Book Image

Citrix XenDesktop Cookbook-Third Edition

By : Gaspare Silvestri
Book Image

Citrix XenDesktop Cookbook-Third Edition

By: Gaspare Silvestri

Overview of this book

Table of Contents (18 chapters)
Citrix XenDesktop Cookbook Third Edition
About the Author
About the Reviewers

Implementing the two-factor hardware authentication for XenDesktop® 7

With your personal data archived on your desktop machine, the standard authentication made up of a username and password combination can be insufficient to meet the security requirements.

A valid solution to this situation can be given by the use of devices, such as smart cards or PKI tokens, when trying to access your working resources.

XenDesktop is able to use this type of strong authentication. In this recipe, we are going to detail the implementation of this process.

Getting ready

In order to be able to utilize valid certificates, you need to perform the following configuration tasks:

  1. Use an existing Enterprise CA or install an Enterprise Certification Authority machine to generate valid certificates. You can find more details at

  2. Configure an existing domain machine as the Enrollment agent station in order to configure the smart cards with your certificates. You...