Educational Resource

Setting up Citrix FAS to enroll through Horizon

June 24, 2024
24 min read
Expert Content

Published on

June 24, 2024

Setting up Citrix Federated Authentication Service (FAS) with WinHorizon and Evertrust Horizon requires attention to detail and adherence to specific pre-requisites and procedural steps. This guide provides a comprehensive, step-by-step process to ensure a seamless integration, facilitating a secure and efficient authentication environment within your Active Directory (AD) domain.

Before beginning, this setup requires some pre-requisites, namely:

Pre requisites Pre requisites

Setup procedure

Note: The Citrix FAS installation must be performed using an Enterprise Administrator account within the designated domain

1. Install Citrix FAS: Install the Citrix FAS MSI package (FederatedAuthenticationService_XX_XX_XXX_x64.msi)

2. Run Administration Console: Launch the Citrix FAS Administration console as an Enterprise Administrator

3. Connect to Remote Server (Optional): If the Citrix FAS server is installed on a different machine, click "Connect to another server" and enter the FQDN of the machine (must be in the same domain).

Administration Console Administration Console

4. Deploy Certificate Templates:

  • In the “Deploy certificate templates” section, click “Deploy” and then “OK”

  • This will deploy the following Microsoft Certificate Templates in the current AD Forest

- Citrix_RegistrationAuthority_ManualAuthorization

- Citrix_RegistrationAuthority

- Citrix_SmartcardLogon

Deploy interface Deploy interface

5. Verify Template Deployment: Use the “certtmpl.msc” utility to ensure the templates have been deployed. Modify the Citrix_RegistrationAuthority_ManualAuthorization template by unchecking the “CA manager approval” checkbox in the “Issuance Requirements” tab.

Certificate Templates Console Certificate Templates Console

6. Configure WinHorizon:

  • On the WinHorizon machine, start the “EVERTRUST WinHorizon Configurator” as Enterprise Admin

  • Click the “Templates” button, add the three Citrix templates from step 4, and sav

Setting up Horizon

7. Log in to Horizon Console: Access the Horizon web administration console, navigate to the “Configuration” menu, then to “Protocols” > “WCCE” > “Profiles”, and create three WCCE profiles with the specified configurations.

Want to implement these PKI practices?

Get expert guidance on implementing secure PKI solutions for your organization.

Get Expert Help
Profile name (example)Profile use-case
stream_citrix_e_agentIssue the initial enrollment agent certificate
stream_citrix_raIssue certificates for the Citrix FAS Registration Authority
stream_citrix_sc_logonIssue certificates for SmartCard Logon

8. Declare WCCE Forest: In the Horizon Configuration menu, go to “Protocols” > “WCCE” > “Forests” and declare a new WCCE forest using your AD forest’s FQDN (not the NETBIOS name)

Configuration Menu Configuration Menu

9. Create WCCE Mappings: After declaring the forest, create three WCCE mappings by clicking the + button next to the forest’s name. No EOBO CA specification is necessary.

Forest Configuration Forest Configuration

The mappings should be as follow:

Microsoft Template NameEnrollment ModeWCCE Profile (example)
Citrix_RegistrationAuthority_ManualAuthorizationEntitystream_citrix_e_agent
Citrix_SmartcardLogonEnroll On Behalf Ofstream_citrix_sc_logon
Citrix_RegistrationAuthorityEnroll On Behalf Ofstream_citrix_ra

There is no need to specify any EOBO CA when prompted.

Although the WCCE profile names may change for your configuration, the Microsoft Template name should be exactly the same as in the above table as they were automatically created by Citrix FAS previously.

The forest’s mappings should look like this eventually:

Forest mapping Forest mapping

10. Authorize Service:

  • In the “Authorize this service” section, click “Authorize”

  • Select the WinHorizon CA from the drop-down menu and click “OK”

  • This will issue a certificate request in Horizon, which should be automatically approved, issuing a certificate on your underlying PKI.

Citrix FAS Console Citrix FAS Console

From the drop-down menu, select the WinHorizon CA and click “OK”. This should issue a certificate request in Horizon that should be automatically approved, hence issue a certificate immediately on your underlying PKI.

11. Modify Certificate Template: Using the “certtmpl.msc” utility, modify the Citrix_RegistrationAuthority_ManualAuthorization template by checking the “CA manager approval” checkbox in the “Issuance Requirements” tab.

certtmpl.msc Utility certtmpl.msc Utility

12. Create Authorization Rule: In the “Create a rule” section, click “Create” and name the rule “default"

FAS Administration Console FAS Administration Console

13. Configure Registry: On the Citrix FAS server, run regedit and navigate to the specified registry key location to ensure configuration accuracy

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Citrix\Authentication\UserCredentialService\Addresses

You should manually create any of the missing key in the aforementioned path, should there be any missing. and create the following value:

Value NameValue TypeValue
Address1REG_SZ<FQDN of the Citrix FAS server> (example: citrixfas.example.local)

Finally, in order to check that the setup is successful, you might want to perform the two following steps.

14. Create User List: Create a file named `users_list.csv` with the specified content.

"UserPrincipalName" "[email protected]" "[email protected]"

15. Run PowerShell Script:

  • Open a PowerShell instance as an administrator, navigate to the path where the CSV file is saved, and run the provided script.

  • The enrolled certificates should now be visible in Horizon and on your PKI.

# Add the Citrix PowerShell Snap-ins Add-PSSnapin Citrix.A* # CSV file name $csv = "users_list.csv" # Default rule created in the admin console $rule = "default" # Import the users from the CSV file $users = Import-Csv -Encoding utf8 $csv # Loop through each user in the CSV file foreach ($user in $users) { # Get the FAS server for the user $server = Get-FasServerForUser -UserPrincipalNames $user.UserPrincipalName # Check if the primary server is not null and create a certificate if ($server.Server -ne $NULL) { New-FasUserCertificate -Address $server.Server -UserPrincipalName $user.UserPrincipalName -CertificateDefinition $rule } # Check if the failover server is not null and create a certificate if ($server.Failover -ne $NULL) { New-FasUserCertificate -Address $server.Failover -UserPrincipalName $user.UserPrincipalName -CertificateDefinition $rule } }

By following this detailed setup guide, you ensure a robust integration of Citrix FAS with WinHorizon and Evertrust Horizon, enhancing your authentication infrastructure's security and efficiency. Adhering to the specified pre-requisites and procedural steps guarantees a smooth implementation, facilitating a seamless user experience within your Active Directory domain.

Was this helpful?
Back to Education Center

Table of Contents

Keep Learning

Get the latest educational content and PKI insights delivered to your inbox.

By subscribing you accept to receive our communications. You can unsubscribe at any moment.

Related Resources

Evertrust

Sequence 2: Install and configure NGINX for TLS encryption on RHEL/Debian/OpenSUSE

April 22, 2024
1 min

Improve the security of your web server by mastering TLS encryption. Our detailed guide offers practical steps to set up NGINX on different Linux distributions, adding a layer of security to safeguard sensitive web-transmitted data.

Read more
Evertrust How to

Enable Post Quantum Cryptography Support in Web Browsers

April 17, 2024
1 min

Explore the future of post-quantum cryptography and secure key exchange in web communication. Learn how to enable these advanced security features in top browsers like Microsoft Edge and Firefox. Stay ahead with our step-by-step guide.

Read more
Evertrust

Sequence 1: The guide to Installing and configuring Apache Httpd for TLS encryption on RHEL, Debian, OpenSUSE

April 16, 2024
1 min

Explore the optimal process of setting up and securing a web server on Linux distributions like RHEL, Debian, and OpenSUSE. Mastering TLS encryption implementation on Apache Httpd web servers, we provide concise steps for higher data protection.

Read more

Ready to take back control over your certificates?

Talk to our experts and discover how Evertrust can help you implement best practices in PKI and certificate lifecycle management.

Talk to an expert