Remote PC Access – For Computing Labs


Using Remote PC Access for Office Workers is an extremely easy use case where we have a 1:1 relationship between users and PCS. But what about computing labs where the relationship changes from 1:Many? This type of architecture looks slightly different. A few things to be aware of with computing labs Computing labs typically have more users than PCs. Users are able to use any available PC in the lab. There are no permanent assignments. User access to a PC is based on user request. If no PC is available to fulfill the request, the user must make a new … Continue reading Remote PC Access – For Computing Labs

Remote PC Access – For Office Workers


Within Citrix Virtual Apps and Desktops, there has been a hidden gem called Remote PC Access. For many people who commute to work, they sit in the same chair in front of the same PC. In it’s simplest terms, Remote PC Access simple moves that chair away from the PC. This simplified architecture shows what this looks like, with Citrix Gateway sitting between the firewalls, allowing remote users access to internal resources: To make this work, each PC that needs to be accessed remotely must include the Virtual Delivery Agent (VDA).  There are ways to get this VDA. Full VDA: … Continue reading Remote PC Access – For Office Workers

Citrix Virtual Apps and Desktops Bandwidth


With Citrix Virtual Apps and Desktops 1912 achieved LTSR (Long Term Servicing Release).  This is the first LTSR since the 7.15 release, which was almost 3 years earlier. In 3 years, a lot has changed. The protocol had many improvements that directly impacted the user experience and bandwidth utilization. With each release, since 7.11 (2016), I ran a standard series of LoginVSI tests to compare bandwidth utilization. Since the 1912 release is an LTSR, it is time to reset the test scenarios. I need to update the base operating system to something more recent. I also want to apply a … Continue reading Citrix Virtual Apps and Desktops Bandwidth

Vertical or Horizontal Load Balancing


Three years ago, I wrote the following best practices: Virtual Apps and Desktops Best Practice #4: To manage costs, focus on the right user experience instead of the best user experience. Typically, the better something is, the more it will cost.  So you need to find that happy place where you align user experience with the cost. And with all of the focus on cloud, this is even more important.  In the world of Virtual Apps and Windows Virtual Desktops (WVD), we have two choices in load balancing users across different server instances: Horizontal or Vertical. Let’s see how they … Continue reading Vertical or Horizontal Load Balancing

Citrix Workspace Authentication: Duo


A user’s primary identity authorizes access to the Workspace. A username and password is not a strong authentication policy.  Passwords are problematic. We know we need to provide multi-factor authentication. And within Citrix Workspace, the options continue to expand. So far, I’ve been able to demonstrate how to integrate the following with Citrix Workspace: Active Directory with TOTP Azure Active Directory with Yubikey’s Okta Citrix Gateway Citrix Gateway is an interesting option.  With Citrix Gateway, we have many options for our primary identity. So far, I’ve shown how you can use Gateway with an on-prem TOTP solution as well as … Continue reading Citrix Workspace Authentication: Duo

VDI Deployment Options


I enjoy having choices. I like having choices between Hefeweizen, Amber and Pale Ales. I like having a choice between playing Fallout, Mass Effect and Lego Star Wars. I like having a choice between mountain biking, tennis or hiking (yes, you can do all of these in the winter in Minnesota). I also have a choice in how to handle maintenance activities around my personal life. For example, I mow my own lawn, but I don’t change the oil in my car.  I don’t have the tools or skills needed to handle a car oil change, nor do I want … Continue reading VDI Deployment Options

Citrix Workspace Authentication: Federated Authentication Services


I have one primary key to let me into my house. Once I’m inside my house, I can see many resources that I might want to use like a bed, bathroom, safe, TV and a freezer. However, some of these resources are secured with a different key. I might have a code to access NetFlix. There might be a lock on the bathroom door.  There is a lock on the safe.  There is even a key to access the freezer (gotta protect those bratwurst). The keys I need once I’m in my house are secondary. They provide me access to … Continue reading Citrix Workspace Authentication: Federated Authentication Services