SmartAccess allows NetScaler Gateway to determine automatically the methods of access that are allowed for a user device based on the results of an endpoint analysis scan. Access scenario fallback further extends this capability by allowing a user device to fall back from the NetScaler Gateway Plug-in to the Web Interface or StoreFront by using Citrix Receiver if the user device does not pass the initial endpoint analysis scan.
To enable access scenario fallback, you configure a post-authentication policy that determines whether or not users receive an alternative method of access when logging on to NetScaler Gateway. This post-authentication policy is defined as a client security expression that you configure either globally or as part of a session profile. If you configure a session profile, the profile is associated to a session policy that you then bind to users, groups, or virtual servers. When you enable access scenario fallback, NetScaler Gateway initiates an endpoint analysis scan after user authentication. The results for user devices that do not meet the requirements of a fallback post-authentication scan are as follows:
When clientless access is disabled, the following combination of settings must be configured for the access scenario fallback: