Product Documentation

Citrix Secure Hub

Citrix Secure Hub is the launchpad for the Citrix XenMobile experience. Users enroll their devices in Secure Hub to gain access to the Store. From the store, they can add Citrix-developed XenMobile Apps and third-party apps.

You can download Secure Hub and other XenMobile components from the XenMobile downloads page.

For Secure Hub and other XenMobile App system requirements, see System requirements for XenMobile Apps.

Administering Secure Hub

Important:

The MDX Toolkit 10.7.10 is the final release that supports the wrapping of XenMobile Apps. Users access XenMobile Apps versions 10.7.5 and later from the public app stores. For table listing the XenMobile Apps enterprise versions that you can wrap with the MDX Toolkit 10.7.10, see XenMobile compatibility.

You perform most of the administration tasks related to Secure Hub during the initial configuration of XenMobile. To make Secure Hub available to users, for iOS and Android, upload Secure Hub to the iOS App Store and the Google Play Store.

In addition to providing a portal for Citrix apps, Secure Hub refreshes most MDX policies stored in the XenMobile Server for the installed apps when a user’s NetScaler Gateway session renews after authentication using NetScaler Gateway.

Important:

Changes to any of the following policies require that a user delete and reinstall the app to apply the updated policy: Security Group, Enable encryption, and Secure Mail Exchange Server.

Citrix PIN

You can configure Secure Hub to use the Citrix PIN, a security feature enabled in the XenMobile console in Settings > Client Properties. The setting requires enrolled mobile device users to sign on to Secure Hub and activate any MDX wrapped apps by using a personal identification number (PIN).

The Citrix PIN feature simplifies the user authentication experience when logging on to the secured wrapped apps, keeping users from having to repeatedly enter another credential like their Active Directory user name and password.

Users who sign on to Secure Hub for the first time must enter their Active Directory user name and password. During sign-on, Secure Hub saves the Active Directory credentials or a client certificate on the user device and then prompts the user to enter a PIN. When users sign on again, they enter the PIN to access their Citrix apps and the Store securely, until the next idle timeout period ends for the active user session. Related client properties enable you to encrypt secrets using the PIN, specify the passcode type for the PIN, and specify PIN strength and length requirements. For details, see Client properties.

When fingerprint authentication is enabled, users can sign on by using a fingerprint when offline authentication is required because of app inactivity. Users still have to enter a PIN when signing on to Secure Hub for the first time, restarting the device, and after the inactivity timer expires. Fingerprint authentication is supported for iOS 9 and iOS 10.3 devices and some Android devices. For information about enabling fingerprint authentication, see the ENABLE_TOUCH_ID_AUTH setting in Client properties.

Certificate pinning

Secure Hub for iOS and Android supports SSL certificate pinning. This feature ensures that the certificate signed by your enterprise is used when Citrix clients communicate with XenMobile, thus preventing connections from clients to XenMobile when installation of a root certificate on the device compromises the SSL session. When Secure Hub detects any changes to the server public key, Secure Hub denies the connection.

As of Android N, the operating system no longer allows user-added certificate authorities (CAs). Citrix recommends using a public root CA in place of a user-added CA.

Users upgrading to Android N may experience problems if they use private or self-signed CAs. Connections on Android N devices break under the following scenarios:

  • Private/self-signed CAs and the Required Trusted CA for XenMobile option on XenMobile AutoDiscovery Service is set to ON. For details, see XenMobile AutoDiscovery Service.
  • Private/self-signed CAs and the AutoDiscovery Service (ADS) is not reachable. Due to security concerns, when ADS is not reachable, Required Trusted CA turns ON even it was set as OFF initially.

Before you enroll devices or upgrade Secure Hub, consider whether you want to enable certificate pinning, which is off by default and managed by the XenMobile Auto Discovery Service (ADS).

To use certificate pinning, request that Citrix upload certificates to the Citrix ADS server. Open a technical support case using the Citrix Support portal. Then, provide the following information:

  • The domain containing the accounts with which users will enroll.
  • The XenMobile Server fully qualified domain name (FQDN).
  • The XenMobile instance name. By default, the instance name is zdm and is case-sensitive.
  • User ID Type, which can be either UPN or Email. By default, the type is UPN.
  • The port used for iOS enrollment if you changed the port number from the default port 8443.
  • The port through which the XenMobile Server accepts connections if you changed the port number from the default port 443.
  • The full URL of your NetScaler Gateway.
  • Optionally, an email address for your XenMobile administrator.
  • The PEM-formatted certificates you want added to the domain.
  • How to handle any existing server certificates: Whether to remove the old server certificate immediately (because it is compromised) or to continue to support the old server certificate until it expires.

Your technical support case is updated when your details and certificate have been added to the Citrix servers.

Configuring certificate + one-time-password authentication for Secure Hub

You can configure NetScaler so that Secure Hub authenticates using a certificate plus a security token that serves as a one-time password. This configuration provides a strong security option that doesn’t leave an Active Directory footprint on devices.

To enable Secure Hub to use this type of authentication, add a rewrite action and a rewrite policy in NetScaler that inserts a custom response header of the form X-Citrix-AM-GatewayAuthType: CertAndRSA to indicate the NetScaler Gateway logon type.

Ordinarily, Secure Hub uses the NetScaler Gateway logon type configured in the XenMobile console. However, this information isn’t available to Secure Hub until Secure Hub completes logon for the first time, so the custom header is required to allow Secure Hub to do this.

Note:

If different logon types are set in XenMobile and NetScaler, the NetScaler configuration overrides the XenMobile configuration. For details, see NetScaler Gateway and XenMobile.

  1. In NetScaler, navigate to Configuration > AppExpert > Rewrite > Actions.

  2. Click Add.

    The Create Rewrite Action screen appears.

  3. Fill in each field as shown in the following figure and then click Create.

    Image of the Create Rewrite Action screen

    The following result appears on the main Rewrite Actions screen.

    Image of the Rewrite Actions screen result

  4. Bind the rewrite action to the virtual server as a rewrite policy. Go to Configuration > NetScaler Gateway > Virtual Servers and then select your virtual server.

    Image of the Virtual Servers screen

  5. Click Edit.

  6. On the Virtual Servers configuration screen, scroll down to Policies.

  7. Click + to add a policy.

    Image of the add policy option

  8. In the Choose Policy field, choose Rewrite.

  9. In the Choose Type field, choose Response.

    Image of the Response option

  10. Click Continue.

    The Policy Binding section expands.

    Image of the Policy Binding section

  11. Click Select Policy.

    A screen with available policies appears.

    Image of the available policies

  12. Click the row of the policy you just created and then click Select. The Policy Binding screen appears again, with your selected policy filled in.

    Image of the selected policy

  13. Click Bind.

    If the bind is successful, the main configuration screen appears with the completed rewrite policy shown.

    Image of a successful bind

  14. To view the policy details, click Rewrite Policy.

    Image of the Rewrite Policy details

Port requirement for ADS connectivity for Android devices

Port configuration ensures that Android devices connecting from Secure Hub can access the Citrix ADS from within the corporate network. The ability to access ADS is important when downloading security updates made available through ADS. ADS connections might not be compatible with your proxy server. In this scenario, allow the ADS connection to bypass the proxy server.

Important:

Secure Hub for Android and iOS require you to allow Android devices to access ADS. For details, see Port requirements in the XenMobile documentation. Note that this communication is on outbound port 443. It’s highly likely that your existing environment is designed to allow this access. Customers who cannot guarantee this communication are strongly discouraged from upgrading to Secure Hub 10.2. If you have any questions, please contact Citrix support.

Customers interested in enabling certificate pinning must do the following prerequisites:

  • Collect XenMobile Server and NetScaler certificates. The certificates must be in PEM format and must be a public certificate and not the private key.
  • Contact Citrix support and place a request to enable certificate pinning. During this process, you are asked for your certificates.

The new certificate pinning improvements require that devices connect to ADS before the device enrolls. This ensures that the latest security information is available to Secure Hub for the environment in which the device is enrolling. If devices cannot reach ADS, Secure Hub does not allow enrollment of the device. Therefore, opening up ADS access within the internal network is critical to enable devices to enroll.

To allow access to the ADS for Secure Hub 10.2 for Android, open port 443 for the following IP addresses and FQDN:

FQDN IP address Port IP and port usage
discovery.mdm.zenprise.com 52.5.138.94 443 Secure Hub - ADS Communication
discovery.mdm.zenprise.com 52.1.30.122 443 Secure Hub - ADS Communication
ads.xm.cloud.com: note that SecureHub version 10.6.15 and later uses ads.xm.cloud.com. 34.194.83.188 443 Secure Hub - ADS Communication
ads.xm.cloud.com: note that SecureHub version 10.6.15 and later uses ads.xm.cloud.com. 34.193.202.23 443 Secure Hub - ADS Communication

If certificate pinning is enabled:

  • Secure Hub pins your enterprise certificate during device enrollment.
  • During an upgrade, Secure Hub discards any currently pinned certificate and then pins the server certificate on the first connection for enrolled users.

    Note:

    If you enable certificate pinning after an upgrade, users must enroll again.

  • Certificate renewal does not require reenrollment, provided that the certificate public key did not change.

Certificate pinning supports leaf certificates, not intermediate or issuer certificates. Certificate pinning applies to Citrix servers, such as XenMobile and NetScaler Gateway, and not third-party servers.

Secure Hub features

Secure Hub allows you to monitor and enforce mobile policies while providing access to the Store and live support. Users begin by downloading Secure Hub onto their devices from the Apple, Android, or Windows app store.

When Secure Hub opens, users enter the credentials provided by their companies to enroll their devices in Secure Hub. For more details about device enrollment, see Enroll devices.

On Secure Hub for Android, during initial installation and enrollment, the following message appears: Allow Secure Hub to access photos, media, and files on your device?

Note that this message comes from the Android operating system and not from Citrix. When you tap Allow, Citrix and the admins who manage Secure Hub do not view your personal data at any time. If however, you conduct a remote support session with your admin, the admin can view your personal files within the session.

Once enrolled, users see any apps and desktops that you’ve pushed in their My Apps tab. Users can add more apps from the Store. On phones, the Store link is under the Settings hamburger icon in the upper left-hand corner.

Image of the Store Link

On tablets, the Store is a separate tab.

Image of the Store on tablets

When users with iPhones running iOS 9 or later install XenMobile Apps from the XenMobile Store, they see a message stating that the enterprise developer, Citrix, is not trusted on that iPhone and the app will not be available for use until the developer is trusted. When this message appears, Secure Hub prompts users to view a guide that coaches them through the process of trusting Citrix enterprise apps for their iPhone.

For MAM-only deployments, you can configure XenMobile so that users with Android or iOS devices who enroll in Secure Hub using email credentials are automatically enrolled in Secure Mail. Users do not have to enter more information or take more steps to enroll in Secure Mail.

On first-time use of Secure Mail, Secure Mail obtains the user’s email address, domain, and user ID from Secure Hub. Secure Mail uses the email address for autodiscovery. The Exchange server is identified using the domain and user ID, which enables Secure Mail to authenticate the user automatically. The user is prompted to enter a password if the policy is set to not pass through the password, but the user is not required to enter any more information.

To enable this feature, create three properties:

  • The server property MAM_MACRO_SUPPORT. For instructions, see Server properties.
  • The client properties ENABLE_CREDENTIAL_STORE and SEND_LDAP_ATTRIBUTES. For instructions, see Client properties.

If you want to customize your Store, go to Settings > Client Branding to change the name, add a logo, and specify how apps appear.

Image of the Client Branding image

You can edit app descriptions in the XenMobile console. Click Configure then click Apps. Select the app from the table and then click Edit. Select the platforms for the app with the description you’re editing and then type the text in the Description box.

Image of the Description box

In the Store, users can browse only those apps and desktops that you’ve configured and secured in XenMobile. To add the app, users tap Details and then tap Add.

Secure Hub also offers users a variety of ways to get help. On tablets, tapping the question mark in the upper-right corner opens help options. On phones, users tap the hamburger menu icon in the upper-left corner and then tap Help.

Image of the Help screen

Your IT Department shows the telephone and email of your company help desk, which users can access directly from the app. You enter phone numbers and email addresses in the XenMobile console. Click the gear icon in the upper-right corner. The Settings page appears. Click More and then click Client Support. The screen where you enter the information appears.

Image of the Client Support screen

Report Issue shows a list of apps. Users select the app that has the issue. Secure Hub automatically generates logs and then opens a message in Secure Mail with the logs attached as a zip file. Users add subject lines and descriptions of the issue. They can also attach a screenshot.

Send Feedback to Citrix opens a message in Secure Mail with a Citrix support address filled in. In the body of the message, the user can enter suggestions for improving Secure Mail. If Secure Mail isn’t installed on the device, the native mail program opens.

Users can also tap Citrix Support, which opens the Citrix Knowledge Center. From there, they can search support articles for all Citrix products.

In Preferences, users can find information about their accounts and devices.

Secure Hub also provides geo-location and geo-tracking policies if, for example, you want to ensure that a corporate-owned device does not breach a certain geographic perimeter. For details, see Location device policies. Additionally, Secure Hub automatically collects and analyzes failure information so you can see what led to a particular failure. This function is supported by the software Crashlytics.