O'Reilly logo

Citrix® XenDesktop® 7 Cookbook by Gaspare A. Silvestri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementing the two-factor hardware authentication for XenDesktop® 7

With your personal data archived on your desktop machine, the standard authentication that is made up of a username and password combination could be insufficient to avoid privacy and security problems.

A valid solution to this situation is the use of devices such as Smart Cards or PKI tokens when trying to access your working resources.

Citrix XenDesktop is able to use this type of strong authentication. In this recipe, we will study the implementation of this process in detail.

Getting ready

In order to utilize valid certificates, you need to perform the following configuration tasks:

  1. Use an existing Enterprise CA or install an Enterprise Certification Authority machine to generate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required