Install

Enable Citrix Workspace app for HTML5 on the Citrix Receiver for Web site. The StoreFront store provides the desktops and applications for Citrix Workspace app for HTML5 users.

Important:

In multiple-server StoreFront deployments, use only one server at a time to change the configuration of the server group. Verify the Citrix StoreFront management console isn’t running on any of the other servers in the deployment. Once complete, propagate your configuration changes to the server group so you update the other servers in the deployment.

Deploy

  1. Deploy StoreFront and create a store aggregating the desktops and applications you want to make available to Citrix Workspace app for HTML5 users. A Citrix Receiver for Web site is created automatically for new stores. For more information about creating StoreFront stores, see Create or remove a store.
  2. In the Citrix StoreFront management console, do the following steps:
  3. Enable Citrix Workspace app for HTML5 by selecting one of the options.

WebSocket

  1. Go to the Group Policy Management Console or Citrix Studio and select Policy to configure the policies.
  2. In the middle pane, under Policies, either modify an existing policy or create a policy. Policies
  3. To edit an existing policy, in the right pane, under Actions, select Edit Policy…. Edit Policy
  4. The Edit Unfiltered window appears. Type websoc and select Enter. The three WebSockets related policy settings are filtered. Edit Unfiltered
  5. Click Select for each policy, select Allowed, and then click OK.
  6. Leave the default value, select OK, and then click Next.
  7. Enter a policy name or leave the default value. Verify that you select Enable policy and then click Finish. Edit Unfiltered Enable

Note: If you modify an existing default (unfiltered) policy, the option Assign policy to user and machine objects isn’t available. So, we recommend you either modify an existing (not default) policy or create a policy.

  • To create a policy in Citrix Studio, under Actions, select Policy and then click Create Policy. The Create Policy window opens. Create Policy
  • In the search field, type websoc and select Enter. The search filters all three WebSockets related policy settings. Create Policy one
  • Click Select for each policy, and then select Next. Create Policy Select
  • Assign the permission based on the Delivery Group. Select Delivery Group and click Assign. Create Policy Assign
  • The Assign Policy window appears. Select the appropriate Delivery Group from the list and click OK. Assign Policy
  • Select the Delivery Group type and click Assign. You can select the Delivery Group from the list. Assign Policy Delivery Group type
  • If you select Organizational Unit (OU), you can select a specific OU from your Active Directory environment. Assign Policy OU
  • On the Summary window, review your policy settings, and click Finish. Create Policy summary
  • If you changed the port used when you allowed WebSocket connections on Citrix Virtual Apps or Citrix Virtual Apps and Desktops, complete the following steps. To change the WebSocket port for the Citrix Workspace app for a Web site:
    1. Use a text editor to open the web.config file for the Citrix Receiver for Web site. It is in the C:\inetpub\wwwroot\Citrix\storenameWeb directory. The storename is the name specified for the store when it was created.
    2. Locate the following elements in the file.
    3. Set the value of the preferences attribute to wsPort:portnumber;, where portnumber is the port that you configured in the policy.
  • To verify HTML5 by accessing the desktop and applications using a web browser

    Apps Desktops

    1. Log on to the StoreFront using the URL, http:///Citrix/StoreWeb using domain credentials based on the permission (users/groups) in the Delivery Group. When you select Use Receiver for HTML5 if local CItrix Receiver/Citrix Workspace app is unavailable, a page appears. Use the light version to access HTML5. You have the following two options:
    2. Click Log On.
    3. Enter the correct User name and Password.
    4. The page displays all the apps and desktops that you have access to. You can launch desktops and applications using an HTML5 browser. The desktops and applications are launched in a new tab.

    To view Citrix Receiver for HTML5 logs by navigating to the log page

    1. Log on to the Citrix Receiver for Web site.

    Direct connections to Citrix Virtual Apps and Desktops and Citrix DaaS

    Citrix Workspace app for HTML5 uses the WebSocket protocol to access virtual desktops and hosted applications. By default, WebSocket connections are prohibited on Citrix Virtual Apps and Desktops and Citrix DaaS (formerly the Citrix Virtual Apps and Desktops service).

    If you enable users to access resources from the local network without connecting through Citrix Gateway, allow WebSocket connections on Citrix Virtual Apps and Desktops and Citrix DaaS.

    For more information about creating HTTP profiles, see HTTP Configurations.

    Warning:

    Editing the registry incorrectly can cause serious problems that might require you to reinstall your operating system. Citrix can’t guarantee that problems resulting from the incorrect use of the Registry Editor can be solved. Use Registry Editor at your own risk. Be sure to back up the registry before you edit it.

    Note:

    If you’re using SecureICA to encrypt communications between users’ devices and your Citrix Virtual Apps and Desktops and Citrix DaaS or Citrix Virtual Apps servers, Citrix Workspace app for HTML5 supports Basic encryption only. If you use other encryption levels, sessions don’t start.

    Citrix Provisioning Services

    To deploy provisioned (non-persistent) machines using Citrix Provisioning Services, create the machine catalog and delivery group on which you want to enable Citrix Workspace app for HTML5 connections. Verify that the configured WebSocket policies apply to your machine catalog.

    Restart the machine to apply the WebSocket policies. For Citrix Provisioning Services-based machines that are configured to use persistent write cache files and machines deployed using MCS (that have separate identity disks), the policies are persisted when the machines restart. However, for Citrix Provisioning Services-based machine catalogs that use temporary write cache files, these policies must be applied to the vDisk. Otherwise, the policies aren’t implemented successfully on target devices.

    Complete the following steps to ensure that the policies are correctly applied to the vDisk.

    1. Using the Citrix Provisioning Console, shut down a target device that is part of the machine catalog and delivery group. Change the access type of the target device from Production to Maintenance. For details, see Target Devices. You must use a target device that is a part of the machine catalog and delivery group. Otherwise, the policies aren’t applied.
    2. Create a version of your vDisk and set the Access to Maintenance. For details, see Manually updating a vDisk image.
    3. Start the maintenance target device, selecting the maintenance vDisk version from the boot menu. Verify that the following keys are added to the registry.
      1. HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Citrix\ICAPolicies\AcceptWebSocketsConnections
      2. HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Citrix\WebSocketsPort
      3. HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Citrix\WSTrustedOriginServerList

      If you don’t use vDisk versioning, you can apply the policies to your base vDisk image. You can apply the policy by shutting down all the target devices that use the vDisk. Place the vDisk in Private Image mode, and then start the target device to update the image.

      To Upgrade Citrix Workspace app for HTML5 on StoreFront

      To upgrade to the new Citrix Workspace app, do the following steps:

      The official version of this content is in English. Some of the Cloud Software Group documentation content is machine translated for your convenience only. Cloud Software Group has no control over machine-translated content, which may contain errors, inaccuracies or unsuitable language. No warranty of any kind, either expressed or implied, is made as to the accuracy, reliability, suitability, or correctness of any translations made from the English original into any other language, or that your Cloud Software Group product or service conforms to any machine translated content, and any warranty provided under the applicable end user license agreement or terms of service, or any other agreement with Cloud Software Group, that the product or service conforms with any documentation shall not apply to the extent that such documentation has been machine translated. Cloud Software Group will not be held responsible for any damage or issues that may arise from using machine-translated content.

      DIESER DIENST KANN ÜBERSETZUNGEN ENTHALTEN, DIE VON GOOGLE BEREITGESTELLT WERDEN. GOOGLE LEHNT JEDE AUSDRÜCKLICHE ODER STILLSCHWEIGENDE GEWÄHRLEISTUNG IN BEZUG AUF DIE ÜBERSETZUNGEN AB, EINSCHLIESSLICH JEGLICHER GEWÄHRLEISTUNG DER GENAUIGKEIT, ZUVERLÄSSIGKEIT UND JEGLICHER STILLSCHWEIGENDEN GEWÄHRLEISTUNG DER MARKTGÄNGIGKEIT, DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK UND DER NICHTVERLETZUNG VON RECHTEN DRITTER.

      CE SERVICE PEUT CONTENIR DES TRADUCTIONS FOURNIES PAR GOOGLE. GOOGLE EXCLUT TOUTE GARANTIE RELATIVE AUX TRADUCTIONS, EXPRESSE OU IMPLICITE, Y COMPRIS TOUTE GARANTIE D'EXACTITUDE, DE FIABILITÉ ET TOUTE GARANTIE IMPLICITE DE QUALITÉ MARCHANDE, D'ADÉQUATION À UN USAGE PARTICULIER ET D'ABSENCE DE CONTREFAÇON.

      ESTE SERVICIO PUEDE CONTENER TRADUCCIONES CON TECNOLOGÍA DE GOOGLE. GOOGLE RENUNCIA A TODAS LAS GARANTÍAS RELACIONADAS CON LAS TRADUCCIONES, TANTO IMPLÍCITAS COMO EXPLÍCITAS, INCLUIDAS LAS GARANTÍAS DE EXACTITUD, FIABILIDAD Y OTRAS GARANTÍAS IMPLÍCITAS DE COMERCIABILIDAD, IDONEIDAD PARA UN FIN EN PARTICULAR Y AUSENCIA DE INFRACCIÓN DE DERECHOS.

      本服务可能包含由 Google 提供技术支持的翻译。Google 对这些翻译内容不做任何明示或暗示的保证,包括对准确性、可靠性的任何保证以及对适销性、特定用途的适用性和非侵权性的任何暗示保证。

      このサービスには、Google が提供する翻訳が含まれている可能性があります。Google は翻訳について、明示的か黙示的かを問わず、精度と信頼性に関するあらゆる保証、および商品性、特定目的への適合性、第三者の権利を侵害しないことに関するあらゆる黙示的保証を含め、一切保証しません。

      ESTE SERVIÇO PODE CONTER TRADUÇÕES FORNECIDAS PELO GOOGLE. O GOOGLE SE EXIME DE TODAS AS GARANTIAS RELACIONADAS COM AS TRADUÇÕES, EXPRESSAS OU IMPLÍCITAS, INCLUINDO QUALQUER GARANTIA DE PRECISÃO, CONFIABILIDADE E QUALQUER GARANTIA IMPLÍCITA DE COMERCIALIZAÇÃO, ADEQUAÇÃO A UM PROPÓSITO ESPECÍFICO E NÃO INFRAÇÃO.