This article provides an overview of the Browser content redirection (BCR) feature and use cases before providing general troubleshooting guidelines. It is highly recommended that you first read through the Browser content redirection and Browser content redirection policy settings sections of the Citrix Virtual Apps and Desktops 7 Product Documentation before using this troubleshooting article.
1. Browser Content Redirection feature description and details
Browser content redirection (BCR) allows the redirection of VDA-side browser viewports to the client-side. The benefits of BCR are achieved when offloading network utilization, page processing, graphics rendering to the endpoint, and improving end-user experience when browsing demanding webpages; especially those incorporating HTML5 or WebRTC video.
For BCR to work, the VDA must have access to the website you are trying to redirect - in other words, a navigation event must occur in the browser for BCR code to kick in. The webpage would then be uninstantiated , and immediately redirected.
The following browsers are supported:
For further information, including BCR system requirements, please read the Browser content redirection section of the Citrix Virtual Apps and Desktops 7 Product Documentation.
2. Browser Content Redirection configuration for specific use cases
2.1 Server fetch and server render
Default behavior when BCR is disabled. No VDA-side viewport redirection to the client occurs. This could be due to the desired behavior as configured through BCR policies, or server fallback may have occurred unintentionally due to a client redirection failure. To configure for this use case:
Browser content redirection policy: If set to Prohibited, BCR is disabled.
Alternatively, if “server fetch and server render” is to be applied for some websites, while permitting BCR for others, use the Browser content redirection Access Control List (ACL) policy settings policy to whitelist sites and/or the Browser content redirection blacklist setting policy to blacklist sites.
In this alternative scenario, the Browser content redirection policy needs to be unconfigured [since the default value is Allowed] or set explicitely to Allowed.
Note that in this mode, server-side rendering uses ICA Thinwire to remote the graphics to Workspace app, the same way it is done for any application running in the virtual desktop.
2.2 Server fetch and client render
This mode allows endpoints with no direct access to the website (e.g. Intranet) to be able to proxy the HTTP traffic through the VDA, which then relays to the web server. A service in the VDA called "Citrix Port Forwarding" is in charge of this.
To configure for this use case:
When the Browser content redirection proxy setting policy has been configured with a proxy server IP:Port address, the client connects to the proxy server on the VDA’s network over the Port Forwarding virtual channel and renders the content locally.
Proxies that require explicit authentication are supported with CWA for Windows 1907 or higher.
TCPView running on the endpoint will show that HdxBrowser attempts to connect to a few localhost TCP ports (the aforementioned client-side Port Forwarding virtual channel):
For Linux endpoints, running netstat will show WebKitNetworkProcess establishing connections to localhost:
On a Linux client, also check if vdbrowser.dll and vdportfoward.dll (used for server fetch client render) have been loaded.
If they are not loaded, the redirection will fail and fallback to server-side rendering.
You can use the following command "cat /proc/<PID of wfica>/maps" to check:
The TCP Port Forwarding service on the VDA is called CtxSvcHost.exe, and is the one making the final outbound connection to your Proxy Server (in the screenshot below it is 10.108.7.8:8888). This is how it looks on Process Explorer:
Be aware that there are many Citrix Virtual Channels that can run under CtxSvcHost (Smart Card, Audio, Flash, etc).
The one used by Server Fetch Client Render in Browser Content Redirection uses the "PortFwdSvcs" flag, as seen above.
You can also use TCPView - but make sure you are tracking the right CtxSvcHost. You can use the PID value from Process Explorer (9196 in the screenshot above) to correctly identify it, or look at the Remote Address and identify your Proxy.
If CtxSvcHost.exe is not seen, please restart the service "Citrix HDX Port Forwarding Service" on the VDA.
2.3 Client fetch and client render
This use case affords the maximum benefits for bandwidth efficiency and VDA resource usage.
To configure for this use case:
Browser content redirection policy: No need to configure but Allowed can be set. [Default value Allowed]
Browser content redirection Access Control List (ACL) policy settings policy: Acts as whitelist. Add any websites (wildcard * can be used) that you want to be redirected.
[Default value: https://www.youtube.com/*]
When this mode is configured, HdxBrowserCef.exe (Windows) or WebKitNetworkProcess (Linux) will contact a website directly:
2.4 Other BCR configuration options
To support whitelisted websites that navigate away to a 3rd-party site for authentication before redirecting back to the whitelisted site, configure the Browser content redirection authentication sites policy.
We'll use YouTube as an example:
The Browser content redirection policy will include the value: https://www.youtube.com/* [note that this entry exists by default in the policy]
The Sign In button on the YouTube site navigates to https://accounts.google.com/... (the protocol/domain part will be consistent but the full path will vary).
To support the authentication-related navigation from https://www.youtube.com/ to https://accounts.google.com/ and back to https://www.youtube.com/, configure as follows:
In the Browser content redirection authentication sites policy, add the entry: https://accounts.google.com/* (note the wildcard * to accommodate variations in URL sub-folder values).
More info can be found in CTX238236.
3. Browser Content Redirection feature limitations
Container | Audio Codecs | Video Codecs |
MP4 (QuickTime / MOV / MPEG4) Ogg WebM WAV | FLAC MP3 Opus PCM | VP8 VP9 Theora H264 |
-----------------------------------------------------------------------------------------------------------------------------------------------------------
Before proceeding, please review the “Browser Content Redirection feature limitations” section.
Step | May clear problem in |
Close the browser, re-open, and navigate to a whitelisted site. | Browser Add-On and HdxVideo.js file |
Disconnect and reconnect the session. | Citrix Workspace app, HdxBrowser.exe, HdxBrowserCef.exe, WebSocketAgent.exe, and services |
Logoff and logon to a new session. | Citrix Workspace app, HdxBrowser.exe, HdxBrowserCef.exe, WebsocketAgent.exe, and services |
Stop the services: 1. Browser redirection service, 2. HTML5 redirection service, and 3. Port forwarding service. Restart them in reverse order listed. Logoff and logon the session. | All components |
CDF modules to trace:
VDA Side | Citrix Workspace app (client) Side | ||||||||||||
|
|
4.3 HdxBrowser and Webcontainer (a.k.a Overlay Browser)
When using BCR with Internet Explorer 11, ensure HdxBrowser.exe is running with Citrix Workspace app for Windows (use Task Manager) while you are on a whitelisted site.
When using Google Chrome, the process is called HdxBrowserCef.exe.
Note: Chrome support requires CWA 1809 or higher, and VDA 1808 or higher.
This is how it looks on Process Explorer on the endpoint:
For Linux endpoints (Fat Clients, or Thin Client minimum versions: Unicon eLux RP 6.2.3 CR, HP ThinPro 7.1 or higher only, iGEL OS 10.05 or higher) the process used is webcontainer (placed in ICAROOT /util folder. ICAROOT generally is /opt/Citrix/ICAClient for root user).
Dell Wyse ThinOS Version 9.0 supports BCR.
i. Please check if webcontainer process is starting in your Linux client by running:
<ICAROOT>/util/webcontainer --version.
Sample output:
ii. If it fails then you have to install WebKitGTK+ version greater than 2.16.6 for Browser Content redirection to work.
WebKitGTK+ is a full-featured port of the WebKit rendering engine (WebKit2 API with GTK3).
(This is not part of Citrix Receiver / Workspace app, so you will need to download the proper package for your Linux distribution and processor architecture, or contact your Thin Client vendor).
Therefore, libwebkit2gtk-4.0.so.37 system library will be required for webcontainer to link against:
Note that glibcxx 3.4.20 or later is also required for BCR (#locate libstdc++.so.6 and then run #strings /<add the found location>/libstdc++.so.6 | grep GLIBCXX):
iii. You can then check if webcontainer process can render the video content locally by running:
./webcontainer --url https://www.youtube.com/html5
./webcontainer --url https://www.youtube.com
This test verifies if the endpoint has the proper codecs available (specially the 'ugly' ones like H264). The test does not invoke any Citrix VDA components, it is a purely local test. Webcontainer (WebKitWebProcess) will in turn make calls to GStreamer 1.x - if H264 is not loaded, VP8 will be used instead (if the website supports WebM).
In order to check your GStreamer version, run 'dpkg -l | grep gstreamer'.
More info on GStreamer requirements in CTX224988.
Note: Currently, if WebKitGTK+ version is below 2.22.3, then Media Source Extensions (MSE) are not supported so YouTube videos will only play up to 720p (with H264).
If H264 is not available or licensed, YouTube will attempt to use WebM container format (VP8/VP9 video codecs from gst-plugins-good and Opus audio codec from gst-plugins-base).
YouTube now requires MSE to play videos in WebM format, so a proper WebKitGTK+ version has to be present.
WebKitGTK+ version 2.22.5 or higher and GStreamer 1.14.4 or higher are recommended for YouTube.
iv. Running the top command while BCR is active will show:
While webcontainer is in use, there are 2 associated WebKit processes that run: WebKitNetworkProcess and WebKitWebProcess. The actual network outbound connections are made by WebKitNetworkProcess).
4.4 Browser JavaScript log live debugging in IE11 and Chrome:
If you want to debug in IE11, Open %programfiles%\Citrix\HdxVideo.js
(or depending on your VDA version, the Javascript can also be located inside a folder called %programfiles%\Citrix\ICASERVICE)
You might need to do this running Notepad as an Admin and opening the .js file from the Open menu
Change the line var DEBUG_ONLY = false; to var DEBUG_ONLY = true;
Save the file and close your Editor.
If you want to debug on Chrome, skip step #1. Make sure your Extension is at version 2.0. Right click on the icon, select Options and tick "Activate debug logging'.
Close Internet Explorer / Chrome and reopen it, hit F12 or Ctrl+Shift+I, and go to the Console tab in Developer tools. Browse to a whitelisted site, e.g. https://www.youtube.com
You should see traces from [HdxVideo.js] (example below). Collect the entire log.
Key messages to look for are highlighted in bold, with additional comments inside brackets [ ]:
[HdxVideo.js] OnUnload (window): [object Window] [HdxVideo.js] DocumentBodySuppressor.start() [HdxVideo.js Events] interceptEventListeners() [HdxVideo.js] DocumentBodySuppressor.trySetBodyStyle(): stopping observer [HdxVideo.js] OnLoad (window): [object HTMLDocument] [HdxVideo.js] Unredirected video count: 0 [HdxVideo.js] HDX_DO_PAGE_REDIRECTION: true [if false, redirection is not even attempted. Problem with policies or browser Extension?] [HdxVideo.js] infallback: undefined [HdxVideo.js] Installing event listeners. [HdxVideo.js] msexitFullscreen - Found! [HdxVideo.js] onWSOpen: [Websocket opening to WebsocketAgent.exe 127.0.0.1:9001 succeeded. If failed, check your IE Security Settings] [HdxVideo.js] >>> {"v":"pageurl","url":"https://www.google.de/"} [HdxVideo.js] onVisibilityChange: [HdxVideo.js] >>> {"v":"vis","vis":true} [HdxVideo.js] onResize: [HdxVideo.js] >>> {"v":"pageredir"} [HdxVideo.js] sendClientSize: w: 1316 h: 755 [HdxVideo.js] >>> {"v":"clisz","w":1316,"h":755} CSI/tbsd_: 15.599,072ms CSI/_tbnd: 15.658,128ms [HdxVideo.js] <<< {"v":"winid","title":"CitrixVideo:{1b83a2dc-39ae-4455-ad7d-d56e71fbb45d}"} [HdxVideo.js] onWSMessage: winid: CitrixVideo:{1b83a2dc-39ae-4455-ad7d-d56e71fbb45d} [HdxVideo.js] setWindowTitle: CitrixVideo:{1b83a2dc-39ae-4455-ad7d-d56e71fbb45d} [HdxVideo.js] documentTitleMutator.start() [HdxVideo.js] >>> {"v":"winid"} [HdxVideo.js] <<< {"v":"pageredir"} [VDA is instructing Receiver to start the redirection process] [HdxVideo.js] onWSMessage: pageredir [HdxVideo.js] Redirecting page -- 화이팅! https://www.google.de/ [Korean characters means the redirection was successful] |
A common error is:
[HdxVideo.js] OnUnload (window): [object Window] Navigation Event Separator HTML1300: Navigation occurred. www.youtube.com [HdxVideo.js] DocumentBodySuppressor.start() [HdxVideo.js Events] interceptEventListeners() [HdxVideo.js] DocumentBodySuppressor.trySetBodyStyle(): stopping observer [HdxVideo.js] OnLoad (window): [object HTMLDocument] [HdxVideo.js] Installing event listeners. [HdxVideo.js] msexitFullscreen - Found! [HdxVideo.js] doRedirection(): exception connecting to WebSocket: SecurityError [HdxVideo.js] onWSError: [HdxVideo.js] Showing content -- suspendRedirection. |
In the Developer Tools console this can be seen as:
This is caused by security configurations in IE11’s Security Zones, and the root of the issue is 127.0.0.1 being classified under the intranet zone while the redirected whitelisted site is in the internet zone.
Redirection might work as intended on Chrome (since it has no concept of Zones).
Internet Explorer automatically assigns all websites to a security zone: Internet, Local intranet, Trusted sites, or Restricted sites.
Important: 127.0.0.1 will be classified as either Intranet or Internet zone, depending on your IE11 Proxy configuration in Tools > Internet Options > Connections > LAN Settings (either PAC files - WPAD Proxy Script-, or Explicit Proxy -manual-). More info here.
If 127.0.0.1 ends up being classified as Intranet, then Zone elevation restrictions prevent connections from Internet zone to Local intranet zone, and BCR will fail.
The Local intranet option "Include all sites that bypass the proxy server" should be unchecked (disabled).
Rationale : If "Include all sites that bypass the proxy server" is enabled, 127.0.0.1 connections are considered to be in the Intranet zone. Zone elevation restrictions prevent connections from Internet zone to Local intranet zone. Most of the external redirected sites like Youtube will be in the Internet zone and the injected script HdxVideo.js will attempt a connection to 127.0.0.1:9001 in the Intranet zone which will be blocked. So, "Include all sites that bypass the proxy server" should be unchecked.
Internet Properties --> Security --> Local Intranet --> Sites, and uncheck "Include all sites that bypass the proxy server"
The equivalent configuration can be made by setting these regkeys via GPOs (ADM Computer template):
HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect [REG_DWORD value 0]
HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IntranetName [REG_DWORD value 1]
HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass [REG_DWORD value 0]
HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ UNCAsIntranet [REG_DWORD value 1]
Each zone has a different default security level that determines what kind of content might be blocked for that site.
Zone | Description | Default Setting |
Internet | Contains all websites that are not assigned to any other zone | Medium-high |
Local intranet | Contains all websites and content that is stored on a corporate intranet and don't require a Proxy Server | Medium-low |
Trusted Sites | Contains all Internet sites that you have specifically indicated to be ones that you trust not to damage your computer or information | Medium |
Restricted Sites | Contains all the sites that might potentially damage your computer or your information | High |
(Depending on the security level of a site, some content might be blocked until you choose to allow it).
You can check the Zone a website is assigned to by navigating to it and then right clicking --> Properties
![]() |
If the website you are trying to redirect is in your Internet Zone (see example above), then please try to add the following entry to the Trusted Zone Sites in IE11 (Internet Options -> Security)
|
You can verify if websockets are opened by going to Developer Tools -> Console and type:
var exampleSocket = new WebSocket('wss://127.0.0.1:9001'); exampleSocket.onmessage = function(messageEvent) { console.log(JSON.stringify(messageEvent)); }; |
wait a few seconds and then type: exampleSocket.readyState |
The expected output from the 2nd line, is '1', which indicates that the WebSocket connection was successfully formed. 0 ( CONNECTING ) The connection is not yet open | 1 (OPEN ) The connection is open and ready to communicate.2 ( CLOSING) The connection is in the process of closing | 3 (CLOSED ) The connection is closed or couldn't be opened |
![]() |
4.5 Pac files
The PAC file does not need to return DIRECT for 127.0.0.1:9001 (WebSocketService.exe on the VDA), IE11 makes direct connections for localhost/127.0.0.1 by default.
Zone elevations restrictions might, again, prevent HdxVideo.js to connect to 127.0.0.1:9001, so make sure it is classified as Internet Zone (see 4.4).
4.6 Content Security Policy
Another possible error is that some websites use a technology called CSP (Content Security Policy) which prevents any outside resource (like the Javascript used in BCR) from being executed in the trusted webpage context. Therefore Browsers prevent the injection of HdxVideo.js and BCR fails, falling back to server-side rendering.
This can be overcome if you have a Proxy server in your network (like Bluecoat) and you are able to apply HTTP Rewrites.
wss://127.0.0.1:9001 needs to be added to connect-src
4.7 Browser Helper Object (BHO for IE11)
The BHO is not currently compatible with Enhanced Protected Mode in IE11.
BHO is explicitly enabled upon install time of Citrix Virtual Apps and Desktops. If you want to disable it, please check the registry key created for the CLSID of the extension in the following path:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID
There should be a key created with the CLSID of the extension ie {CA076BDE-8E41-44EE-B775-E791F26D0483}
The value of the key is set to 1. This means the extension is enabled and users cannot change it.
If changed to 0 , the extension will be disabled and users cannot change it.
If changed to 2 , the extension will be enabled and users can enable or disable it in the browser's "Manage add-ons".
4.8 How to verify the webpage is redirected
Method #1: Drag the IE11 or Chrome window quickly. You will notice a ‘delay’ or ‘out of frame’ between the viewport and the User Interface.
Also you will notice a quick change in the title on the Tab (CitrixVideoId) before the original title is placed back
Method #2: When the right mouse button is clicked on window area, a customized context menu is displayed. Back/Forward menu items are currently disabled for the initial releases. The remaining menu items perform the following tasks:
Troubleshooting: If you end up on a different page, or the Authentication flow seems to be not working and the HdxBrowserCef.exe gets stuck in an authentication loop or falls back to the VDA-side browser, it means you missed some URLs in your Organization's authentication flow, and an intermediate page was not added to the Authentication Sites Studio policy.
In such cases, the VDA-side Event Viewer will have an entry that tells you exactly what website URL caused BCR to fail. Add it to the Authentication Sites Studio policy and re-test.
Event trigger | Event Args | Event Type | Event Name | EventId |
---|---|---|---|---|
BCR Client Browser Session Start | BrowserID | Info | EventClientBrowserSessionStart | 8003 |
BCR Client Browser Session Stop | BrowserID | Info | EventClientBrowserSessionStop | 8004 |
BCR Session Events Connect | - | Info | EventSessionConnected | 8005 |
BCR Session Events Reconnect | - | Info | EventSessionReconnected | 8006 |
BCR Session Events Disconnect | - | Info | EventSessionDisconnected | 8007 |
BCR Navigation attempt | BrowserID, Server/Client Requested, Hashed URL or trackable ID | Info | EventNavigationAttempt | 8008 |
BCR Navigation Blocked By policy | BrowserID, Hash or ID of Nav attempt | Warning | EventNavigationBlockedByPolicy | 8009 |
BCR Session Start / Navigation failed due to Server/Client Error | BrowserID, Hash or Nav ID - Level Error | Error | EventNavigationFailed | 8010 |
BCR Nav Attempt Succeeded on Client | BrowserID, Hash or Nav ID | Info | EventNavigationSuccess | 8011 |
BCR Client Set PageTitle | BrowserID | Info | EventClientSetPageTitle | 8012 |
BCR Nav Attempt or Browser Session Start failed on client | BrowserID, Reason code if any | Error | EventClientSideFailure | 8013 |