SlideShare una empresa de Scribd logo
1 de 10
Citrix Systems, Inc. © 2013 Page 1 of 10
XenMobile Packet Flow| Citrix MPG Marketing
XenMobile Packet Flow
Citrix Systems, Inc. © 2013 Page 2 of 10
Contents
Introduction .............................................................................................................................................. 1
Authentication Sequence with Access Gateway...................................................................................... 2
MDM Enrollment Sequence iOS .............................................................................................................. 3
MDM Enrollment Sequence Android........................................................................................................ 4
External Access Sequence to XMA ......................................................................................................... 5
Internal Access Sequence to AppController ............................................................................................ 7
Citrix Systems, Inc. © 2013 Page 1 of 10
Introduction
The purpose of this document is to illustrate a high level overview of the traffic flow between Enroll / Worx
Home / Receiver, Netscaler, XenMobile Device Manager, and XenMobile AppController.
The AppController sequence assumes that the environment has the following constraints:
1. NetScaler:
Is Deployed in the DMZ
Has access to Active Directory on port 389 or 636
Has access to XMA on port 443 and 80
2. AppController:
Has access to Active Directory on port 389 or 636
3. Users:
Have mobile devices that are connected to an external network (Wifi/3or4G) and can
communicate directly with XMA on port 443 and 80
The MDM sequence for Android does not require an APNS certificate or a Developer Account. They are
exclusively for iOS.
Citrix Systems, Inc. © 2013 Page 2 of 10
Authentication Sequence with Access Gateway
1. User connects to Access Gateway
2. Access Gateway prompts the user to authenticate
3. User enters their Active Directory credentials
4. Access Gateway takes the users credentials and verifies them with Active Directory
5. Active Directory responds with an authentication successful message
6. Access Gateway creates a token SSOs to XMA
7.
XMA extracts the users credentials from the token and uses them to verify the user with Active
Directory
8. Active Directory responds with an authentication successful message
9. XMA now makes a callback to Access Gateway to verify that the request initiated from there
10. Callback succeeds and the apps are enumerated
Citrix Systems, Inc. © 2013 Page 3 of 10
MDM Enrollment Sequence iOS
Step
From To Protocol Port Description
1.
Mobile
Device
AppleApp
Store
HTTP
443
(80?)
User downloads and installs Citrix Enroll on their
mobile device
2. Enroll XDM
HTTPS /
SSL
443 User enter credentials
3. Enroll XDM
HTTPS /
SSL /
DNS
8443
If domain is specified in the user dialog, the Worx
Home app will verify the Citrix NOC
discover.mdm.zenprice.com to verify if XDM server
is registered for the domain
4. Enroll XDM HTTP 8443
If not found, user is prompted for XDM server name
(FQDN).
5. Enroll XDM HTTP 8443 If found, user is prompted for password
6. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
User credentials are verified against LDAP server
7. Enroll XDM SSL 8443
If successful, device is connected through a
persistent, long-lived HTTPS connection (Root CA
and MDM profile)
8. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
XDM server verified user group membership against
LDAP server
9. XDM Enroll SSL 8443
User must accept profiles pushed down to the user
via HTTPS connection to server (Root CA and MDM
profile)
10. XDM APNS APNS 2195
XDM server initiates connection to APNS network to
tell the device to wake up
11. APNS Enroll SSL 5223
12. Enroll XDM
HTTPS /
SSL
443
XDM server tells device to call home to the XDM
server
13. XDM APNS APNS 2196
XDM server requests acknowledgement of
acceptance and status of request via APNS network
14. XDM Worx Home
HTTPS /
SSL
443
Based on AD group membership, policies,
applications and files are pushed to the device thru
the HTTPS connection
15. XDM APNS APNS 2196
XDM server requests acknowledgement of
acceptance and status of request via APNS network
Citrix Systems, Inc. © 2013 Page 4 of 10
MDM Enrollment Sequence Android
Step
From To Protocol Port Description
1.
Mobile
Device
Google Play
Store
HTTP 80
User downloads and installs Citrix Worx Homeon
their mobile device
2. Worx Home XDM
HTTP /
HTTPS /
SSL
443 User enter credentials
3. Worx Home XDM
HTTP /
HTTPS /
SSL /
DNS
443 /
53
If domain is specified in the user dialog, the connect
app will verify the Citrix. NOC
discover.mdm.zenprise.com to verify if XDM server
is registered for the domain
4. Worx Home XDM
HTTP /
HTTPS /
SSL
443
If not found, user is prompted for XDM server name
(FQDN). No HTTPS:// needed in server-name.
5. Worx Home XDM
HTTP /
HTTPS /
SSL
443 If found, user is prompted for password
6. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
User credentials are verified against LDAP server
7. Worx Home XDM
HTTP /
HTTPS /
SSL
443
If successful, device is connected through a
persistent, long-lived HTTPS connection
8. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
XDM server verified user group membership against
LDAP server
9. XDM Worx Home
HTTPS /
SSL
443
Based on AD group membership, policies,
applications and files are pushed to the device
through the HTTPS connection
10. XDM Worx Home
HTTP /
HTTPS /
SSL
Any
port
Geo Locate is requested to the device through the
persistent HTTPs connection from the server to the
device
11. No network activity
The device attempts to obtain a GPS lock via the
onboard GPS chip. The user must have location
service enabled for this to work
12. Worx Home XDM
HTTPS /
SSL
443
If the device retrieves a lock, it sends the request
back to the XDM. XDM does NOT do cell tower
location
13. XDM Worx Home
HTTPS /
SSL
443
Wipe of the device is sent from the server to the
device via the HTTPS connection initiated by the
device
14. Worx Home XDM
HTTP /
HTTPS /
SSL
Any
port
The Worx Home app verifies that command was
received via the HTTPS connection, ensure the
server received the acknowledgement and wipes the
device
Citrix Systems, Inc. © 2013 Page 5 of 10
External Access Sequence to XMA
Step
From To Protocol Port Description
1.
Mobile
Device
Apple App
Store
HTTP 80
User downloads and installs Receiver on their
mobile device
2. Receiver
Access
Gateway
HTTPS /
SSL
443
User clicks Add Account and connects to Access
Gateway
3.
Access
Gateway
Receiver
HTTPS /
SSL
443
Access Gateway (AG) verifies that the user is
requesting a valid resource and then prompts the
user to authenticate
4. Receiver
Access
Gateway
HTTPS /
SSL
443
User authenticates using their AD credentials (and
OTT if it exists)
5.
Access
Gateway
Active
Directory
LDAP /
LDAPS
389 /
636
AG verifies credentials by checking with AD
6.
Access
Gateway
XMA
HTTPS /
SSL
443 AG creates a token and SSOs to XMA
7. XMA
Active
Directory
LDAP /
LDAPS
389 /
636
XMAuses the token to authenticate the user against
Active Directory
8. XMA
Access
Gateway
HTTPS /
SSL
443
XMAthen makes a callback to AG to verify that the
authentication request originated at AG
9. Receiver XMA
HTTPS /
SSL
443
If the authentication is successful, Receiver then
makes a GET request for the store information (.cr
file)
10. XMA Receiver
HTTPS /
SSL
443
XMAvalidates the endpoint, registers the device
(Receiver), pushes down the .cr file
11. XMA
Active
Directory
HTTPS /
SSL
389 /
636 /
443
XMAchecks that the user belongs to the correct role
i.e group in AD and sends the list of resources (app
icons for each resource) down to the Receiver
12. XMA Receiver
HTTPS /
SSL
443
13. Receiver XMA
HTTPS /
SSL
443
User subscribes to a resource such as a native
mobile app
14. XMA Receiver HTTP 80
XMAmakes note of this subscription and then sends
down the app to the mobile device
15. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (Formfill)
application
16. XMA Receiver
HTTPS /
SSL
443
XMAmakes note of this subscription and then
prompts the user to provide Web/SaaS application
credentials
Citrix Systems, Inc. © 2013 Page 6 of 10
17. Receiver XMA
HTTPS /
SSL
443 XMAsaves credentials in its local database
18. XMA Receiver
HTTPS /
SSL
443
XMAissues a redirect to the endpoint device with the
required form
19. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
20. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (SAML)
application
21. XMA Receiver
HTTPS /
SSL
443 XMAmakes note of this subscription
22. XMA XMA
HTTPS /
SSL
443
XMAsaves Web/SaaS app username in its local
database
23. XMA Receiver
HTTPS /
SSL
443
XMAissues a SAML token with a redirect to the
endpoint device
24. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
Citrix Systems, Inc. © 2013 Page 7 of 10
Policies, apps, and file
Internal Access Sequence to XMA
Step
From To Protocol Port Description
1. Mobile
Device
XMA HTTP 80
User downloads and installs Receiver on their
mobile device
2. Receiver XMA
HTTPS /
SSL
443 User clicks Add Account and connects to XMA
3. XMA Receiver
HTTPS /
SSL
443
XMAverifies that the user is requesting a valid
resource and then prompts the user to authenticate
4. Receiver XMA
HTTPS /
SSL
443
User authenticates using their AD credentials
against Active Directory
5. XMA
Active
Directory
LDAP /
LDAPS
389 /
636
6. Receiver XMA
HTTPS /
SSL
443
If the authentication is successful, Receiver requests
for the store information (.cr file)
7. Receiver XMA
HTTPS /
SSL
443
XMAvalidates the endpoint, registers the device
(Receiver), and pushes down the .cr file
8. XMA
Active
Directory
HTTPS /
SSL
389 /
636 /
443 XMAverifies the user’s role group in AD and sends a
list of resources to the Receiver
9. XMA Receiver
HTTPS /
SSL
443
10. Receiver XMA HTTP 80
User subscribes to a resource such as a native
mobile app
11. XMA Receiver HTTP 80
XMAmakes note of this subscription and then sends
down the app to the mobile device
12. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (Formfill)
application
13. XMA Receiver
HTTPS /
SSL
443
XMAmakes note of this subscription and then
prompts the user to provide Web/SaaS application
credentials
14. Receiver XMA
HTTS /
SSL
443 XMAsaves credentials in its local database
15. XMA Receiver
HTTPS /
SSL
443
XMAissues a redirect to the endpoint device with the
required form
16. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
Citrix Systems, Inc. © 2013 Page 8 of 10
17. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (SAML)
application
18. XMA Receiver
HTTPS /
SSL
443 XMAmakes note of this subscription
19. XMA XMA
HTTPS /
SSL
443
XMAsaves Web/SaaS app username in its local
database
20. XMA Receiver
HTTPS /
SSL
443
XMAissues a SAML token with a redirect to the
endpoint device
21. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on

Más contenido relacionado

La actualidad más candente

Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
 
CI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day IsraelCI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day IsraelAmazon Web Services
 
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)Amazon Web Services
 
How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)Shiu-Fun Poon
 
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : Sécurité
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : SécuritéAlphorm.com Formation CCNP ENCOR 350-401 (6of8) : Sécurité
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : SécuritéAlphorm
 
WebSphere Application Server
WebSphere Application ServerWebSphere Application Server
WebSphere Application ServerNishant Mevawala
 
Who carries your container? Zun or Magnum?
Who carries your container? Zun or Magnum?Who carries your container? Zun or Magnum?
Who carries your container? Zun or Magnum?Madhuri Kumari
 
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Amazon Web Services
 
Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT SUPRIYAT9
 
What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019IBM DataPower Gateway
 
IBM WebSphere application server
IBM WebSphere application serverIBM WebSphere application server
IBM WebSphere application serverIBM Sverige
 
8 - OpenShift - A look at a container platform: what's in the box
8 - OpenShift - A look at a container platform: what's in the box8 - OpenShift - A look at a container platform: what's in the box
8 - OpenShift - A look at a container platform: what's in the boxKangaroot
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
CI/CD on AWS Deploy Everything All the Time
CI/CD on AWS Deploy Everything All the TimeCI/CD on AWS Deploy Everything All the Time
CI/CD on AWS Deploy Everything All the TimeAmazon Web Services
 
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...Amazon Web Services Korea
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxCarlo Sacchi
 
Introduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config publicIntroduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config publicPetchpaitoon Krungwong
 

La actualidad más candente (20)

Data power use cases
Data power use casesData power use cases
Data power use cases
 
CI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day IsraelCI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day Israel
 
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)
AWS re:Invent 2016: Offload Security Heavy-lifting to the AWS Edge (CTD204)
 
AWS networking fundamentals
AWS networking fundamentalsAWS networking fundamentals
AWS networking fundamentals
 
How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)
 
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : Sécurité
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : SécuritéAlphorm.com Formation CCNP ENCOR 350-401 (6of8) : Sécurité
Alphorm.com Formation CCNP ENCOR 350-401 (6of8) : Sécurité
 
WebSphere Application Server
WebSphere Application ServerWebSphere Application Server
WebSphere Application Server
 
PROYECTO: WSUS
PROYECTO: WSUSPROYECTO: WSUS
PROYECTO: WSUS
 
Who carries your container? Zun or Magnum?
Who carries your container? Zun or Magnum?Who carries your container? Zun or Magnum?
Who carries your container? Zun or Magnum?
 
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
 
Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT Supriya reddy Azure Certification PPT
Supriya reddy Azure Certification PPT
 
What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019
 
IBM WebSphere application server
IBM WebSphere application serverIBM WebSphere application server
IBM WebSphere application server
 
8 - OpenShift - A look at a container platform: what's in the box
8 - OpenShift - A look at a container platform: what's in the box8 - OpenShift - A look at a container platform: what's in the box
8 - OpenShift - A look at a container platform: what's in the box
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Weblogic12 c installation guide
Weblogic12 c installation guideWeblogic12 c installation guide
Weblogic12 c installation guide
 
CI/CD on AWS Deploy Everything All the Time
CI/CD on AWS Deploy Everything All the TimeCI/CD on AWS Deploy Everything All the Time
CI/CD on AWS Deploy Everything All the Time
 
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
Airbnb가 직접 들려주는 Kubernetes 환경 구축 이야기 - Melanie Cebula 소프트웨어 엔지니어, Airbnb :: A...
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
 
Introduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config publicIntroduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config public
 

Destacado

Fronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerFronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerNuno Alves
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)Fatbardh Hysa
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

Destacado (11)

Fronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerFronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScaler
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionality
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Similar a XenMobile Packet Flow

Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...David McGeough
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionDigicomp Academy AG
 
Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideNuno Alves
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptxAlireza Vafi
 
Usint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTUsint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTAnatoliy Odukha
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxssuser865ecd
 
Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Lan & Wan Solutions
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicHarihara sarma
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Hai Nguyen
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Nino Ho
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...David McGeough
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...David McGeough
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubiplotnikov
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Soracom Global, Inc.
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 

Similar a XenMobile Packet Flow (20)

Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise Edition
 
Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation Guide
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptx
 
Usint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTUsint Charles Proxy to understand REST
Usint Charles Proxy to understand REST
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
 
Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud!
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 

Más de Nuno Alves

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overviewNuno Alves
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Nuno Alves
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network ConfigurationsNuno Alves
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionNuno Alves
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video deliveryNuno Alves
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesNuno Alves
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overviewNuno Alves
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - finalNuno Alves
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practicesNuno Alves
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologiesNuno Alves
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage OverviewNuno Alves
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 BlueprintNuno Alves
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Nuno Alves
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNuno Alves
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Nuno Alves
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guideNuno Alves
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the NumbersNuno Alves
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 

Más de Nuno Alves (20)

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overview
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network Configurations
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 Solution
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video delivery
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log Messages
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - final
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practices
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologies
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage Overview
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization team
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guide
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the Numbers
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

XenMobile Packet Flow

  • 1. Citrix Systems, Inc. © 2013 Page 1 of 10 XenMobile Packet Flow| Citrix MPG Marketing XenMobile Packet Flow
  • 2. Citrix Systems, Inc. © 2013 Page 2 of 10 Contents Introduction .............................................................................................................................................. 1 Authentication Sequence with Access Gateway...................................................................................... 2 MDM Enrollment Sequence iOS .............................................................................................................. 3 MDM Enrollment Sequence Android........................................................................................................ 4 External Access Sequence to XMA ......................................................................................................... 5 Internal Access Sequence to AppController ............................................................................................ 7
  • 3. Citrix Systems, Inc. © 2013 Page 1 of 10 Introduction The purpose of this document is to illustrate a high level overview of the traffic flow between Enroll / Worx Home / Receiver, Netscaler, XenMobile Device Manager, and XenMobile AppController. The AppController sequence assumes that the environment has the following constraints: 1. NetScaler: Is Deployed in the DMZ Has access to Active Directory on port 389 or 636 Has access to XMA on port 443 and 80 2. AppController: Has access to Active Directory on port 389 or 636 3. Users: Have mobile devices that are connected to an external network (Wifi/3or4G) and can communicate directly with XMA on port 443 and 80 The MDM sequence for Android does not require an APNS certificate or a Developer Account. They are exclusively for iOS.
  • 4. Citrix Systems, Inc. © 2013 Page 2 of 10 Authentication Sequence with Access Gateway 1. User connects to Access Gateway 2. Access Gateway prompts the user to authenticate 3. User enters their Active Directory credentials 4. Access Gateway takes the users credentials and verifies them with Active Directory 5. Active Directory responds with an authentication successful message 6. Access Gateway creates a token SSOs to XMA 7. XMA extracts the users credentials from the token and uses them to verify the user with Active Directory 8. Active Directory responds with an authentication successful message 9. XMA now makes a callback to Access Gateway to verify that the request initiated from there 10. Callback succeeds and the apps are enumerated
  • 5. Citrix Systems, Inc. © 2013 Page 3 of 10 MDM Enrollment Sequence iOS Step From To Protocol Port Description 1. Mobile Device AppleApp Store HTTP 443 (80?) User downloads and installs Citrix Enroll on their mobile device 2. Enroll XDM HTTPS / SSL 443 User enter credentials 3. Enroll XDM HTTPS / SSL / DNS 8443 If domain is specified in the user dialog, the Worx Home app will verify the Citrix NOC discover.mdm.zenprice.com to verify if XDM server is registered for the domain 4. Enroll XDM HTTP 8443 If not found, user is prompted for XDM server name (FQDN). 5. Enroll XDM HTTP 8443 If found, user is prompted for password 6. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 User credentials are verified against LDAP server 7. Enroll XDM SSL 8443 If successful, device is connected through a persistent, long-lived HTTPS connection (Root CA and MDM profile) 8. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 XDM server verified user group membership against LDAP server 9. XDM Enroll SSL 8443 User must accept profiles pushed down to the user via HTTPS connection to server (Root CA and MDM profile) 10. XDM APNS APNS 2195 XDM server initiates connection to APNS network to tell the device to wake up 11. APNS Enroll SSL 5223 12. Enroll XDM HTTPS / SSL 443 XDM server tells device to call home to the XDM server 13. XDM APNS APNS 2196 XDM server requests acknowledgement of acceptance and status of request via APNS network 14. XDM Worx Home HTTPS / SSL 443 Based on AD group membership, policies, applications and files are pushed to the device thru the HTTPS connection 15. XDM APNS APNS 2196 XDM server requests acknowledgement of acceptance and status of request via APNS network
  • 6. Citrix Systems, Inc. © 2013 Page 4 of 10 MDM Enrollment Sequence Android Step From To Protocol Port Description 1. Mobile Device Google Play Store HTTP 80 User downloads and installs Citrix Worx Homeon their mobile device 2. Worx Home XDM HTTP / HTTPS / SSL 443 User enter credentials 3. Worx Home XDM HTTP / HTTPS / SSL / DNS 443 / 53 If domain is specified in the user dialog, the connect app will verify the Citrix. NOC discover.mdm.zenprise.com to verify if XDM server is registered for the domain 4. Worx Home XDM HTTP / HTTPS / SSL 443 If not found, user is prompted for XDM server name (FQDN). No HTTPS:// needed in server-name. 5. Worx Home XDM HTTP / HTTPS / SSL 443 If found, user is prompted for password 6. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 User credentials are verified against LDAP server 7. Worx Home XDM HTTP / HTTPS / SSL 443 If successful, device is connected through a persistent, long-lived HTTPS connection 8. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 XDM server verified user group membership against LDAP server 9. XDM Worx Home HTTPS / SSL 443 Based on AD group membership, policies, applications and files are pushed to the device through the HTTPS connection 10. XDM Worx Home HTTP / HTTPS / SSL Any port Geo Locate is requested to the device through the persistent HTTPs connection from the server to the device 11. No network activity The device attempts to obtain a GPS lock via the onboard GPS chip. The user must have location service enabled for this to work 12. Worx Home XDM HTTPS / SSL 443 If the device retrieves a lock, it sends the request back to the XDM. XDM does NOT do cell tower location 13. XDM Worx Home HTTPS / SSL 443 Wipe of the device is sent from the server to the device via the HTTPS connection initiated by the device 14. Worx Home XDM HTTP / HTTPS / SSL Any port The Worx Home app verifies that command was received via the HTTPS connection, ensure the server received the acknowledgement and wipes the device
  • 7. Citrix Systems, Inc. © 2013 Page 5 of 10 External Access Sequence to XMA Step From To Protocol Port Description 1. Mobile Device Apple App Store HTTP 80 User downloads and installs Receiver on their mobile device 2. Receiver Access Gateway HTTPS / SSL 443 User clicks Add Account and connects to Access Gateway 3. Access Gateway Receiver HTTPS / SSL 443 Access Gateway (AG) verifies that the user is requesting a valid resource and then prompts the user to authenticate 4. Receiver Access Gateway HTTPS / SSL 443 User authenticates using their AD credentials (and OTT if it exists) 5. Access Gateway Active Directory LDAP / LDAPS 389 / 636 AG verifies credentials by checking with AD 6. Access Gateway XMA HTTPS / SSL 443 AG creates a token and SSOs to XMA 7. XMA Active Directory LDAP / LDAPS 389 / 636 XMAuses the token to authenticate the user against Active Directory 8. XMA Access Gateway HTTPS / SSL 443 XMAthen makes a callback to AG to verify that the authentication request originated at AG 9. Receiver XMA HTTPS / SSL 443 If the authentication is successful, Receiver then makes a GET request for the store information (.cr file) 10. XMA Receiver HTTPS / SSL 443 XMAvalidates the endpoint, registers the device (Receiver), pushes down the .cr file 11. XMA Active Directory HTTPS / SSL 389 / 636 / 443 XMAchecks that the user belongs to the correct role i.e group in AD and sends the list of resources (app icons for each resource) down to the Receiver 12. XMA Receiver HTTPS / SSL 443 13. Receiver XMA HTTPS / SSL 443 User subscribes to a resource such as a native mobile app 14. XMA Receiver HTTP 80 XMAmakes note of this subscription and then sends down the app to the mobile device 15. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (Formfill) application 16. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription and then prompts the user to provide Web/SaaS application credentials
  • 8. Citrix Systems, Inc. © 2013 Page 6 of 10 17. Receiver XMA HTTPS / SSL 443 XMAsaves credentials in its local database 18. XMA Receiver HTTPS / SSL 443 XMAissues a redirect to the endpoint device with the required form 19. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on 20. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (SAML) application 21. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription 22. XMA XMA HTTPS / SSL 443 XMAsaves Web/SaaS app username in its local database 23. XMA Receiver HTTPS / SSL 443 XMAissues a SAML token with a redirect to the endpoint device 24. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on
  • 9. Citrix Systems, Inc. © 2013 Page 7 of 10 Policies, apps, and file Internal Access Sequence to XMA Step From To Protocol Port Description 1. Mobile Device XMA HTTP 80 User downloads and installs Receiver on their mobile device 2. Receiver XMA HTTPS / SSL 443 User clicks Add Account and connects to XMA 3. XMA Receiver HTTPS / SSL 443 XMAverifies that the user is requesting a valid resource and then prompts the user to authenticate 4. Receiver XMA HTTPS / SSL 443 User authenticates using their AD credentials against Active Directory 5. XMA Active Directory LDAP / LDAPS 389 / 636 6. Receiver XMA HTTPS / SSL 443 If the authentication is successful, Receiver requests for the store information (.cr file) 7. Receiver XMA HTTPS / SSL 443 XMAvalidates the endpoint, registers the device (Receiver), and pushes down the .cr file 8. XMA Active Directory HTTPS / SSL 389 / 636 / 443 XMAverifies the user’s role group in AD and sends a list of resources to the Receiver 9. XMA Receiver HTTPS / SSL 443 10. Receiver XMA HTTP 80 User subscribes to a resource such as a native mobile app 11. XMA Receiver HTTP 80 XMAmakes note of this subscription and then sends down the app to the mobile device 12. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (Formfill) application 13. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription and then prompts the user to provide Web/SaaS application credentials 14. Receiver XMA HTTS / SSL 443 XMAsaves credentials in its local database 15. XMA Receiver HTTPS / SSL 443 XMAissues a redirect to the endpoint device with the required form 16. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on
  • 10. Citrix Systems, Inc. © 2013 Page 8 of 10 17. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (SAML) application 18. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription 19. XMA XMA HTTPS / SSL 443 XMAsaves Web/SaaS app username in its local database 20. XMA Receiver HTTPS / SSL 443 XMAissues a SAML token with a redirect to the endpoint device 21. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on