FAQ: Configuring Local Access Using Receiver for HTML5 1.0

FAQ: Configuring Local Access Using Receiver for HTML5 1.0

book

Article ID: CTX137987

calendar_today

Updated On:

Description

This article is intended for Citrix administrators and technical teams only.

Non-admin users must contact their company’s Help Desk/IT support team and can refer to CTX297149 for more information.

This article contains Frequently Asked Questions on configuring local access using Citrix Receiver for HTML5 1.0. 

Q: Can I use Receiver for HTML5 1.0 with XenDesktop or earlier versions of XenApp?

A: Local access using Receiver for HTML5 1.0 is only supported with XenApp 6.5 Feature Pack 1 and StoreFront 1.2. Access to desktops provided by XenDesktop, Web and SaaS applications provided by AppController, and applications provided by previous versions of XenApp must connect through Access Gateway 10.

Q: I have trouble extracting the GroupPolicyManagement1.7.zip. How do I verify that the file I downloaded is not corrupted?

A: To verify that the downloaded file is not corrupted, check the MD5 checksum and compare it with the MD5 checksum that Citrix provides. The MD5 checksum can be verified with the md5sum tool for Windows.

  1. Click here to go to the download page of md5sum tool.

  2. Click md5sum.exe link to download the tool.

    User-added image

  3. Open command prompt and browse to the directory where md5sum.exe is located.

  4. Run md5 sum.exe followed by the path to the GroupPolicyManagement zip file. For example:

    md5sum.exe C:\Users\johnwhite\Desktop\GroupPolicyManagement1.7.zip.

    User-added image

  5. Verify if the md5 checksum value is equal to what Citrix posted. If the checksum value does not match, the download might be corrupted, and you should re-download the zip file and re-verify the md5 checksum value.

    User-added image

Q: How do I remove the client deployment message when I attempt to log on to StoreFront?

User-added image

A: On your StoreFront server, change the pluginAssistant enable="true" to pluginAssistant enable="false", on line 38 in the file located at: C:\inetpub\wwwroot\Citrix\<storename>Web\web.config where <storename> is the name specified for the store when it was created.
Refer to Citrix eDocs - Configuring Receiver for Web Using the Configuration Files for more information.

Q: Why do I get an error “Cannot reach server. Check your network connection or contact your help desk for assistance” when attempting to launch an application?

User-added image

A: The workstation might not have access to the WebSockets port (default TCP 8008) on the XenApp server. Adding a rule to the Windows Firewall on the XenApp server might be needed. This can be done by running the following command at the command prompt on your XenApp server:

netsh advfirewall firewall add rule name="Receiver for HTML5" dir=in action=allow protocol=TCP localport=8008

Q: When using Firefox, why do I get an error "Please contact your help desk with the following information. [Exception… "The operation is insecure." code:"x"]" when attempting to launch an application?

User-added image

In Firefox "about:config", change the value for network.websocket.allowInsecureFromHTTPS from “false” to “true”. Refer to CTX134123 - Unable to Launch Application by Using HTTPS URL with Citrix Receiver for HTML5 on Firefox Web Browser.

User-added image

Q: Do I have to install the GroupPolicyManagement policies on all servers in my XenApp 6.5 farm?

A: No. You can install and set the unfiltered computer policy on one server in your farm, and all servers will be enabled.

Q: Can I use SSL Relay with HTML5 1.0?

A: SSL Relay support requires connections through Access Gateway 10.

Q: If I use SecureICA to encrypt communications between users' devices and my XenApp servers, what type of encryption is supported?

A: Receiver for HTML5 1.0 supports basic encryption only.

Q: Can I use Receiver for HTML5 1.0 to connect to StoreFront stores or legacy PNAgent access?

A: Stores must be accessed through Receiver for web sites. Receiver for HTML5 does not support direct access to StoreFront stores, either by connecting to the store or by using the XenApp Services URL (legacy support).

Q: I use Chrome OS, why is the Receiver for HTML5 1.0 always being used?

A: When users run Chrome OS to log on to a Receiver for web site, Receiver for HTML5 is always used to provide access to their desktops and applications. If you want to prevent HTML5 1.0 from being used on Chrome OS, you must disable the client deployment feature in the "web.config" file on your StoreFront server. On your StoreFront server, change the html5 enabled="true" to html5 enabled="false" on line 41 in the file located at: C:\inetpub\wwwroot\Citrix\<storename>Web\web.config where <storename> is the name specified for the store when it is created. Refer to Citrix eDocs - Configuring Receiver for Web Using the Configuration Files for more information.

Q: Which default port does the Receiver for HTML5 1.0 use?

A: TCP 8008 by default. If you change the WebSockets port number setting in the XenApp policy, ensure to make the corresponding change when configuring the StoreFront server.

Q: Can I restrict which Receiver for Web URLs use Receiver for HTML5 1.0?

A: To restrict access to the XenApp server, specify a comma-separated list of trusted Receiver for Web URLs for the WebSockets Trusted Origin Server List setting. By default, the policy is set to trust all Receiver for Web URLs.

Issue/Introduction

This article contains FAQs on using the Receiver for HTML5 with XenApp 6.5 and StoreFront.