents and email.

Supported smart cards include:

  • PIV cards
  • common access cards

Prerequisites:

  • StoreFront versions 3.6 or later

Important

For smart card authentication to StoreFront 3.5 or earlier, users require a custom script to enable smart card authentication. Contact Citrix Support for details.

  • XenDesktop 7.6 or later
  • XenApp 6.5 or later

To configure smart card support on your Chrome device:

  1. Install the smart card connector application. Note that the smart card application is required for PCSC support on the Chrome device. This application reads the smart card using the USB interface. You can install this application from the Chrome website.

  2. Install the middleware application. Note that a middleware application (for example, Charismathics, or CACKey) is required because it serves as an interface that communicates with the smart card and other client certificates.

    • To install the Charismathics smart card extention or CACKey, see the instructions on the Chrome website.

    • For more information about middleware applications and smart card authentication, see the Google support site.

  3. Configure smart card authentication using Citrix Gateway. For more details, see Configuring Smart Card Authentication in Citrix Gateway documentation.

Limitations:

  • The smart card certificate is cached even after the smart card is removed from the Chrome device. This is a known issue that exists in Google Chrome. Restart the Chrome device to clear the cache.
  • When Citrix Workspace app for Chrome is repackaged, administrators should get the appID whitelisted by Google to ensure that the smart card connector application passes through.
  • Only one smart card reader is supported at a time.

Configuring serial COM port redirection

To configure serial COM port redirection, enable the feature by applying Citrix Virtual Apps and Desktops port redirection policy settings. For more information on port redirection, see Port redirection policy settings.

Note

By default, Citrix Workspace app for Chrome maps COM5 as a preferred serial COM port for redirection.

After enabling serial COM port redirection policy settings on the VDA, configure Citrix Workspace app for Chrome using one of the following methods:

  • Google Admin Policy
  • configuration.js file
  • Changing the default mapping by issuing a command in an active ICA session.

Using Google Admin Policy to configure COM port redirection

Use this method to redirect the serial COM port by editing the policy file.

Tip

Citrix recommends that you configure the COM port using the policy file only when Citrix Workspace app for Chrome is repackaged.

Edit the Google Admin Policy by including the following:

```
{
  "settings": {
           "Value": {
            "settings_version": "1.0",
            "store_settings": {
            "rf_web": {
            "url": "<http://YourStoreWebURL>"
             }
             },
             "engine_settings":{
             "features" : {
             "com" : {
   "portname" : "<COM4>", where COM4 indicates the port number that is set by the administrator.                                                   }
                                  }
                                  }
                                  }
                                  }
                                 }
```

Using the configuration.js file to configure COM port redirection

Use this method to redirect the serial COM port by editing the configuration.js file. Locate the portname field in the configuration.js file and edit the value by changing the port number.

For example:

"com" :{

"portname" : "COM4"

}

Note

Citrix recommends using the configuration.js file method to configure serial port redirection only when Citrix Workspace app for Chrome is repackaged and republished from StoreFront.

Issuing a command in an ICA session to configure COM port redirection

Use this method to redirect the serial COM port by executing the following command in an active ICA session:

    net use COM4 : \\Client\COM5

Tip

In the example above, COM4 is the preferred serial port used for redirection.

Configuring Single Sign-on (SSON) with Google and Citrix using SAML authentication

To configure Single Sign-on:

  1. Set up the third-party Identity provider (IdP) for SAML authentication if it is not already configured (for example, ADFS 2.0). For more information, see Knowledge Center article CTX133919.
  2. Setup Single Sign-on with Google Apps using SAML IdP; this enables users to leverage third-party identity to use Google apps instead of the Google Enterprise account. For more information, see Set up Single Sign-On (SSO) for Google Apps accounts using third-party identity providers on Google support.
  3. Configure Chrome devices to log on via SAML IdP.This enables users to log on to Chrome devices using a third-party identity provider. For more information, see Configure SAML Single Sign-On for Chrome devices on Google support.
  4. Configure Citrix Gateway to log on via SAML IdP. This enables users to log on to Citrix Gateway using a third-party identity provider. For more information, see Configuring SAML Authentication.
  5. Configure Citrix Virtual Apps and Desktops for Federated Authentication to allow logons to Citrix Virtual Apps and Desktops sessions using dynamically generated certificates after the SAML logon process instead of typing username/password combinations. For more information, see Federated Authentication Service.
  6. Install and configure SAML SSO for Chrome app extension on Chrome devices. For more information, see the Google website. This extension retrieves SAML cookies from the browser and provides them to Citrix Workspace. This extension must be configured with the following policy to allow Citrix Workspace to get SAML cookies.

    {
        "whitelist" : {
            "Value" : [
                {
                "appId" : "haiffjcadagjlijoggckpgfnoeiflnem",
                "domain" : "saml.yourcompany.com"
                }
            ]
         }
    }
    

    If you are repackaging Citrix Workspace app for Chrome, change the appId accordingly. In addition, change the domain to your company’s SAML IdP domain.

  7. Configure Citrix Workspace to use Citrix Gateway configured for SAML logon. This enables users to use the Citrix Gateway configured for SAML logon. For more information on Chrome configuration, see Knowledge Center article CTX141844.

Citrix Universal Print Driver

The Citrix PDF Universal Printer driver enables users to print documents opened with hosted applications or applications running on virtual desktops delivered by XenDesktop 7.6 and XenApp 7.6 or later. When a user selects the Citrix PDF Printer option, the driver converts the file to PDF and transfers the PDF to the local device. The PDF then opens in a new window for viewing and printing through Google Cloud Print.

Important

Local PDF printing is supported only on XenApp and XenDesktop 7.6 or later.

Requirements

To access the Citrix Workspace app for Chrome download page, you need a MyCitrix account.

Download the Citrix PDF Printer from the Citrix downloads page.

To enable users to print documents opened with hosted desktop and applications:

  1. Download the Citrix PDF Printer and install the Citrix PDF Universal Printer driver on each machine that delivers desktops or apps for Citrix Workspace app for Chrome users. After installing the printer driver, restart the machine.

  2. In Citrix Studio, select the Policy node in the left pane and either create a new policy or edit an existing policy.

    For more information about configuring Citrix Virtual Apps and Desktops policies, see Policies.

  3. Set the Auto-create PDF Universal Printer policy setting to Enabled.

Google Cloud Print support

Google Cloud Print allows you to make remote printing devices (such as a printer at home) available to you or anyone you choose.

You can configure Citrix Workspace to use Google Cloud Print by default to redirect your files, rather than having to select and configure it every time you print.

To use Google Cloud Print:

  • You must install the Citrix PDF printer driver in the VDA; refer to the Citrix download site for the latest software packages.
  • Google Cloud Printers should be registered with a user’s Google account. Refer to the Google Cloud Print website for more information.
  • If a customized Citrix Workspace app for Chrome package is deployed using the Google Management console, ensure the Citrix Workspace app for Chrome package contains the correct OAuth2.0 credentials in the manifest.ison file. Refer to the Google Developers site for information about obtaining OAuth2.0. For example:
"oauth2": {

"client_id": "replace this with your client ID",

"scopes": [

"<https://www.googleapis.com/auth/cloudprint>"

]

}

Note

This feature only works with Google Cloud Printer. Refer to the Google Developers site for additional information.

Enabling and disabling access to Google Drive

With Google drive support your users can open, edit, and save Windows file types from a Chrome device running Citrix Workspace. While running a Google Chrome device, your users can seamlessly use existing Windows-based applications (for example, Microsoft Word) and access the files residing on Google Drive

For example, if a user opens a file in Google Drive (for instance, a .DOC file attachment downloaded from Gmail), edits it, and saves it to Google Drive, the file can be accessed in a Citrix Virtual Apps hosted application. The file can be viewed, edited, and saved to Google Drive.

Prerequisites

To enable Google Drive access, you must install the Citrix File Access component (FileAccess.exe) on your VDA and enable file type associations in Citrix Studio. You can download Citrix File Access from the Citrix downloads page.

To enable Google Drive access from Citrix Workspace

  1. Install FileAccess.exe on each Citrix Virtual Apps or Citrix Virtual Apps and Desktops VDA.
  2. Configure the appropriate FTAs for published applications in Citrix Studio.
  3. On the Citrix Virtual Apps or Citrix Virtual Apps and Desktops VDA, https://accounts.google.com and <https://ssl.gstatic.com> have to be trusted and cookies from these sites should be enabled.

Only files from Google Drive can be opened using Citrix Workspace. To open a file from Google Drive, right-click and and open the file using Citrix Workspace.

Citrix recommends that you associate one file type with only one published application.

Proxy connection support

The Citrix Workspace app for Chrome supports opening documents from Google drive using published applications through the unauthenticated proxy servers. To enable this, configure the proxy setting in internet options.

To disable Google Drive access from Citrix Workspace

In the manifest.json file, replace:

"file_handlers" : {

      "all-file-types" : {

         "extensions" : [

            "*"

         ]

      }

   },

with:

    "file_handlers" : {
          "cr-file-type" : {
             "extensions" : [
                "cr",
               "ica"
             ]
          }
       },

Kiosk mode

Citrix Workspace app for Chrome kiosk mode provides the ability to run all apps in the same window. Using this feature, you can run Citrix Workspace apps in kiosk mode, and then launch any Windows app or desktop using the same mode. In addition, kiosk mode allows you to publish remote apps or desktops as a dedicated Chrome package using a persistent URL.

You can control this feature by adjusting the kiosk settings in the Chrome admin panel for managed Chrome devices.

See the Google support site for instructions on enabling the Citrix Workspace app to run in kiosk mode on managed and non-managed Chrome devices.

If you are deploying a Citrix Workspace app, you should publish using the visibility options set to Public/unlisted to ensure interoperability with kiosk mode. Go to the Chrome Web Store Developer Dashboard

The store URL is read-only when kiosk mode is active and cannot be edited using the Account settings screen. However, you can change this setting by either repackaging the app with the .cr file or through Google Policy Management using the Google Admin Console.

<Services version="1.0">
<Service>
<rfWeb>http://your_RfWebURL_or_persistenturl</rfWeb>
<Name>Mystore</Name>
<Gateways>
<Gateway>
<Location>https://yourcompany.gateway.com</Location>
</Gateway>
</Gateways>
<Beacons>
<Internal>
<Beacon>http://yourcompany.internalwebsite.net</Beacon>
</Internal>
<External>
<Beacon>http://www.yourcompany.externalwebsite.com</Beacon>
</External>
</Beacons>
</Service>
</Services>

If you are using the Google Admin Console, edit the policy.txt file containing the Citrix Workspace configuration. Replace the value of “url” under “rf_web” with a persistent URL.

    {
    "settings": {
    "Value": {
    "settings_version": "1.0",
    "store_settings": {
    "beacons": {
    "external": [
    {
    "url": "http://www.yourcompany.externalwebsite.com"
    }
    ],
    "internal": [
    {
    "url": "http://yourcompany.internalwebsite.net"
    }
    ]
    },
    "gateways": [
    {
    "is_default": true,
    "url": "https://yourcompany.gateway.com"
    }
    ],
    "name": "mystore",
    "rf_web": {
    "url": " http://your_RfWebURL_or_persistenturl "
    }
    }
    }
    }
    }

Clipboard support

Citrix Workspace app for Chrome supports HTML format in addition to plain text between the client and the VDA in a session. This support is useful when using Microsoft Office apps and browsers. Enhanced clipboard support is available only on Chrome and Safari browsers.

Configuring clipboard

You can copy HTML content and retain formatting when copying a link in Chrome. An <img> tag is added in HTML format, which allows you to copy images as well as text. This feature is richer than plain text.

To enable this feature, add the following registry entry to the VDA:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Citrix\wfshell\Virtual Clipboard\Additional Formats\HTML Format “Name”=”HTML Format

Warning

Using Registry Editor incorrectly can cause serious problems that can require you to reinstall the operating system. Citrix cannot guarantee that problems resulting from incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Make sure you back up the registry before you edit it. Note

For additional information about the issues resolved by the introduction of this feature, see Knowledge Center article CTX112063 and CTX086028.

USB device redirection

Citrix Workspace app for Chrome supports a wide range of USB peripherals. With this added functionality, you can create a Google policy to identify the PID/VID of the device to enable its use in Citrix Workspace. This support extends to new USB devices, including 3D Space mouse, additional composite devices, Bloomberg keyboards, and UC-Logic Tablet WP5540U.

For more information on configuring USB devices, see the Knowledge Center article CTX200825.

Automatic redirection of USB devices

In kiosk mode, USB devices are redirected automatically inside a session without any manual intervention. In user and public modes, for the first time, you must manually redirect the USB device into the session from the toolbar or the Connection Center. This manual USB redirection is done to grant permission to the Chrome operating system for accessing the USB device. When a USB device is inserted, it is redirected into the session automatically.

If you insert a USB device when multiple sessions are running, it is redirected into the session that is in focus. If there are no sessions in focus, the USB device is not redirected into any session. If a single session is running and if it is not in focus when you insert the USB device, the device might not be redirected.

File transfer

Citrix Workspace app for Chrome provides secure file transfer functionality between a user device and a Citrix Virtual Apps and Desktops session. This feature uses a file transfer virtual channel instead of client drive mapping.

By default, users can:

  • Upload files from a local download folder or attached peripheral
  • Seamlessly access data from their Citrix Virtual Apps and Desktops sessions.
  • Download files from their Citrix Virtual Apps and Desktops sessions to a local folder or a peripheral on their user device.

Administrators can configure file transfer, uploads, and downloads using policies in Citrix Studio.

Prerequisites

  • XenApp or XenDesktop 7.6 or later, with:
    • Hotfix ICATS760WX64022.msp on server OS VDAs (Windows 2008 R2 or Windows 2012 R2)
    • Hotfix ICAWS760WX86022.msp or ICAWS760WX64022.msp on client OS VDAs (Windows 7 or Windows 8.1)
  • To change file transfer policies: Group Policy Management (GPM) hotfix GPMx240WX64002.msi or GPMx240WX86002.msi on machines running Citrix Studio.

Limitations

  • A user can upload or download a maximum of 10 files at a time.
  • Maximum file size:
    • For uploads: 2147483647 bytes (2 GB)
    • For downloads: 262144000 bytes (250 MB)
  • If either the ‘Upload file to Desktop’ or the ‘Download file from Desktop’ policy is set to Disabled, the toolbar still displays both the Upload and the Download icons but the functionality is based on the policy setting. However, if both policies are set to Disabled, the Upload and Download icons are not displayed in the toolbar.

Configuring file transfer policies

To configure file transfer using a Citrix Studio policy

By default, file transfer is enabled.

Use Citrix Studio to change the following policies, located under User Setting > ICA > File Redirection.

   
CITRIX STUDIO POLICY DESCRIPTION
Allow file transfer between desktop and client To enable or disable the file transfer feature
Upload file to Desktop To enable or disable file upload in the session. Requires the “allow file transfer between desktop and client” policy to be set to true.
Download file from Desktop To enable or disable file download from the session. Requires the “allow file transfer between desktop and client” policy to be set to true.

To configure file transfer using configuration.js file

The configuration.js file is located in the ChromeApp root folder. Edit this file directly to make changes to Citrix Workspace app for Chrome.

Note: Citrix recommends that you back up the configuration.js file before making any changes to it.

Note: Administrator- level credentials are required to edit the configuration.js file; After editing the file, repackage the app to make additional modifications to toolbar elements.

To change the file transfer configuration using the configuration.js file:

Open the configuration.js file and configure the settings as below:

   
FILE TRANSFER CLIENT SETTINGS DESCRIPTION
AllowUpload To enable or disable upload from client-side. By default set to true (enabled).
AllowDownload To enable or disable download from the client-side. By default set to true (enabled).
MaxUploadSize To set the maximum size of the file that can be uploaded in bytes. By default set to 2147483648 bytes (2GB)
MaxDownloadSize To set the maximum size of the file that can be downloaded in bytes. By default set to 2147483648 bytes (2GB).

Following are the behavior cases when the policy set in Citrix Studio and the client are different.

     
Citrix Studio Policy Upload / Download Client- side setting Upload / Download Resulting Behavior
DISABLED ENABLED DISABLED
DISABLED DISABLED DISABLED
ENABLED DISABLED DISABLED
ENABLED ENABLED ENABLED

Note

When there is a conflicting value set for Maximum File Size upload or download in the registry and in the client-side settings, the minimum size value among the two is applied.

File transfer logs

The file transfer logs can be retrieved from both the client and the server.

To retriever file transfer logs from the client:

  1. Launch a browser.
  2. Go to the following URL to start logging: <storefronturl>/clients/html5client/src/viewlog.html where <storefronturl> is the FQDN or IP address of the StoreFront server where the store is configured.

For more information on file transfer, see HTML5 and Chrome File Transfer Explained.