Following the announcement of general availability of SAML 2.0 (Security Assertion Markup Language) for Citrix Workspace now we can officially integrate Google as a primary identity provider for Citrix Workspace.
The blog created by Citrix Technologist Javier Lopez Santacruz can be referred for the same details.
With this integration you can provide all the benefits of Citrix Secure Workspace Access including SSO capabilities to any:
including all the Security AI built into Google when authenticating your users with any 2-Step Verification methods like Google Authenticator, Text message or phone call, Yubikey passwordless access…
For an optimal end-user experience, it is recommended deploying a Citrix cloud FAS server to provide single sign-on and prevent a second logon prompt when opening an app or desktop from the Citrix Virtual Apps and Desktops service. For more information, see Connect Citrix Federated Authentication Service to Citrix Cloud.
User assignment to resources is done by picking users out of an Active Directory
The configuration can be completed following these steps:
1 – Connect Active Directory to Citrix Cloud
2 – Sync Active Directory to Google Cloud :
1a) To sync Active Directory to Google Cloud, use the Google Cloud Directory Sync tool.
Configure the Sync tool using the standard setup.
The extra item that needs to be added is a custom schema named “citrix-schema” (recommended)
Ensure you add the fields with exact casing as noted in the image on the top right.
Once the sync is complete the User Information section in Google Cloud will contain the user’s Active Directory information
Update Feb 2022: With the latest Google Cloud Directory Sync (GCDS) 4.7.14 version published on February 2022 you can finally automatize your AD user’s synchronization with google workspace to have a seamless SSO experience with Citrix.
Make sure you Select Base64 in your Schema :
1b) Sync Active Directory to Google Cloud without Google cloud sync
We will need to create a Custom schema with the UPN, ObjectGUID and SID
TROUBLESHOOTING
We need to verify the attributes are correctly imported from AD to google and integrated in the SAML response:
https://chrome.google.com/webstore/detail/saml-message-decoder/mpabchoaimgbdbbjjieoaeiibojelbhm
We need to verify in the SAML response that we are passing the correct attributes from AD