Troubleshoot

Disconnected sessions

Users can disconnect (but not log off) from a Citrix Workspace app for iOS session in the following ways:

  • While viewing a published app or desktop in session:
    • tap the arrow at the top of the screen to view the in-session drop-down menu.
    • tap the Home button to return to the launch pad.
    • notice the white shadow under the icon of one of the published apps that are still in an active session; tap the icon.
    • tap disconnect.
  • Close Citrix Workspace app for iOS:
    • double-tap the device’s Home button.
    • locate Citrix Workspace app for iOS in the iOS app switcher view.
    • tap disconnect in the dialog that appears.
  • Pressing the home button on their mobile device.
  • Tapping Home or Switch in the app’s drop-down menu.

The session stays in a disconnected state. Although the user can reconnect later, you can verify that disconnected sessions are shown inactive after a specific interval.

To display the app in inactive mode, configure a session timeout for the ICA-TCP connection in Remote Desktop Session Host Configuration (formerly known as “Terminal Services Configuration”).

For more information about configuring Remote Desktop Services (formerly known as “Terminal Services”), refer to the Microsoft Windows Server product documentation.

Expired passwords

Citrix Workspace app for iOS supports the ability for users to change their expired passwords. Prompts appear for users to enter the required information.

Jailbroken devices

Your users can compromise the security of your deployment by connecting with jailbroken iOS devices. Jailbroken devices are those devices whose owners have modified them, usually with the effect of bypassing certain security protections.

When Citrix Workspace app for iOS detects a jailbroken iOS device, Citrix Workspace app for iOS displays an alert to the user.

To further help to secure your environment, you can configure StoreFront or Web Interface to help to prevent detected jailbroken devices from running apps.

Requirements

  • Citrix Receiver for iOS 6.1 or later
  • StoreFront 3.0 or Web Interface 5.4 or later
  • Access to StoreFront or Web Interface through an administrator account

To help to prevent detected jailbroken devices from running apps

  1. Log on to your StoreFront or Web Interface server as a user who has administrator privileges.

  2. Find the file default.ica, which is in one of the following locations:

    • C:\inetpub\wwwroot\Citrix\storename\conf (Microsoft Internet Information Services)
    • C:\inetpub\wwwroot\Citrix\storename\App_Data (Microsoft Internet Information Services)
    • ./usr/local/tomcat/webapps/Citrix/XenApp/WEB-INF (Apache Tomcat)
  3. Under the section [Application], add the following: AllowJailBrokenDevices=OFF

  4. Save the file and restart your StoreFront or Web Interface server.

After you restart the StoreFront server, users who see the alert about jailbroken devices can’t launch apps from your StoreFront or Web Interface server.

To allow detected jailbroken devices to run apps

If you do not set AllowJailBrokenDevices, the default is to display the alert to users of jailbroken devices but still allow them to launch applications.

If you want to specifically allow your users to run applications on jailbroken devices:

  1. Log on to your StoreFront or Web Interface server as a user who has administrator privileges.

  2. Find the file default.ica, which is in one of the following locations:

    • C:\inetpub\wwwroot\Citrix\storename\conf (Microsoft Internet Information Services)
    • C:\inetpub\wwwroot\Citrix\storename\App_Data (Microsoft Internet Information Services)
    • ./usr/local/tomcat/webapps/Citrix/XenApp/WEB-INF (Apache Tomcat)
  3. Under the section [Application] add the following: AllowJailBrokenDevices=ON

  4. Save the file and restart your StoreFront or Web Interface server.

When you set AllowJailBrokenDevices to ON, your users see the alert about using a jailbroken device, but they can run applications through StoreFront or Web Interface.

Loss of HDX audio quality

From Citrix Virtual Apps and Desktops and Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), HDX audio to Citrix Workspace app for iOS might lose quality when using audio and video simultaneously.

The issue occurs when the Citrix Virtual Apps and Desktops and Citrix DaaS HDX policies can’t handle the amount of audio data with the video data.

For suggestions about how to create policies to improve audio quality, see Knowledge Center article CTX123543.

Numeric keys and special characters

If numeric keys or Chinese IME characters do not work properly, disable the Unicode Keyboard option. To do so, go to Settings > Keyboard Options > and set Use Unicode Keyboard to Off.

Slow connections

Follow the workaround if you experience any of the following issues:

  • slow connections to the XenApp and XenDesktop Site
  • missing application icons
  • recurring Protocol Driver Error messages

Workaround:

Disable Citrix PV Ethernet Adapter properties for the network interface on the:

  • Citrix Virtual Apps server
  • Citrix Secure Web Gateway
  • Web Interface server

The Citrix PV Ethernet Adapter properties include (all enabled by default):

  • Large Send Offload
  • Offload IP Checksum
  • Offload TCP Checksum
  • Offload UDP Checksum

No server restart is needed. This workaround applies to the Windows Server 2003 and 2008 32-bit. This issue does not affect the Windows Server 2008 R2.

Troubleshoot