Create the user store

This topic helps you create the user store in a way that best suits your organization. In addition to reviewing the information here, be sure to configure the path to the user store as efficiently as possible. For example, configure the path by the sensible use of variables. For advice and examples on that subject, see Specify the path to the user store.

The user store is the central, network location for storing Citrix user profiles.

Any Server Message Block (SMB) or Common Internet File System (CIFS) file share can be used for the user store. The best practice is to ensure that the share:

  • Can be accessed by the accounts used with Citrix user profiles
  • Is large enough to store profile data
  • Is robust in case of disk or network failure

This diagram illustrates an example user store in relation to storage for redirected folder items, the cross-platform settings store (on a separate file server), and Windows 7 virtual desktops published with Citrix Virtual Desktops and running Microsoft Office. User devices that access the virtual desktops are also shown for reference.

This graphic illustrates an example user store in relation to storage for redirected folder items, the cross-platform settings store (on a separate file server), and Windows 7 virtual desktops published with XenDesktop and running Microsoft Office. User devices that access the virtual desktops are also shown for reference.

Recommendations on creating secure user stores are available in the article called Create a file share for roaming user profiles on the Microsoft TechNet Web site. These minimum recommendations ensure a high level of security for basic operation. Additionally, when configuring access to the user store, include the Administrators group, which is required to modify or remove a Citrix user profile.

If your deployment includes multiple platforms, review the information on Version 1 and Version 2 profile types in Plan for multiple platforms. As for the structure of the user store, see Profile Management architecture.

Note: If an application modifies the access control list (ACL) of a file in the user’s profile, Profile Management does not replicate those changes in the user store. This is consistent with the behavior of Windows roaming profiles.

Create the user store

In this article