SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Citrix Systems, Inc. © 2013 Page 1 of 10
XenMobile Packet Flow| Citrix MPG Marketing
XenMobile Packet Flow
Citrix Systems, Inc. © 2013 Page 2 of 10
Contents
Introduction .............................................................................................................................................. 1
Authentication Sequence with Access Gateway...................................................................................... 2
MDM Enrollment Sequence iOS .............................................................................................................. 3
MDM Enrollment Sequence Android........................................................................................................ 4
External Access Sequence to XMA ......................................................................................................... 5
Internal Access Sequence to AppController ............................................................................................ 7
Citrix Systems, Inc. © 2013 Page 1 of 10
Introduction
The purpose of this document is to illustrate a high level overview of the traffic flow between Enroll / Worx
Home / Receiver, Netscaler, XenMobile Device Manager, and XenMobile AppController.
The AppController sequence assumes that the environment has the following constraints:
1. NetScaler:
Is Deployed in the DMZ
Has access to Active Directory on port 389 or 636
Has access to XMA on port 443 and 80
2. AppController:
Has access to Active Directory on port 389 or 636
3. Users:
Have mobile devices that are connected to an external network (Wifi/3or4G) and can
communicate directly with XMA on port 443 and 80
The MDM sequence for Android does not require an APNS certificate or a Developer Account. They are
exclusively for iOS.
Citrix Systems, Inc. © 2013 Page 2 of 10
Authentication Sequence with Access Gateway
1. User connects to Access Gateway
2. Access Gateway prompts the user to authenticate
3. User enters their Active Directory credentials
4. Access Gateway takes the users credentials and verifies them with Active Directory
5. Active Directory responds with an authentication successful message
6. Access Gateway creates a token SSOs to XMA
7.
XMA extracts the users credentials from the token and uses them to verify the user with Active
Directory
8. Active Directory responds with an authentication successful message
9. XMA now makes a callback to Access Gateway to verify that the request initiated from there
10. Callback succeeds and the apps are enumerated
Citrix Systems, Inc. © 2013 Page 3 of 10
MDM Enrollment Sequence iOS
Step
From To Protocol Port Description
1.
Mobile
Device
AppleApp
Store
HTTP
443
(80?)
User downloads and installs Citrix Enroll on their
mobile device
2. Enroll XDM
HTTPS /
SSL
443 User enter credentials
3. Enroll XDM
HTTPS /
SSL /
DNS
8443
If domain is specified in the user dialog, the Worx
Home app will verify the Citrix NOC
discover.mdm.zenprice.com to verify if XDM server
is registered for the domain
4. Enroll XDM HTTP 8443
If not found, user is prompted for XDM server name
(FQDN).
5. Enroll XDM HTTP 8443 If found, user is prompted for password
6. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
User credentials are verified against LDAP server
7. Enroll XDM SSL 8443
If successful, device is connected through a
persistent, long-lived HTTPS connection (Root CA
and MDM profile)
8. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
XDM server verified user group membership against
LDAP server
9. XDM Enroll SSL 8443
User must accept profiles pushed down to the user
via HTTPS connection to server (Root CA and MDM
profile)
10. XDM APNS APNS 2195
XDM server initiates connection to APNS network to
tell the device to wake up
11. APNS Enroll SSL 5223
12. Enroll XDM
HTTPS /
SSL
443
XDM server tells device to call home to the XDM
server
13. XDM APNS APNS 2196
XDM server requests acknowledgement of
acceptance and status of request via APNS network
14. XDM Worx Home
HTTPS /
SSL
443
Based on AD group membership, policies,
applications and files are pushed to the device thru
the HTTPS connection
15. XDM APNS APNS 2196
XDM server requests acknowledgement of
acceptance and status of request via APNS network
Citrix Systems, Inc. © 2013 Page 4 of 10
MDM Enrollment Sequence Android
Step
From To Protocol Port Description
1.
Mobile
Device
Google Play
Store
HTTP 80
User downloads and installs Citrix Worx Homeon
their mobile device
2. Worx Home XDM
HTTP /
HTTPS /
SSL
443 User enter credentials
3. Worx Home XDM
HTTP /
HTTPS /
SSL /
DNS
443 /
53
If domain is specified in the user dialog, the connect
app will verify the Citrix. NOC
discover.mdm.zenprise.com to verify if XDM server
is registered for the domain
4. Worx Home XDM
HTTP /
HTTPS /
SSL
443
If not found, user is prompted for XDM server name
(FQDN). No HTTPS:// needed in server-name.
5. Worx Home XDM
HTTP /
HTTPS /
SSL
443 If found, user is prompted for password
6. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
User credentials are verified against LDAP server
7. Worx Home XDM
HTTP /
HTTPS /
SSL
443
If successful, device is connected through a
persistent, long-lived HTTPS connection
8. XDM LDAP server
LDAP /
LDAPS
389 /
636 /
3289
XDM server verified user group membership against
LDAP server
9. XDM Worx Home
HTTPS /
SSL
443
Based on AD group membership, policies,
applications and files are pushed to the device
through the HTTPS connection
10. XDM Worx Home
HTTP /
HTTPS /
SSL
Any
port
Geo Locate is requested to the device through the
persistent HTTPs connection from the server to the
device
11. No network activity
The device attempts to obtain a GPS lock via the
onboard GPS chip. The user must have location
service enabled for this to work
12. Worx Home XDM
HTTPS /
SSL
443
If the device retrieves a lock, it sends the request
back to the XDM. XDM does NOT do cell tower
location
13. XDM Worx Home
HTTPS /
SSL
443
Wipe of the device is sent from the server to the
device via the HTTPS connection initiated by the
device
14. Worx Home XDM
HTTP /
HTTPS /
SSL
Any
port
The Worx Home app verifies that command was
received via the HTTPS connection, ensure the
server received the acknowledgement and wipes the
device
Citrix Systems, Inc. © 2013 Page 5 of 10
External Access Sequence to XMA
Step
From To Protocol Port Description
1.
Mobile
Device
Apple App
Store
HTTP 80
User downloads and installs Receiver on their
mobile device
2. Receiver
Access
Gateway
HTTPS /
SSL
443
User clicks Add Account and connects to Access
Gateway
3.
Access
Gateway
Receiver
HTTPS /
SSL
443
Access Gateway (AG) verifies that the user is
requesting a valid resource and then prompts the
user to authenticate
4. Receiver
Access
Gateway
HTTPS /
SSL
443
User authenticates using their AD credentials (and
OTT if it exists)
5.
Access
Gateway
Active
Directory
LDAP /
LDAPS
389 /
636
AG verifies credentials by checking with AD
6.
Access
Gateway
XMA
HTTPS /
SSL
443 AG creates a token and SSOs to XMA
7. XMA
Active
Directory
LDAP /
LDAPS
389 /
636
XMAuses the token to authenticate the user against
Active Directory
8. XMA
Access
Gateway
HTTPS /
SSL
443
XMAthen makes a callback to AG to verify that the
authentication request originated at AG
9. Receiver XMA
HTTPS /
SSL
443
If the authentication is successful, Receiver then
makes a GET request for the store information (.cr
file)
10. XMA Receiver
HTTPS /
SSL
443
XMAvalidates the endpoint, registers the device
(Receiver), pushes down the .cr file
11. XMA
Active
Directory
HTTPS /
SSL
389 /
636 /
443
XMAchecks that the user belongs to the correct role
i.e group in AD and sends the list of resources (app
icons for each resource) down to the Receiver
12. XMA Receiver
HTTPS /
SSL
443
13. Receiver XMA
HTTPS /
SSL
443
User subscribes to a resource such as a native
mobile app
14. XMA Receiver HTTP 80
XMAmakes note of this subscription and then sends
down the app to the mobile device
15. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (Formfill)
application
16. XMA Receiver
HTTPS /
SSL
443
XMAmakes note of this subscription and then
prompts the user to provide Web/SaaS application
credentials
Citrix Systems, Inc. © 2013 Page 6 of 10
17. Receiver XMA
HTTPS /
SSL
443 XMAsaves credentials in its local database
18. XMA Receiver
HTTPS /
SSL
443
XMAissues a redirect to the endpoint device with the
required form
19. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
20. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (SAML)
application
21. XMA Receiver
HTTPS /
SSL
443 XMAmakes note of this subscription
22. XMA XMA
HTTPS /
SSL
443
XMAsaves Web/SaaS app username in its local
database
23. XMA Receiver
HTTPS /
SSL
443
XMAissues a SAML token with a redirect to the
endpoint device
24. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
Citrix Systems, Inc. © 2013 Page 7 of 10
Policies, apps, and file
Internal Access Sequence to XMA
Step
From To Protocol Port Description
1. Mobile
Device
XMA HTTP 80
User downloads and installs Receiver on their
mobile device
2. Receiver XMA
HTTPS /
SSL
443 User clicks Add Account and connects to XMA
3. XMA Receiver
HTTPS /
SSL
443
XMAverifies that the user is requesting a valid
resource and then prompts the user to authenticate
4. Receiver XMA
HTTPS /
SSL
443
User authenticates using their AD credentials
against Active Directory
5. XMA
Active
Directory
LDAP /
LDAPS
389 /
636
6. Receiver XMA
HTTPS /
SSL
443
If the authentication is successful, Receiver requests
for the store information (.cr file)
7. Receiver XMA
HTTPS /
SSL
443
XMAvalidates the endpoint, registers the device
(Receiver), and pushes down the .cr file
8. XMA
Active
Directory
HTTPS /
SSL
389 /
636 /
443 XMAverifies the user’s role group in AD and sends a
list of resources to the Receiver
9. XMA Receiver
HTTPS /
SSL
443
10. Receiver XMA HTTP 80
User subscribes to a resource such as a native
mobile app
11. XMA Receiver HTTP 80
XMAmakes note of this subscription and then sends
down the app to the mobile device
12. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (Formfill)
application
13. XMA Receiver
HTTPS /
SSL
443
XMAmakes note of this subscription and then
prompts the user to provide Web/SaaS application
credentials
14. Receiver XMA
HTTS /
SSL
443 XMAsaves credentials in its local database
15. XMA Receiver
HTTPS /
SSL
443
XMAissues a redirect to the endpoint device with the
required form
16. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on
Citrix Systems, Inc. © 2013 Page 8 of 10
17. Receiver XMA
HTTPS /
SSL
443
User subscribes to a Web/SaaS SSO (SAML)
application
18. XMA Receiver
HTTPS /
SSL
443 XMAmakes note of this subscription
19. XMA XMA
HTTPS /
SSL
443
XMAsaves Web/SaaS app username in its local
database
20. XMA Receiver
HTTPS /
SSL
443
XMAissues a SAML token with a redirect to the
endpoint device
21. Receiver Application
HTTPS /
SSL
443
Endpoint submits the token to the Web/SaaS
application and is signed on

Weitere ähnliche Inhalte

Was ist angesagt?

Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideNuno Alves
 
AWS Elastic Beanstalk - Running Microservices and Docker
AWS Elastic Beanstalk - Running Microservices and DockerAWS Elastic Beanstalk - Running Microservices and Docker
AWS Elastic Beanstalk - Running Microservices and DockerAmazon Web Services
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Introduction to microservices
Introduction to microservicesIntroduction to microservices
Introduction to microservicesAnil Allewar
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...NGINX, Inc.
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
AWS VPN Solutions (NET304) - AWS re:Invent 2018
AWS VPN Solutions (NET304) - AWS re:Invent 2018AWS VPN Solutions (NET304) - AWS re:Invent 2018
AWS VPN Solutions (NET304) - AWS re:Invent 2018Amazon Web Services
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
ibm websphere admin training | websphere admin course | ibm websphere adminis...
ibm websphere admin training | websphere admin course | ibm websphere adminis...ibm websphere admin training | websphere admin course | ibm websphere adminis...
ibm websphere admin training | websphere admin course | ibm websphere adminis...Nancy Thomas
 
Introduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceIntroduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceAmazon Web Services
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsAmazon Web Services
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne ArchitectureSevOne
 
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...confluent
 

Was ist angesagt? (20)

Azure vnet
Azure vnetAzure vnet
Azure vnet
 
Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation Guide
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
AWS Elastic Beanstalk - Running Microservices and Docker
AWS Elastic Beanstalk - Running Microservices and DockerAWS Elastic Beanstalk - Running Microservices and Docker
AWS Elastic Beanstalk - Running Microservices and Docker
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Introduction to microservices
Introduction to microservicesIntroduction to microservices
Introduction to microservices
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
AWS VPN Solutions (NET304) - AWS re:Invent 2018
AWS VPN Solutions (NET304) - AWS re:Invent 2018AWS VPN Solutions (NET304) - AWS re:Invent 2018
AWS VPN Solutions (NET304) - AWS re:Invent 2018
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
ibm websphere admin training | websphere admin course | ibm websphere adminis...
ibm websphere admin training | websphere admin course | ibm websphere adminis...ibm websphere admin training | websphere admin course | ibm websphere adminis...
ibm websphere admin training | websphere admin course | ibm websphere adminis...
 
Azure AD Connect
Azure AD ConnectAzure AD Connect
Azure AD Connect
 
Introduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceIntroduction to Amazon Relational Database Service
Introduction to Amazon Relational Database Service
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
 
Introduction of AWS KMS
Introduction of AWS KMSIntroduction of AWS KMS
Introduction of AWS KMS
 
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
 

Andere mochten auch

Fronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerFronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerNuno Alves
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalityCitrix
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...Citrix
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)Fatbardh Hysa
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

Andere mochten auch (11)

Fronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScalerFronting XenMobile MDM with NetScaler
Fronting XenMobile MDM with NetScaler
 
SYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionalitySYN310: Deep dive into ShareFile Enterprise functionality
SYN310: Deep dive into ShareFile Enterprise functionality
 
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
SYN308: How XenMobile integrates with NetScaler, XenDesktop and XenApp for co...
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Ähnlich wie XenMobile Packet Flow

Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...David McGeough
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionDigicomp Academy AG
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptxAlireza Vafi
 
Usint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTUsint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTAnatoliy Odukha
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxssuser865ecd
 
Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Lan & Wan Solutions
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicHarihara sarma
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Hai Nguyen
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Nino Ho
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...David McGeough
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...David McGeough
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubiplotnikov
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Soracom Global, Inc.
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 

Ähnlich wie XenMobile Packet Flow (20)

Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
Citrix TechEdge 2014 - Troubelshooting Top Issues with XenMobile Enterprise E...
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise Edition
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptx
 
Usint Charles Proxy to understand REST
Usint Charles Proxy to understand RESTUsint Charles Proxy to understand REST
Usint Charles Proxy to understand REST
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
 
Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891Useridentity 150909123719-lva1-app6891
Useridentity 150909123719-lva1-app6891
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares
 
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
Citrix TechEdge 2014 - How to Protect Against the Top 10 Web Security Issues ...
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud!
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Mfp80 certificate pinning
Mfp80 certificate pinningMfp80 certificate pinning
Mfp80 certificate pinning
 

Mehr von Nuno Alves

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overviewNuno Alves
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Nuno Alves
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network ConfigurationsNuno Alves
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionNuno Alves
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video deliveryNuno Alves
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesNuno Alves
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overviewNuno Alves
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - finalNuno Alves
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practicesNuno Alves
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologiesNuno Alves
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage OverviewNuno Alves
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 BlueprintNuno Alves
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Nuno Alves
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNuno Alves
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Nuno Alves
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guideNuno Alves
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the NumbersNuno Alves
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 

Mehr von Nuno Alves (20)

E g innovations overview
E g innovations overviewE g innovations overview
E g innovations overview
 
Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)Citrix virtual desktop handbook (7x)
Citrix virtual desktop handbook (7x)
 
Citrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design:  Designing XenServer Network  ConfigurationsCitrix XenServer Design:  Designing XenServer Network  Configurations
Citrix XenServer Design: Designing XenServer Network Configurations
 
Deploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 SolutionDeploying the XenMobile 8.5 Solution
Deploying the XenMobile 8.5 Solution
 
Cloudbridge video delivery
Cloudbridge video deliveryCloudbridge video delivery
Cloudbridge video delivery
 
XenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log MessagesXenApp 6.5 - Event Log Messages
XenApp 6.5 - Event Log Messages
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
 
Reference architecture dir and es - final
Reference architecture   dir and es - finalReference architecture   dir and es - final
Reference architecture dir and es - final
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Xd planning guide - storage best practices
Xd   planning guide - storage best practicesXd   planning guide - storage best practices
Xd planning guide - storage best practices
 
Introduction to storage technologies
Introduction to storage technologiesIntroduction to storage technologies
Introduction to storage technologies
 
Xen server storage Overview
Xen server storage OverviewXen server storage Overview
Xen server storage Overview
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)Citrix virtual desktop handbook (5 x)
Citrix virtual desktop handbook (5 x)
 
New eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization teamNew eBook! Citrix howto build an all star app desktop virtualization team
New eBook! Citrix howto build an all star app desktop virtualization team
 
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
Wp intelli cache_reduction_iops_xd5.6_fp1_xs6.1
 
Citrix Store front planning guide
Citrix Store front planning guideCitrix Store front planning guide
Citrix Store front planning guide
 
Microsoft by the Numbers
Microsoft by the NumbersMicrosoft by the Numbers
Microsoft by the Numbers
 
NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

XenMobile Packet Flow

  • 1. Citrix Systems, Inc. © 2013 Page 1 of 10 XenMobile Packet Flow| Citrix MPG Marketing XenMobile Packet Flow
  • 2. Citrix Systems, Inc. © 2013 Page 2 of 10 Contents Introduction .............................................................................................................................................. 1 Authentication Sequence with Access Gateway...................................................................................... 2 MDM Enrollment Sequence iOS .............................................................................................................. 3 MDM Enrollment Sequence Android........................................................................................................ 4 External Access Sequence to XMA ......................................................................................................... 5 Internal Access Sequence to AppController ............................................................................................ 7
  • 3. Citrix Systems, Inc. © 2013 Page 1 of 10 Introduction The purpose of this document is to illustrate a high level overview of the traffic flow between Enroll / Worx Home / Receiver, Netscaler, XenMobile Device Manager, and XenMobile AppController. The AppController sequence assumes that the environment has the following constraints: 1. NetScaler: Is Deployed in the DMZ Has access to Active Directory on port 389 or 636 Has access to XMA on port 443 and 80 2. AppController: Has access to Active Directory on port 389 or 636 3. Users: Have mobile devices that are connected to an external network (Wifi/3or4G) and can communicate directly with XMA on port 443 and 80 The MDM sequence for Android does not require an APNS certificate or a Developer Account. They are exclusively for iOS.
  • 4. Citrix Systems, Inc. © 2013 Page 2 of 10 Authentication Sequence with Access Gateway 1. User connects to Access Gateway 2. Access Gateway prompts the user to authenticate 3. User enters their Active Directory credentials 4. Access Gateway takes the users credentials and verifies them with Active Directory 5. Active Directory responds with an authentication successful message 6. Access Gateway creates a token SSOs to XMA 7. XMA extracts the users credentials from the token and uses them to verify the user with Active Directory 8. Active Directory responds with an authentication successful message 9. XMA now makes a callback to Access Gateway to verify that the request initiated from there 10. Callback succeeds and the apps are enumerated
  • 5. Citrix Systems, Inc. © 2013 Page 3 of 10 MDM Enrollment Sequence iOS Step From To Protocol Port Description 1. Mobile Device AppleApp Store HTTP 443 (80?) User downloads and installs Citrix Enroll on their mobile device 2. Enroll XDM HTTPS / SSL 443 User enter credentials 3. Enroll XDM HTTPS / SSL / DNS 8443 If domain is specified in the user dialog, the Worx Home app will verify the Citrix NOC discover.mdm.zenprice.com to verify if XDM server is registered for the domain 4. Enroll XDM HTTP 8443 If not found, user is prompted for XDM server name (FQDN). 5. Enroll XDM HTTP 8443 If found, user is prompted for password 6. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 User credentials are verified against LDAP server 7. Enroll XDM SSL 8443 If successful, device is connected through a persistent, long-lived HTTPS connection (Root CA and MDM profile) 8. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 XDM server verified user group membership against LDAP server 9. XDM Enroll SSL 8443 User must accept profiles pushed down to the user via HTTPS connection to server (Root CA and MDM profile) 10. XDM APNS APNS 2195 XDM server initiates connection to APNS network to tell the device to wake up 11. APNS Enroll SSL 5223 12. Enroll XDM HTTPS / SSL 443 XDM server tells device to call home to the XDM server 13. XDM APNS APNS 2196 XDM server requests acknowledgement of acceptance and status of request via APNS network 14. XDM Worx Home HTTPS / SSL 443 Based on AD group membership, policies, applications and files are pushed to the device thru the HTTPS connection 15. XDM APNS APNS 2196 XDM server requests acknowledgement of acceptance and status of request via APNS network
  • 6. Citrix Systems, Inc. © 2013 Page 4 of 10 MDM Enrollment Sequence Android Step From To Protocol Port Description 1. Mobile Device Google Play Store HTTP 80 User downloads and installs Citrix Worx Homeon their mobile device 2. Worx Home XDM HTTP / HTTPS / SSL 443 User enter credentials 3. Worx Home XDM HTTP / HTTPS / SSL / DNS 443 / 53 If domain is specified in the user dialog, the connect app will verify the Citrix. NOC discover.mdm.zenprise.com to verify if XDM server is registered for the domain 4. Worx Home XDM HTTP / HTTPS / SSL 443 If not found, user is prompted for XDM server name (FQDN). No HTTPS:// needed in server-name. 5. Worx Home XDM HTTP / HTTPS / SSL 443 If found, user is prompted for password 6. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 User credentials are verified against LDAP server 7. Worx Home XDM HTTP / HTTPS / SSL 443 If successful, device is connected through a persistent, long-lived HTTPS connection 8. XDM LDAP server LDAP / LDAPS 389 / 636 / 3289 XDM server verified user group membership against LDAP server 9. XDM Worx Home HTTPS / SSL 443 Based on AD group membership, policies, applications and files are pushed to the device through the HTTPS connection 10. XDM Worx Home HTTP / HTTPS / SSL Any port Geo Locate is requested to the device through the persistent HTTPs connection from the server to the device 11. No network activity The device attempts to obtain a GPS lock via the onboard GPS chip. The user must have location service enabled for this to work 12. Worx Home XDM HTTPS / SSL 443 If the device retrieves a lock, it sends the request back to the XDM. XDM does NOT do cell tower location 13. XDM Worx Home HTTPS / SSL 443 Wipe of the device is sent from the server to the device via the HTTPS connection initiated by the device 14. Worx Home XDM HTTP / HTTPS / SSL Any port The Worx Home app verifies that command was received via the HTTPS connection, ensure the server received the acknowledgement and wipes the device
  • 7. Citrix Systems, Inc. © 2013 Page 5 of 10 External Access Sequence to XMA Step From To Protocol Port Description 1. Mobile Device Apple App Store HTTP 80 User downloads and installs Receiver on their mobile device 2. Receiver Access Gateway HTTPS / SSL 443 User clicks Add Account and connects to Access Gateway 3. Access Gateway Receiver HTTPS / SSL 443 Access Gateway (AG) verifies that the user is requesting a valid resource and then prompts the user to authenticate 4. Receiver Access Gateway HTTPS / SSL 443 User authenticates using their AD credentials (and OTT if it exists) 5. Access Gateway Active Directory LDAP / LDAPS 389 / 636 AG verifies credentials by checking with AD 6. Access Gateway XMA HTTPS / SSL 443 AG creates a token and SSOs to XMA 7. XMA Active Directory LDAP / LDAPS 389 / 636 XMAuses the token to authenticate the user against Active Directory 8. XMA Access Gateway HTTPS / SSL 443 XMAthen makes a callback to AG to verify that the authentication request originated at AG 9. Receiver XMA HTTPS / SSL 443 If the authentication is successful, Receiver then makes a GET request for the store information (.cr file) 10. XMA Receiver HTTPS / SSL 443 XMAvalidates the endpoint, registers the device (Receiver), pushes down the .cr file 11. XMA Active Directory HTTPS / SSL 389 / 636 / 443 XMAchecks that the user belongs to the correct role i.e group in AD and sends the list of resources (app icons for each resource) down to the Receiver 12. XMA Receiver HTTPS / SSL 443 13. Receiver XMA HTTPS / SSL 443 User subscribes to a resource such as a native mobile app 14. XMA Receiver HTTP 80 XMAmakes note of this subscription and then sends down the app to the mobile device 15. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (Formfill) application 16. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription and then prompts the user to provide Web/SaaS application credentials
  • 8. Citrix Systems, Inc. © 2013 Page 6 of 10 17. Receiver XMA HTTPS / SSL 443 XMAsaves credentials in its local database 18. XMA Receiver HTTPS / SSL 443 XMAissues a redirect to the endpoint device with the required form 19. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on 20. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (SAML) application 21. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription 22. XMA XMA HTTPS / SSL 443 XMAsaves Web/SaaS app username in its local database 23. XMA Receiver HTTPS / SSL 443 XMAissues a SAML token with a redirect to the endpoint device 24. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on
  • 9. Citrix Systems, Inc. © 2013 Page 7 of 10 Policies, apps, and file Internal Access Sequence to XMA Step From To Protocol Port Description 1. Mobile Device XMA HTTP 80 User downloads and installs Receiver on their mobile device 2. Receiver XMA HTTPS / SSL 443 User clicks Add Account and connects to XMA 3. XMA Receiver HTTPS / SSL 443 XMAverifies that the user is requesting a valid resource and then prompts the user to authenticate 4. Receiver XMA HTTPS / SSL 443 User authenticates using their AD credentials against Active Directory 5. XMA Active Directory LDAP / LDAPS 389 / 636 6. Receiver XMA HTTPS / SSL 443 If the authentication is successful, Receiver requests for the store information (.cr file) 7. Receiver XMA HTTPS / SSL 443 XMAvalidates the endpoint, registers the device (Receiver), and pushes down the .cr file 8. XMA Active Directory HTTPS / SSL 389 / 636 / 443 XMAverifies the user’s role group in AD and sends a list of resources to the Receiver 9. XMA Receiver HTTPS / SSL 443 10. Receiver XMA HTTP 80 User subscribes to a resource such as a native mobile app 11. XMA Receiver HTTP 80 XMAmakes note of this subscription and then sends down the app to the mobile device 12. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (Formfill) application 13. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription and then prompts the user to provide Web/SaaS application credentials 14. Receiver XMA HTTS / SSL 443 XMAsaves credentials in its local database 15. XMA Receiver HTTPS / SSL 443 XMAissues a redirect to the endpoint device with the required form 16. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on
  • 10. Citrix Systems, Inc. © 2013 Page 8 of 10 17. Receiver XMA HTTPS / SSL 443 User subscribes to a Web/SaaS SSO (SAML) application 18. XMA Receiver HTTPS / SSL 443 XMAmakes note of this subscription 19. XMA XMA HTTPS / SSL 443 XMAsaves Web/SaaS app username in its local database 20. XMA Receiver HTTPS / SSL 443 XMAissues a SAML token with a redirect to the endpoint device 21. Receiver Application HTTPS / SSL 443 Endpoint submits the token to the Web/SaaS application and is signed on