This article describes how to configure workspaces for subscribers, who might be using one or more services available from Citrix Cloud.
Looking for workspace authentication articles?
Secure workspaces is the new home for information about supported methods for subscriber authentication to workspaces. See the following sections:
For information about single sign-on for workspace subscribers, see Enable single sign-on for workspaces with Citrix Federated Authentication Service.
Administrator access to Workspace Configuration
When you add administrators to your Citrix Cloud account, you define the administrator permissions that are appropriate for their role in your organization. Administrators with Full Access have access to Workspace Configuration by default. Administrators with Custom Access have access only to the functions and services you select.
To enable access to Workspace Configuration:
- From the Citrix Cloud menu, select Identity and Access Management and then select Administrators.
- Locate the administrator you want to manage, select the ellipsis button, and then select Edit Access.
- Verify that Custom Access is enabled.
- To enable only Workspace Configuration access, under General Management, select Workspace Configuration. Selecting General Management enables all permissions in the group.
After enabling access, administrators sign in to Citrix Cloud and select Workspace Configuration from the Citrix Cloud menu.
The following addresses must be contactable to operate and consume Citrix Workspace:
For a complete list of required contactable addresses for Citrix Cloud services, see Service connectivity requirements.
In Citrix Cloud > Workspace Configuration > Access, the Workspace URL is ready to use.
- In Citrix Virtual Apps Essentials, Workspace Configuration is available from the Citrix Cloud menu after you create the first catalog.
- Workspace does not support connections from legacy clients that use a PNAgent URL to connect to resources. If your environment includes these legacy clients, you must instead deploy StoreFront on-premises and enable legacy support. To secure these client connections, use Citrix Gateway on-premises instead of the Citrix Gateway service.
Customize the workspace URL
The first part of the workspace URL is customizable. You can change the URL from, for example,
The first part of the workspace URL represents the organization using the Citrix Cloud account, and must comply with the Citrix End User Services Agreement. Misuse of third party intellectual property rights, including trademarks, might result in revocation and reassignment of the workspace URL or suspension of the Citrix Cloud account.
From the Citrix Cloud menu, go to Workspace Configuration > Access, and select the Edit link next to the workspace URL.
Guidance for new URLs:
- The customizable part of the URL (“newexample”) must be between 6 and 63 characters long. If you want to change the customizable part of the URL to fewer than 6 characters, open a ticket in Citrix Cloud.
- The customizable part of the URL must consist of only letters and numbers.
- The customizable part of the URL cannot include Unicode characters.
- When you rename a URL, the old URL is immediately removed and no longer available.
- If you change the workspace URL, your subscribers cannot access their workspaces until the new URL is active, which takes about 10 minutes. Tell subscribers what the new URL is and manually update all local Citrix Receiver apps to use the new URL.
- You can change the workspace URL only when it is enabled. If the URL is disabled, you must re-enable it first. Re-enabling the workspace URL can take up to 10 minutes to take effect.
Disable the workspace URL
You can disable the workspace URL to prevent users from authenticating through Workspace. For example, you might prefer that subscribers use an on-premises StoreFront URL to access resources, or you might want to prevent workspace access during maintenance periods.
Disabling or re-enabling the workspace URL can take up to 10 minutes to take effect. After the workspace URL is disabled, Citrix Cloud parks the domain so it can’t be accessed. Anyone visiting the URL receives a 404 message in their browser.
Disabling the workspace URL has the following effects:
- All service integrations are disabled. Subscribers can’t access data and applications from services in Citrix Workspace.
- You cannot customize the workspace URL. You must re-enable the URL before you can change it.
Provide secure access for remote subscribers by adding Citrix Gateways or the Citrix Gateway service to the resource locations.
Citrix supports these connectivity options:
- Citrix hosts Citrix Gateway and Citrix ADC
- You host Citrix Gateway and Citrix ADC on-premises
For internal connectivity only, you host StoreFront on-premises
For internal connectivity, the endpoint must connect directly to the IP address of the Virtual Delivery Agent (VDA).
You can add Citrix Gateways from Workspace Configuration > Access > External Connectivity or from Citrix Cloud > Resource Locations.
The External Connectivity part of the Workspace Configuration > Access page isn’t available in Citrix Virtual Apps Essentials. The Citrix Virtual Apps Essentials service uses the Citrix Gateway service, which requires no additional configuration.
Enable and disable services
You can enable or disable the availability of individual service resources from the Service Integrations tab. Subscribing to the Virtual Apps and Desktops service and the Secure Browser service enables them by default. All other new services that your organization subscribes to are disabled by default.
Citrix App Essentials service, Citrix Desktop Essentials service, and Citrix Virtual Apps and Desktops service display as “Citrix Virtual Apps and Desktops service” in the Service Integrations tab.
To enable workspace integration for a service
- Go to Workspace Configuration > Service Integrations.
- Select the ellipsis button next to the service and then select Enable.
- To disable integration, select the ellipsis button next to the service and then select Disable.
To disable workspace integration for a service
Disabling workspace integration blocks subscriber access for that service. This doesn’t disable the workspace URL, but subscribers can’t access data and applications from that service in Citrix Workspace.
- Go to Workspace Configuration > Service Integrations.
- Select the ellipsis button next to the service and then select Disable.
- When prompted, click Confirm to acknowledge that subscribers won’t have access to data or application from the service.
Customize the appearance of workspaces
This section describes how you can customize the appearance of workspaces by updating themes in Configuration > Customize > Appearance.
Themes allow you to configure your workspace colors and logos. Logos must meet the required dimensions to avoid appearing distorted or resulting in an error message.
|Logo||Required Dimensions||Max. size||Supported formats|
|Sign-in logo||350 x 120 pixels||2 MB||JPEG, JPG, or PNG|
|After sign-in logo||340 x 80 pixels||2 MB||JPEG, JPG, or PNG|
Changes to the workspace appearance take effect immediately after you select Save.
Customize your default theme
The default theme includes the sign-in logo, and the workspace logo and colors that subscribers see after they sign in. You can change one, some, or all of these elements for the default theme.
Customize sign in appearance
For the sign-in page, you can only replace the logo. The rest of the sign-in page, including the colors, isn’t affected.
Changes to the sign-in logo don’t impact users who authenticate to their workspace using third-party identity providers, such as Azure AD and Okta.
For more information on how to customize an Azure AD sign-in page, see the Microsoft documentation. For more information on how to customize the Okta-hosted sign-in page, see the Okta Developer documentation.
You can also customize the on-premises Citrix Gateway sign-in page. You configure this in the Citrix ADC appliance rather than in Workspace Configuration. For more information, see the Support Knowledge Center article.
Customize the workspace appearance
The sign-in logo doesn’t have to be the same as the logo that appears at the top left of the workspace after a subscriber signs in. In addition to replacing the workspace logo, you can define the banner, accent, and text and icon colors of the workspace.
Create multiple custom themes (Technical Preview)
The ability to create, customize, and prioritize multiple themes is currently in Private Technical Preview. Citrix recommends you use technical preview features only in test environments. To sign up for this technical preview, visit https://podio.com/webforms/25197371/1860213.
At present, this is a single-tenant feature. If your customer is a Citrix Service Provider tenant, it must have its own resource location, Cloud Connectors, and dedicated Active Directory domain. Citrix Service Provider tenants that share a resource location, Cloud Connectors, and dedicated Active Directory domain (multitenancy) aren’t currently supported.
You can configure and prioritize multiple Citrix Workspace themes for specific user groups. These custom themes are represented in individual cards under the default theme. If you don’t set up multiple themes, the existing (default) theme is applied to all users.
If you have Citrix Content Collaboration configured, only employee users see custom themes. Users who sign in to Citrix Workspace as a client user to access shared files through Citrix Content Collaboration only see the default theme.
Configure custom themes
To add your first custom theme under your default theme, select Add theme at the bottom left of the card under the Default appearance section.
If you already have at least one custom theme under the default theme, select Add theme at the top right of the list of existing themes.
- Configure your custom theme:
- Upload your Logo (optional).
- Define your banner, accent, and text and icon Colors (optional).
Select Theme Details and enter a meaningful name for the theme.
- Assign user groups to the theme:
- Select an identity provider, and its domain if prompted.
- Search for the user group that you want to add to the custom theme.
- Select the plus sign (+) button next to that group.
- Repeat this process for each group that you want to add to your theme.
Select Preview to see how your workspace will look to subscribers. Save your theme when you’re done.
The Workspace Preview does not show a preview if you are currently working with the older “purple” user interface.
- Repeat steps 1 through 4 to continue adding new custom themes.
Prioritize custom themes
A user might belong to more than one user group, each of which might match to a different theme. You can define which theme a subscriber sees if they match to more than one by setting the priority of custom themes relative to one another.
For relative prioritization of custom themes to work, you must configure two or more custom themes under the default theme.
- Select Edit priority at the top right of the list of themes, next to Add theme.
- You can reorder the priority of themes in one of two ways:
- Use the arrows on the right-hand side of each theme.
- Drag individual themes up and down the list using the handle on the left-hand side of the card.
- Once you’ve reordered your items, select Save order.
Customize rollout of new features
In Workspace Configuration > Customize > Features, you can roll out the newest Citrix Workspace features gradually to ensure the best workspace experience for your subscribers. You can control this rollout by selecting the intended users and groups of the feature. When you’re ready for all subscribers to use the feature, you can enable it easily for everyone.
Actions and Activity Feed
Enable features that help subscribers save time and accomplish work tasks more effectively, without leaving their workspace in Workspace Configuration > Customize > Features.
Using microapps, you can build integrations from your organization’s application data sources to pull actions from those applications into your subscribers’ workspace. Using microapps, subscribers can act on work items inside their workspace. For more information, see Getting Started in the Microapps documentation.
Requirements for configuration
Using the Actions and Activity Feed setting requires the following items:
- The Microapps service is enabled in Workspace Configuration > Service Integrations.
- You have subscribed the appropriate users and groups to the microapps that generate actions in the activity feed. For instructions, see Managing subscribers.
- To enable the feature for specific users and groups, you must use one of the following authentication methods:
- Active Directory
- Active Directory + Token
- Azure Active Directory
You can only enable or disable this feature for all microapps subscribers if:
- You are using Citrix Gateway as an identity provider
- You are using the Citrix Federated Authentication Service with Citrix Cloud.
Configure the setting
After enabling the setting, choose whether to enable actions and activity feeds for all workspace subscribers with a microapps subscription or only for specific users and groups.
If you select Enable for selected users and groups, select the domain and search for the users and groups that should see the activity feed in their workspace. When you’re finished adding users and groups, select Save.
To remove users or groups, under Assign Users and Groups, select the trash can icon for the user or group and then select Remove.
Preview the workspace
To see what your subscribers’ workspace looks like with and without the activity feed, select Workspace Configuration > Customize > Features > Preview.
Subscriber experience with Actions and Activity Feed
When enabled, subscribers see personalized alerts and notifications in their Activity feed, in the center of their workspace.
If the subscriber needs to act on an item, such as approving a request, they can take that action directly in the activity feed. Subscribers don’t have to switch to another application to complete actions.
Recommended Actions on the right side of the workspace provide quick access to common actions like submitting expenses or creating a calendar event. These actions are then processed by your organizational systems through the integrations you’ve created in the Microapps service.
The Actions tab on the left side of the workspace displays all the actions available to subscribers with access to microapps. For example, these actions might include links to other organizational systems or intranet sites.
Customize workspace preferences
Customize how subscribers interact with their workspace in Workspace Configuration > Customize > Preferences.
Allow Account Password to be Changed
Allow Account Password to be Changed controls whether subscribers can change their domain password from within Citrix Workspace. You can also provide guidance to subscribers so they can create valid passwords in accordance with your organization’s password policy.
When enabled (default), subscribers can change their password at any time, subject to your organization’s Active Directory settings. If disabled, Workspace prompts subscribers to change their password when it expires, but they can’t change their unexpired password within Workspace.
Supported authentication methods
- Active Directory
- Active Directory plus token
Supported Workspace app clients
The following versions of Citrix Workspace app support this feature:
- Workspace app for Windows 2101 or later
- Workspace app for Mac 2012 or later
- Workspace app for Chrome 2010 or later
- Workspace app for HTML5 2101 or later
- Workspace app for Android 21.1.0 or later
Subscribers can also use this feature when accessing workspaces with Internet Explorer 11, or the latest version of Edge, Chrome, Firefox, or Safari web browsers.
This feature is not supported on older versions of Workspace app and Workspace app for Linux.
You can add up to 20 password requirements to meet your organization’s security policy and that your identity provider enforces. Workspace displays these requirements as a guide when subscribers change their password from their Account Settings page in Workspace. If you don’t add any password requirements, Workspace displays the message “Your organization’s password requirements still apply.”
Citrix Workspace doesn’t validate new passwords that your subscribers enter. If a subscriber tries to change their valid password to an invalid one through Workspace, your identity provider rejects the new password. The existing password isn’t changed.
Add password requirements
- From the Citrix Cloud menu, select Workspace Configuration and then select Customize > Preferences.
- Under Allow Account Password to be Changed, check that the setting is enabled. If disabled, enable the setting.
Select Add a password requirement.
Enter a requirement that matches each of your organization’s existing security requirements for valid passwords. For example, you can specify that a password must be a certain character length. Select Add a password requirement to add more items that you want to show subscribers when they change their password.
- When you are finished adding requirements, select Save.
Select Save again to save all your setting changes.
Subscriber experience when changing passwords
To increase awareness of this feature with your subscribers, consider including a recommendation in your internal knowledgebase for subscribers to change their domain passwords through Workspace. Download this PDF file for instructions you can include in your own communications and knowledgebase articles.
When Allow Account Password to be Changed is enabled, subscribers can change their password in Workspace by going to Account Settings > Security & Sign in.
Clicking View Password Requirements displays all the requirements you entered in Workspace Configuration.
After changing their password, subscribers are signed out of Workspace automatically and must sign in again with their new password.
The Allow Caching setting enhances performance for subscribers accessing Workspace through a web browser. When caching is enabled, subscribers experience faster loading of their activity feed and can access resources in Citrix Files more quickly.
Caching is supported when accessing Workspace with a supported web browser. Caching is not available when using a locally-installed Workspace app.
When caching is enabled, some sensitive data might be stored locally on subscribers’ devices. This data consists of file metadata and is encrypted with a key that’s unique to the subscriber’s authenticated identity. The encrypted data is stored in the web browser’s localStorage property on the subscriber’s device.
If you disable caching, the encrypted data is purged the next time the subscriber signs in to Workspace through their web browser. Also, the subscriber can purge this data manually by clearing browsing data from their web browser.
Customers who have access to Workspace Configuration and the new workspace experience can allow subscribers to favorite and unfavorite app and desktop resources. The Allow Favorites feature is enabled by default.
- For some existing customers (new to Workspace between December 2017 and April 2018), Allow Favorites defaults to Disabled. The administrator can decide when to enable this feature for their subscribers.
- Allow Favorites doesn’t affect the ability to favorite files. The ability to favorite files persists regardless of whether Allow Favorites is enabled or disabled in Workspace Configuration.
When enabled, (default), workspace subscribers can add up to 250 favorites using the star icon at the top left-hand corner of each (non-mandatory) app and desktop card. The star changes from having no fill to a yellow fill when it is favorited.
If a subscriber favorites more than 250 resources, the “oldest favorite” is removed (or as close as possible to preserve the most recent favorites).
When disabled, workspace subscribers don’t see stars on app and desktop cards, or the All Apps and Favorites submenus for these resources in the navigation bar. App and desktop favorites aren’t deleted and can be recovered if you re-enable favorites.
App and desktop keywords
Administrators can automatically add favorite apps for subscribers by using KEYWORDS:Auto and KEYWORDS:Mandatory settings in the Virtual Apps and Desktops service (Manage > Full Configuration > Applications).
- KEYWORDS:Auto. The app or desktop is added as a favorite and subscribers can remove the favorite.
KEYWORDS:Mandatory. The app or desktop is added as a favorite, and subscribers cannot remove the favorite. Mandatory apps and desktops display a star icon with a padlock to indicate that it cannot be unfavorited.
If you use both Mandatory and Auto keywords for an app, the Mandatory keyword overrides the Auto keyword, and the favorited app or desktop cannot be removed.
For a subscriber with access only to apps and desktops that have the Mandatory keyword:
- The subscriber sees only the Apps page in the left navigation pane in Workspace. The Favorites page doesn’t appear in the left pane because there’s no difference in the apps that appear on the Apps page and the Favorites page.
The subscriber doesn’t see the Favorites tab on the home page. Only the Recents tab is shown.
Automatically Launch Desktop
Automatically Launch Desktop is available to customers who have access to Workspace Configuration and the new workspace experience. This preference only applies to workspace access from a browser.
When disabled (default), the setting prevents Citrix Workspace from automatically starting a desktop when a subscriber signs in. Subscribers must manually launch their desktop after signing in.
When enabled, if a subscriber has only one available desktop, the desktop automatically launches when the subscriber signs in to the workspace. The subscriber’s applications aren’t reconnected, regardless of the workspace control configuration.
To enable Citrix Workspace to launch desktops automatically, subscribers accessing the site through Internet Explorer must add the workspace URL to the Local intranet or Trusted sites zones.
Use the Workspace Sessions preference to specify the amount of idle time allowed (maximum of 8 hours) before subscribers are automatically signed out of Citrix Workspace. This preference applies to browser access only, and doesn’t apply to access from a local Citrix Workspace app.
Opening Apps and Desktops
The Opening Apps and Desktops setting is available to customers who have access to Workspace Configuration and the new workspace experience. This preference applies to the way users open apps and desktops delivered by Citrix Virtual Apps and Desktops only (service, or on-premises from the Site aggregation feature). It doesn’t apply, for example, to SaaS apps delivered by the Citrix Gateway service. This preference is available to new and existing customers. However, the introduction of this feature doesn’t change any settings for existing customers.
Choose one of the following settings:
- In a native app (default). Uses a locally installed version of Citrix Workspace. This gives the best experience for the platform the subscriber is on.
- In a browser. Uses Citrix Workspace for HTML5. No client software is required.
- Let users choose. Prompts subscribers to detect a locally installed version of Citrix Workspace, or to use Citrix Workspace for HTML5 in their browser where possible.
There is an additional check box option for the In a native app and Let users choose options to guide users to install the latest version of Citrix Workspace if a local app can’t be detected automatically. Removing this selection makes sense if your users don’t have rights to install software.
Integrate Microsoft Teams with Workspace
With the Microsoft Teams integration, subscribers can share cards from their workspace Activity feed with other subscribers through channels in Microsoft Teams.
- You must be a Full Access administrator in Citrix Cloud to enable Microsoft Teams integration. Administrators with Custom Access don’t have the required permissions to enable Microsoft Teams integration.
- You must configure Azure AD authentication in Identity and Access Management. You can use only one Azure AD instance with Microsoft Teams. If the Azure AD instance you configure already has Microsoft Teams enabled through another Citrix Cloud account, you cannot enable Microsoft Teams integration for your Citrix Cloud account. For more information about configuring Azure AD authentication, see Connect Azure Active Directory to Citrix Cloud.
- You must have Microapps enabled in your Citrix Cloud account. For more information about enabling Microapps, see Getting started.
- The feature toggle IwsMicrosoftTeams must be enabled. Contact your Citrix Cloud administrator for more information.
- You must have the Actions and Activity Feed feature enabled for workspaces.
- Workspace subscribers have the Microsoft Teams desktop client installed.
Enable Microsoft Teams integration
- After signing in to Citrix Cloud, select Workspace Configuration from the menu.
- Select Customize, and then the Preference tab.
Under Enable Microsoft Teams, select the toggle to enable. The toggle turns green when the integration is successfully enabled.
Workspace users can now see the Send to Microsoft Teams option and share cards from Workspace. Users may need to refresh their screens (Ctrl+F5).
Accept Workspace permissions
There are other set-up steps that are required to enable this integration. The Microsoft Administrator account must accept the permissions of the integration in the Workspace UI so that users of your organization can share cards to Microsoft Teams.
Log in to any workspace account and try to share a card. If the Microsoft Administrator account hasn’t yet accepted permissions for integration with Microsoft Teams and you try to log in with a non-administrator account, the following message appears:
To accept permissions, log in to your administrator account by selecting Have an admin account? Sign in with that account. The following permissions to access data are required to enable the Microsoft Teams integration with Citrix Workspace:
- When the Permissions accepted dialogue opens, review the options. The Consent on behalf of your organization grants permissions to all Workspace subscribers for this administrator. Otherwise, permissions are granted only for the administrator account.
- Select Accept.