Product Documentation

Set client resource permissions

May 08, 2015

This topic applies only to deployments using Web Interface.

You can set client resource permissions using trusted and restricted site regions by:

  • Adding the Web Interface site to the Trusted Site list
  • Making changes to new registry settings
Note: Due to enhancements to Receiver, the .ini procedure available in earlier versions of the plug-in/Receiver is replaced with these procedures.
Caution: Editing the registry incorrectly can cause serious problems that may require you to reinstall your operating system. Citrix cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Be sure to back up the registry before you edit it.

Add the Web Interface site to the trusted site list

  1. From the Internet Explorer Tools menu, choose Internet Options > Security.
  2. Select the Trusted sites icon and click the Sites button.
  3. In the Add this website to the zone text field, type the URL to your Web Interface site and click Add.
  4. Download the registry settings from http://support.citrix.com/article/CTX133565 and make any registry changes. Use SsonRegUpx86.reg for Win32 user devices and SsonRegUpx64.reg for Win64 user devices.
  5. Log off and then log on to the user device.

Change client resource permissions in the registry

  1. Download the registry settings from http://support.citrix.com/article/CTX133565 and import the settings on each user device. Use SsonRegUpx86.reg for Win32 user devices and SsonRegUpx64.reg for Win64 user devices.
  2. In the registry editor, navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\ICA Client\Client Selective Trust and in the appropriate regions, change the default value to the required access values for any of the following resources:
    Resource key Resource description
    FileSecurityPermission Client drives
    MicrophoneAndWebcamSecurityPermission Microphones and webcams
    ScannerAndDigitalCameraSecurityPermission USB and other devices
    Value Description
    0 No Access
    1 Read-only access
    2 Full access
    3 Prompt user for access