When users install Citrix Receiver on their device, when they log on
for the first time, App Controller registers the device. Then, the device is
included in the App Controller inventory and appears on the
tab in the App Controller management
console. The inventory displays all devices that connect to App Controller from
Receiver. For each device, the list provides the following information:
- Type of device with which
the user logs on
- Operating system of the
- Model of the user device
- Name of the user device
- User ID of the person who
owns the device
- Last time the user logged
on with Receiver
- Action you can take on the
For each device in the list, you can perform the following actions for
application data and documents from the device. If users lose an
iOS or Android device and do not locate the device in a specified period of
time, or if the user leaves the organization, you can erase application data
and ShareFile documents from the user device.
- Stop erasing
data and documents the device. If you determine that the device is
safe, you can stop erasing the data and documents on the device. Users can
access their apps and ShareFile documents when you stop erasing.
- Lock and unlock
the device. If users lose an iOS or Android device, you can lock
applications on the device that App Controller delivers, which prevents
unauthorized access to the applications. You can later unlock the same
- Delete the
device. You can delete a device as a part of device inventory
maintenance, if, for example, the device is lost or destroyed.
The lock and erase functions take effect after Receiver polls App
Controller. The polls occur every 60 minutes by default.
An erased or locked device continues to appear in the inventory in the
management console. If users do not need access to the device, you can remove
the device from the inventory. When you erase application data from the device,
the device listing appears in
All Devices and
Erased. If you lock a device, the listing
All Devices and
Locked. These lists allow you to see at a glance
the devices that are currently active and the devices that might be
The following table shows the icons that you can use to perform the
preceding actions for all devices, including devices that are connected to App
Used for deleting a user device from the inventory.
Used to lock a user device.
Used to unlock a user device after you have locked it.
Used to erase application data and documents from the user
Used to stop erasing application data, and documents on the