This article describes how to configure XenDesktop to work using Pass-through with smart card logon.
Ensure that the following components are installed and configured:
Windows domain is correctly configured to work with Smart Card authentication.
Refer to http://technet.microsoft.com/en-us/library/dd277362.aspx web page of Microsoft TechNet for more information on Smart Cards.
The latest version of Web Interface is installed. In this article, we are assuming that Web Interface and Desktop Delivery Controller (DDC) are on the same machines.
Refer to http://www.citrix.com/site/SS/downloads/index.asp web page of Citrix to download the latest version of Web Interface.
Note: The Web Interface server is a part of the Windows domain.
Complete the following procedures to configure Pass-through with Smart Cards logon on XenDesktop:
The following processes should be in place to configure the Client End Point:
Ensure that the smart card drivers are installed. Install the mini driver for Gemalto.
Ensure you have the latest Microsoft BASE CSP libraries. The hotfix is available for these issues.
Note: Some of the cards, such as ActivIdentity smart cards do not use the Microsoft Base Smart Card Crypto Provider. Hence installing the Microsoft Base CSP libraries is not always mandatory.
Ensure that the local log on using smart card is working.
The following processes should be in place to configure the User Account in Active Directory:
Ensure you have configured a smart card for the user account.
Ensure smart card logon and smart card pass-through logon are enabled through group policy in Active Directory for the user, as explained in the Accessing the template file section.
Load and configure Citrix ADM Group Policy Snap-in.
Citrix uses a Microsoft Active Directory Group Policy ADM template to propagate many settings to multiple Citrix clients. Some of these settings relate to smart card. To access the icaclient.adm file, complete the following procedure.
Install the Citrix ICA client on Windows.
Access the C:\Program Files\Citrix\ICA Client\Configuration file.
Copy this file to the domain controller.
On the Active Directory domain controller, run the group policy MMC snap-in for the Default Domain Policy.
Select User Configuration.
From Policies, navigate to Administrative Templates.
Right-click and select Add/Remove Templates.
Click Add and select the icaclient.adm file.
Note: The group policy can be linked at levels other than the domain level. Site level and Organizational Unit level is also available as well as local to an individual machine. In this article, the group policy is linked to the Domain level.
If you are using Windows Server 2008, your Group Policy snap-in should be as displayed in the following screen shot:
Enable Smart card authentication and Local username and password from User authentication, as displayed in the following screen shot:
Under Smartcard Authentication, select Allow Smartcard Authentication and Use pass-through authentication for PIN, as displayed in the following screen shot:
Select Allow pass-through authentication for all ICA connections from the Local user name and password properties, as displayed in the following screen shot:
Complete the following procedure to configure the VDA:
Caution! Refer to the Disclaimer at the end of this article before using Registry Editor.
Ensure that the Microsoft base CSP and smart card drivers are installed on the VDA.
If Program Neighborhood Agent / Receiver is used, then ensure that the following registry keys for smart card pin pass-through are created:
Create a registry key and name it as Program Neighborhood Agent in HKLM\SOFTWARE\Citrix.
Note: On a 64-bit machine, this registry key should be created in the 32-bit view of the registry because pnamain.exe is a 32-bit application.
Create the key in HKLM\SOFTWARE\Wow6432Node\Citrix.
To the Program Neighborhood Agent registry key, add a REG_DWORD registry value called SmartCardPinPass and set to non-zero.
To the Program Neighborhood Agent registry key, add a REG_DWORD registry value called SmartCardPassthru and set to non-zero.
If the Web Interface is used, ensure that the Web Interface site is added to the trusted sites and logon with local username and password is enabled in the Internet Explorer. Complete the following procedure to log on to Internet Explorer:
On the Windows Internet Explorer webpage, select Tools.
From Internet Options, select Security.
Click Custom Level.
Select User Authentication.
Select Automatic Logon with current user and password.
Click OK.
Complete the following steps to configure the XenDesktop Broker / DDC:
Ensure that the Trust XML service is configured for the following Broker:
add-PSSnapin citrix*
set-brokersite –TrustRequestsSentToTheXmlServicePOrt $True
Ensure IIS 7 is configured for smart cards in Windows Server 2008.
Start IIS.
Select the server name.
In the IIS section, double-click Server Certification, as displayed in the following screen shot:
Note: You should obtain a server certificate for the XenDesktop(Broker) server.
Navigate to the Default Web site Home.
From the Actions section, select Bindings, as displayed in the following screen shot:
Click Add.
Select https as the Type.
In the SSl certificate, select the server certificate you obtained earlier, as displayed in the following screen shot:
Select the server name.
On the homepage, select Authentication, as displayed in the following screen shot:
Double-click the Authentication icon to display the Authentication settings.
Ensure to enable the following Authentication:
Active Directory Client Certificate Authentication.
Anonymous Authentication.
Note: Active Directory Certificate Authentication option appears only in the server home section.
Navigate to the Default Web Site and double-click Authentication and ensure that the following Authentication types are enabled:
Anonymous
Basic Authentication
Digest Authentication
Windows Authentication
Navigate to Defaut Web Site and select SSL settings.
Select Require SSL and set Client certificates to Ignore, as displayed in the following screen shot:
Note: If Client certificate is not set to Ignore, the IIS server attempts to verify that the client machine holds the private key corresponding to the public key that the client presents to the IIS server.
Ensure XML service port is not sharing the same port as IIS.
Note: Sharing the same port causes authentication fail after the PIN is entered.
Refer to CTX125107 - How to Configure XML Service to Share a Port with IIS on 32 and 64 Bit Versions of Windows Server 2008 (Note: Article CTX125107 is written for XenApp but since the steps are same we can refer it for Xendesktop too.)
Ensure that the Smart card pass-through authentication is enabled in the PNAgent site/Web Interface site.
Change the XML Service port, as displayed in the following screen shot:
Change the port number in the sites of Citrix Web Interface after changing the XML Service port.
To edit the port number, right-click XenApp site or PNAgent site and select Server Farms, as displayed in the following screen shot: