Configure workspaces

This article describes how to configure workspaces for subscribers, who might be using one or more services available from Citrix Cloud.


Looking for workspace authentication articles?

Secure workspaces is the new home for information about supported methods for subscriber authentication to workspaces. See the following sections:

For information about single sign-on for workspace subscribers, see Enable single sign-on for workspaces with Citrix Federated Authentication Service.

Administrator access to Workspace Configuration

When you add administrators to your Citrix Cloud account, you define the administrator permissions that are appropriate for their role in your organization. Administrators with Full Access have access to Workspace Configuration by default. Administrators with Custom Access have access only to the functions and services you select.

To enable access to Workspace Configuration:

  1. From the Citrix Cloud menu, select Identity and Access Management and then select Administrators.
  2. Locate the administrator you want to manage, select the ellipsis button, and then select Edit Access. Administrator account with Edit Access menu highlighted
  3. Verify that Custom Access is enabled.
  4. To enable only Workspace Configuration access, under General Management, select Workspace Configuration. Selecting General Management enables all permissions in the group. Custom Access role with Workspace Configuration enabled

After enabling access, administrators sign in to Citrix Cloud and select Workspace Configuration from the Citrix Cloud menu.

Workspace Configuration menu option

Connectivity requirements

The following addresses must be contactable to operate and consume Citrix Workspace:

  • https://*
  • https://*

For a complete list of required contactable addresses for Citrix Cloud services, see Service connectivity requirements.

Workspace URL

In Citrix Cloud > Workspace Configuration > Access, the Workspace URL is ready to use.

Access console page


  • In Citrix Virtual Apps Essentials, Workspace Configuration is available from the Citrix Cloud menu after you create the first catalog.
  • Workspace doesn’t support connections from legacy clients that use a PNAgent URL to connect to resources. If your environment includes these legacy clients, you must instead deploy StoreFront on-premises and enable legacy support. To secure these client connections, use Citrix Gateway on-premises instead of the Citrix Gateway service.

Customize the workspace URL

The first part of the workspace URL is customizable. You can change the URL from, for example, to


The first part of the workspace URL represents the organization using the Citrix Cloud account, and must comply with the Citrix End User Services Agreement. Misuse of third party intellectual property rights, including trademarks, might result in revocation and reassignment of the workspace URL or suspension of the Citrix Cloud account.

From the Citrix Cloud menu, go to Workspace Configuration > Access, and select the Edit link next to the workspace URL.

Guidance for new URLs:

  • The customizable part of the URL (“newexample”) must be between 6 and 63 characters long. If you want to change the customizable part of the URL to fewer than 6 characters, open a ticket in Citrix Cloud.
  • The customizable part of the URL must consist of only letters and numbers.
  • The customizable part of the URL can’t include Unicode characters.
  • When you rename a URL, the old URL is immediately removed and no longer available.
  • If you change the workspace URL, your subscribers can’t access their workspaces until the new URL is active, which takes about 10 minutes. Tell subscribers what the new URL is and manually update all local Citrix Receiver apps to use the new URL.
  • You can change the workspace URL only when it’s enabled. If the URL is disabled, you must re-enable it first. Re-enabling the workspace URL can take up to 10 minutes to take effect.

Disable the workspace URL

You can disable the workspace URL to prevent users from authenticating through Workspace. For example, you might prefer that subscribers use an on-premises StoreFront URL to access resources, or you might want to prevent workspace access during maintenance periods.

Workspace URL toggle button

Disabling or re-enabling the workspace URL can take up to 10 minutes to take effect. After the workspace URL is disabled, Citrix Cloud parks the domain so it can’t be accessed. Anyone visiting the URL receives a 404 message in their browser.

Disabling the workspace URL has the following effects:

  • All service integrations are disabled. Subscribers can’t access data and applications from services in Citrix Workspace.
  • You can’t customize the workspace URL. You must re-enable the URL before you can change it.

External connectivity

Provide secure access for remote subscribers by adding Citrix Gateways or the Citrix Gateway service to the resource locations.

Citrix supports these connectivity options:

  • Citrix hosts Citrix Gateway and Citrix ADC
  • You host Citrix Gateway and Citrix ADC on-premises
  • For internal connectivity only, you can use Workspace alone or host StoreFront on-premises. For internal connectivity, the endpoint must connect directly to the IP address of the Virtual Delivery Agent (VDA).

You can add Citrix Gateways from Workspace Configuration > Access > External Connectivity or from Citrix Cloud > Resource Locations.

Workspace external access settings


The External Connectivity part of the Workspace Configuration > Access page isn’t available in Citrix Virtual Apps Essentials. The Citrix Virtual Apps Essentials service uses the Citrix Gateway service, which requires no additional configuration.

Enable and disable services

You can enable or disable the availability of individual service resources from the Service Integrations tab. Subscribing to the Virtual Apps and Desktops service and the Secure Browser service enables them by default. All other new services that your organization subscribes to are disabled by default.


Citrix App Essentials service, Citrix Desktop Essentials service, and Citrix Virtual Apps and Desktops service display as “Citrix Virtual Apps and Desktops service” in the Service Integrations tab.

To enable workspace integration for a service

  1. Go to Workspace Configuration > Service Integrations.
  2. Select the ellipsis button next to the service and then select Enable.
  3. To disable integration, select the ellipsis button next to the service and then select Disable.

Service Integrations console page

To disable workspace integration for a service


Disabling workspace integration blocks subscriber access for that service. This doesn’t disable the workspace URL, but subscribers can’t access data and applications from that service in Citrix Workspace.

  1. Go to Workspace Configuration > Service Integrations.
  2. Select the ellipsis button next to the service and then select Disable.
  3. When prompted, click Confirm to acknowledge that subscribers won’t have access to data or application from the service.

Disable Workspace Access Warning message

Customize the appearance of workspaces

This section describes how you can customize the appearance of workspaces by updating themes in Configuration > Customize > Appearance.

Themes allow you to configure your workspace colors and logos. Logos must meet the required dimensions to avoid appearing distorted or resulting in an error message.

Logo Required Dimensions Max. size Supported formats
Sign-in logo 350 x 120 pixels 2 MB JPEG, JPG, or PNG
After sign-in logo 340 x 80 pixels 2 MB JPEG, JPG, or PNG

Changes to the workspace appearance take effect immediately after you select Save.

Customize your default theme

The default theme includes the sign-in logo, and the workspace logo and colors that subscribers see after they sign in. You can change one, some, or all of these elements for the default theme.

Customize console page

Customize sign in appearance

For the sign-in page, you can only replace the logo. The rest of the sign-in page, including the colors, isn’t affected.

Sign In page


Changes to the sign-in logo don’t impact users who authenticate to their workspace using third-party identity providers, such as Azure AD and Okta.

For more information on how to customize an Azure AD sign-in page, see the Microsoft documentation. For more information on how to customize the Okta-hosted sign-in page, see the Okta Developer documentation.

You can also customize the on-premises Citrix Gateway sign-in page. You configure this in the Citrix ADC appliance rather than in Workspace Configuration. For more information, see the Support Knowledge Center article.

Customize the workspace appearance

The sign-in logo doesn’t have to be the same as the logo that appears at the top left of the workspace after a subscriber signs in. In addition to replacing the workspace logo, you can define the banner, accent, and text and icon colors of the workspace.

Create multiple custom themes (Technical Preview)


  • The ability to create, customize, and prioritize multiple themes is in Private Technical Preview. Citrix recommends you use technical preview features only in test environments. To sign up for this technical preview, visit

  • This is a single-tenant feature. If your customer is a Citrix Service Provider tenant, it must have its own resource location, Cloud Connectors, and dedicated Active Directory domain. Citrix Service Provider tenants that share a resource location, Cloud Connectors, and dedicated Active Directory domain (multitenancy) aren’t currently supported.

You can configure and prioritize multiple Citrix Workspace themes for specific user groups. These custom themes are listed in individual cards under the default theme. If you don’t set up multiple themes, the existing (default) theme is applied to all users.

Multiple custom themes


If you have Citrix Content Collaboration configured, only employee users see custom themes. Users who sign in to Citrix Workspace as a client user to access shared files through Citrix Content Collaboration only see the default theme.

page

Configure custom themes

To add your first custom theme under your default theme, select Add theme at the bottom left of the card under the Default appearance section.

If you already have at least one custom theme under the default theme, select Add theme at the top right of the list of existing themes.

  1. Configure your custom theme:
    1. Upload your Logo (optional).
    2. Define your banner, accent, and text and icon Colors (optional).

    After sign-in appearance

  2. Select Theme Details and enter a meaningful name for the theme.

    Theme details

  3. Assign user groups to the theme:
    1. Select an identity provider, and its domain if prompted.
    2. Search for the user group that you want to add to the custom theme.
    3. Select the plus sign (+) button next to that group.
    4. Repeat this process for each group that you want to add to your theme.

    Add user groups

  4. Select Preview to see how your workspace looks to subscribers. Save your theme when you’re done.


    The Workspace Preview doesn’t show a preview if you’re currently working with the older “purple” user interface.

  5. Repeat steps 1 through 4 to continue adding new custom themes.

Prioritize custom themes

A user might belong to more than one user group, each of which might match to a different theme. You can define which theme a subscriber sees if they match to more than one by setting the priority of custom themes relative to one another.


For relative prioritization of custom themes to work, you must configure two or more custom themes under the default theme.

  1. Select Edit priority at the top right of the list of themes, next to Add theme.
  2. You can reorder the priority of themes in one of two ways:
    • Use the arrows on the right-hand side of each theme.
    • Drag individual themes up and down the list using the handle on the left-hand side of the card.
  3. Once you’ve reordered your items, select Save order.

Prioritize themes

Customize rollout of new features

In Workspace Configuration > Customize > Features, you can roll out the newest Citrix Workspace features gradually for the best workspace experience for your subscribers. You can control this rollout by selecting the intended users and groups of the feature. When you’re ready for all subscribers to use the feature, you can enable it easily for everyone.

Actions and Activity Feed

Enable features that help subscribers save time and accomplish work tasks more effectively, without leaving their workspace in Workspace Configuration > Customize > Features.

Activity feed enabled for all subscribers

Using microapps, you can build integrations from your organization’s application data sources to pull actions from those applications into your subscribers’ workspace. Using microapps, subscribers can act on work items inside their workspace. For more information, see Getting Started in the Microapps documentation.

Requirements for configuration

Using the Actions and Activity Feed setting requires the following items:

  • The Microapps service is enabled in Workspace Configuration > Service Integrations.
  • You’ve subscribed the appropriate users and groups to the microapps that generate actions in the activity feed. For instructions, see Managing subscribers.
  • To enable the feature for specific users and groups, you must use one of the following authentication methods:
    • Active Directory
    • Active Directory + Token
    • Azure Active Directory
    • Okta

    You can only enable or disable this feature for all microapps subscribers if:

    • You’re using Citrix Gateway as an identity provider.
    • You’re using the Citrix Federated Authentication Service with Citrix Cloud.

Configure the setting

After enabling the setting, choose whether to enable actions and activity feeds for all workspace subscribers with a microapps subscription or only for specific users and groups.

Activity feed enabled for all subscribers

If you select Enable for selected users and groups, select the domain and search for the users and groups that should see the activity feed in their workspace. When you’re finished adding users and groups, select Save.

User and group selection for activity feed

To remove users or groups, under Assign Users and Groups, select the trash can icon for the user or group and then select Remove.

Remove users or groups from activity feed

Preview the workspace

To see what your subscribers’ workspace looks like with and without the activity feed, select Workspace Configuration > Customize > Features > Preview.

Subscriber experience with Actions and Activity Feed

When enabled, subscribers see personalized alerts and notifications in their Activity Feed, in the center of their workspace.

Preview of subscriber workspace

Subscribers don’t have to switch to another application to complete actions. A subscriber can act on an item, such as approving a request, directly in the activity feed.

Actions on the right side of the workspace provide quick access to common actions like submitting expenses or creating a calendar event. These actions are processed by your organizational systems through the integrations you’ve created in the Microapps service.

The Actions tab in the left navigation of the workspace displays all the actions available to subscribers with access to microapps. For example, these actions might include links to other organizational systems or intranet sites.

Customize workspace preferences

Customize how subscribers interact with their workspace in Workspace Configuration > Customize > Preferences.

Allow Account Password to be Changed


This feature is being rolled out to customers incrementally. You might not see the feature until the rollout process is complete.

Citrix aims to deliver new features and product updates to Citrix Workspace customers when they’re available. This process is transparent to you. Initial updates are applied to Citrix internal sites only, and are then applied to customer environments gradually. Delivering updates incrementally helps ensure product quality and maximize availability.

Allow Account Password to be Changed controls whether subscribers can change their domain password from within Citrix Workspace. You can also provide guidance to subscribers so that they can create valid passwords in line with your organization’s password policy.

When enabled (default), subscribers can change their password at any time, based on your organization’s Active Directory settings. If disabled, Workspace prompts subscribers to change their password when it expires, but they can’t change their unexpired password within Workspace.

Supported authentication methods

  • Active Directory
  • Active Directory plus token

Supported Workspace app clients

The following versions of Citrix Workspace app support this feature:

  • Workspace app for Windows 2101 or later
  • Workspace app for Mac 2012 or later
  • Workspace app for Chrome 2010 or later
  • Workspace app for HTML5 2101 or later
  • Workspace app for Android 21.1.0 or later

Subscribers can also use this feature when accessing workspaces with Internet Explorer 11, or the latest version of Edge, Chrome, Firefox, or Safari web browsers.

This feature isn’t supported on older versions of Workspace app and Workspace app for Linux.

Password guidance

You can add up to 20 password requirements to meet your organization’s security policy and that your identity provider enforces. Workspace displays these requirements as a guide when subscribers change their password from their Account Settings page in Workspace. If you don’t add any password requirements, Workspace displays the message “Your organization’s password requirements still apply.”


Citrix Workspace doesn’t validate new passwords that your subscribers enter. If a subscriber tries to change their valid password to an invalid one through Workspace, your identity provider rejects the new password. The existing password isn’t changed.

Add password requirements

  1. From the Citrix Cloud menu, select Workspace Configuration and then select Customize > Preferences.
  2. Under Allow Account Password to be Changed, check that the setting is enabled. If disabled, enable the setting.
  3. Select Add a password requirement.

    Allow Account Password to be Changed setting in enabled state

  4. Enter a requirement that matches each of your organization’s existing security requirements for valid passwords. For example, you can specify that a password must be a certain character length. Select Add a password requirement to add more items that you want to show subscribers when they change their password.

    Add a password requirement form

  5. When you’re finished adding requirements, select Save.
  6. Select Save again to save all your setting changes.

    Allow Account Password to be Changed setting with password requirements

Subscriber experience when changing passwords


To increase awareness of this feature with your subscribers, consider including a recommendation in your internal knowledgebase for subscribers to change their domain passwords through Workspace. Download this PDF file for instructions you can include in your own communications and knowledgebase articles.

When Allow Account Password to be Changed is enabled, subscribers can change their password in Workspace by going to Account Settings > Security & Sign in.

Select View Password Requirements to display all the requirements you entered in Workspace Configuration.

Change password section with displayed requirements highlighted

After changing their password, subscribers are automatically signed out of Workspace and must sign in again with their new password.

Add a custom subscriber license agreement policy

You can present subscribers with a custom usage agreement policy that they must read and accept before they sign into their Workspace. To configure this feature:

  1. From the Citrix Cloud menu, select Workspace Configuration > Customize > Preferences.
  2. In the Sign in policy section, select Configure. If a policy exists, the button reads Edit, instead.
  3. Enable the feature using the toggle under Enable policy.
  4. Enter a title for the policy under Policy header.
  5. Enter the policy text that subscribers must agree to before logging in. If needed, add other languages in the same text box.
  6. Enter the name of the button that subscribers must select to agree to the policy.

    Sign in policy configuration page

  7. Select Preview to see what the policy looks like for subscribers. Select Close preview to go back to the policy configuration.
  8. When you’re finished configuring the policy, select Save.


If you have Citrix Gateway configured as your Workspace identity provider, you might already have a sign-in policy as part of your AAA and NFactor authentication flow. Citrix recommends that you configure only one sign-in policy, either as part of your existing NFactor authentication flow or outside the flow using the Citrix Cloud administration console.

Allow Caching

The Allow Caching setting enhances performance for subscribers accessing Workspace through a web browser. When caching is enabled, subscribers experience faster loading of their activity feed and can access resources in Citrix Files more quickly.

Caching is supported when accessing Workspace with a supported web browser. Caching isn’t available when using a locally installed Workspace app.

When caching is enabled, some sensitive data might be stored locally on subscribers’ devices. This data consists of file metadata and is encrypted with a key that’s unique to the subscriber’s authenticated identity. The encrypted data is stored in the web browser’s localStorage property on the subscriber’s device.

If you disable caching, the encrypted data is purged the next time the subscriber signs in to Workspace through their web browser. Also, the subscriber can purge this data manually by clearing browsing data from their web browser.

Allow Favorites

Customers who have access to Workspace Configuration and the new workspace experience can allow subscribers to favorite and unfavorite app and desktop resources. The Allow Favorites feature is enabled by default.

Workspace Home Favorites Enabled


  • For some existing customers (new to Workspace between December 2017 and April 2018), Allow Favorites defaults to Disabled. The administrator can decide when to enable this feature for their subscribers.
  • Allow Favorites doesn’t affect the ability to favorite files. The ability to favorite files persists regardless of whether Allow Favorites is enabled or disabled in Workspace Configuration.

When enabled (default), workspace subscribers can add up to 250 favorites using the star icon at the top left-hand corner of each (non-mandatory) app and desktop card. The star changes from having no fill to a yellow fill when it is favorited.

App cards with star icon states highlighted

If a subscriber favorites more than 250 resources, the “oldest favorite” is removed (or as close as possible to preserve the most recent favorites).

When disabled, workspace subscribers don’t see stars on app and desktop cards, or the All Apps and Favorites submenus for these resources in the navigation bar. App and desktop favorites aren’t deleted and can be recovered if you re-enable favorites.

Workspace Favorites Disabled

App and desktop keywords

Administrators can automatically add favorite apps for subscribers by using KEYWORDS:Auto and KEYWORDS:Mandatory settings in the Virtual Apps and Desktops service (Manage > Full Configuration > Applications).

Application Settings Identification

  • KEYWORDS:Auto. The app or desktop is added as a favorite and subscribers can remove the favorite.
  • KEYWORDS:Mandatory. The app or desktop is added as a favorite, and subscribers can’t remove the favorite. Mandatory apps and desktops display a star icon with a padlock to indicate that it can’t be unfavorited.

    Favorited app with locked star icon


If you use both Mandatory and Auto keywords for an app, the Mandatory keyword overrides the Auto keyword, and the favorited app or desktop cannot be removed.

For a subscriber with access only to apps and desktops that have the Mandatory keyword:

  • The subscriber sees only the Apps page in the left navigation pane in Workspace. The Favorites page doesn’t appear in the left pane because there’s no difference in the apps that appear on the Apps page and the Favorites page.
  • The subscriber doesn’t see the Favorites tab on the home page. Only the Recents tab is shown.

    Workspace home page with no Favorites navigation shown

Automatically Launch Desktop

Automatically Launch Desktop is available to customers who have access to Workspace Configuration and the new workspace experience. This preference only applies to workspace access from a browser.

Preferences tab

When disabled (default), the setting prevents Citrix Workspace from automatically starting a desktop when a subscriber signs in. Subscribers must manually launch their desktop after signing in.

When enabled, if a subscriber has only one available desktop, the desktop automatically launches when the subscriber signs in to the workspace. The subscriber’s applications aren’t reconnected, regardless of the workspace control configuration.


To enable Citrix Workspace to launch desktops automatically, subscribers accessing the site through Internet Explorer must add the workspace URL to the Local intranet or Trusted sites zones.

Inactivity Timeout for Web

Use the Inactivity Timeout for Web setting to specify the amount of idle time allowed (maximum of 8 hours) before subscribers are automatically signed out of Citrix Workspace. This setting applies to browser access only, and doesn’t apply to access from a local Citrix Workspace app.

Workspace session timeout settings

Unlike manual logout, which disconnects virtual app and desktop sessions, subscribers stay connected to their virtual app and desktop sessions following timeout due to inactivity.

Reauthentication period for Workspace app


This feature is available as a preview. Citrix recommends using preview features only in test environments or limited production environments.

Use the Reauthentication period for Workspace app setting to specify the length of time subscribers can stay signed in to Workspace app before needing to sign in again.

Reauthentication period setting

By default, this setting requires subscribers to sign in every 24 hours (one day). You can specify a longer reauthentication period of up to 365 days. Longer reauthentication periods require subscribers’ consent to stay signed in.

If you change the reauthentication period length, the change takes about 10 minutes to take effect. During that time, subscribers aren’t able to access their workspace.

Supported Workspace app clients

The following versions of Citrix Workspace app support this feature:

  • Workspace app 2106 for Windows or later
  • Workspace app 2106 for Mac or later
  • Workspace app for 21.6.5 iOS or later
  • Workspace app for 21.6.0 Android or later

Supported authentication methods

Staying signed in to Workspace app is supported for the following authentication methods:

  • Active Directory
  • Active Directory plus token
  • Azure Active Directory
  • Citrix Gateway
  • Okta

Staying signed in to Virtual Apps and Desktops sessions is supported for the following authentication methods:

  • Active Directory
  • Active Directory plus token
  • Citrix Gateway

Subscriber experience for staying signed in

When subscribers sign in to Workspace on their device, Workspace prompts them to consent to staying signed in.

Stay signed in dialog

When the subscriber selects Allow, they stay signed in for the duration of the reauthentication period. If no activity is detected on a subscriber’s device for four days, the subscriber is automatically prompted to reauthenticate. After they sign in to the Workspace app, the reauthentication period remains in effect as long as they’re using their apps and desktops on the device.

If the subscriber selects Deny, Workspace prompts them to sign in again. Afterward, Workspace prompts the subscriber to sign in again after 24 hours have elapsed.

Opening Apps and Desktops

The Opening Apps and Desktops setting is available to customers who have access to Workspace Configuration and the new workspace experience. This preference applies to the way users open apps and desktops delivered by Citrix Virtual Apps and Desktops only (service, or on-premises from the Site aggregation feature). It doesn’t apply, for example, to SaaS apps delivered by the Citrix Gateway service. This preference is available to new and existing customers. However, the introduction of this feature doesn’t change any settings for existing customers.

Workspace Preferences settings

Choose one of the following settings:

  • In a native app (default). Uses a locally installed version of Citrix Workspace. This gives the best experience for the platform the subscriber is on.
  • In a browser. Uses Citrix Workspace for HTML5. No client software is required.
  • Let users choose. Prompts subscribers to detect a locally installed version of Citrix Workspace, or to use Citrix Workspace for HTML5 in their browser where possible.

There’s an additional option for the In a native app and Let users choose settings to guide users to install the latest version of Citrix Workspace if a local app isn’t detected automatically. Removing this selection makes sense if your users don’t have rights to install software.

Integrate Microsoft Teams with Workspace

With the Microsoft Teams integration, subscribers can share cards from their workspace Activity feed with other subscribers through channels in Microsoft Teams.


  • You must be a Full Access administrator in Citrix Cloud to enable Microsoft Teams integration. Administrators with Custom Access don’t have the required permissions to enable Microsoft Teams integration.
  • You must configure Azure AD authentication in Identity and Access Management. You can use only one Azure AD instance with Microsoft Teams. If the Azure AD instance you configure has Microsoft Teams enabled through another Citrix Cloud account, you can’t enable Microsoft Teams integration for your Citrix Cloud account. For more information about configuring Azure AD authentication, see Connect Azure Active Directory to Citrix Cloud.
  • You must have Microapps enabled in your Citrix Cloud account. For more information about enabling Microapps, see Getting started.
  • The feature toggle IwsMicrosoftTeams must be enabled. Contact your Citrix Cloud administrator for more information.
  • You must have the Actions and Activity Feed feature enabled for workspaces.
  • Workspace subscribers have the Microsoft Teams desktop client installed.

Enable Microsoft Teams integration

  1. After signing in to Citrix Cloud, select Workspace Configuration from the menu.
  2. Select Customize, and then the Preference tab.
  3. Under Enable Microsoft Teams, select the toggle to enable. The toggle turns green when the integration is successfully enabled.

    Enable button in Workspace preference console

  4. Select Save.

    Workspace users can now see the Send to Microsoft Teams option and share cards from Workspace. Users may need to refresh their screens (Ctrl+F5).

    Workspace Activity Feed with Send to Microsoft Teams highlighted

Accept Workspace permissions

There are other set-up steps that are required to enable this integration. The Microsoft Administrator account must accept the permissions of the integration in the Workspace UI so that users of your organization can share cards to Microsoft Teams.

  1. Log in to any workspace account and try to share a card. The following message appears if the Microsoft Administrator account hasn’t accepted permissions for integration with Microsoft Teams and you try to log in with a non-administrator account:

    Need admin approval

  2. To accept permissions, log in to your administrator account by selecting Have an admin account? Sign in with that account. The following permissions to access data are required to enable the Microsoft Teams integration with Citrix Workspace:

    Permissions requested

  3. When the Permissions accepted dialogue opens, review the options. The Consent on behalf of your organization grants permissions to all Workspace subscribers for this administrator. Otherwise, permissions are granted only for the administrator account.
  4. Select Accept.