Citrix Receiver

by Citrix for Mac OS X

Download Now

Downloaded: 29K

Access Citrix business applications

If your company uses Citrix to host applications, you can use Citrix Receiver for Mac to check your email, review documents, log into project dashboards, approve expenses and much more.

Citrix Receiver is a web plugin and has replaced the standalone client Citrix Receiver for Mac. Citrix Receiver for Mac enables you to take your office with you wherever you go. You can access applications and Windows desktops and even tablet or smartphone. Citrix Receiver for Mac prevents the need of having to store sensitive data on your laptop as you can access your company network as if you were in the office. Citrix Receiver is available for Mac, Windows, iOS, Android and Blackberry with additional platforms coming soon.

Citrix Receiver for Mac is an essential tool to connect your Mac with your company network.

Single authentication to the Access Gateway: Use of a single session for both VPN and clientless access so that a Receiver user logs on once for both types of access and consumes only one license. Automatic routing of ICA traffic through the Access Gateway ICA proxy for optimal user experience. Automatic start-up of a VPN tunnel when a user logs on. This feature requires that you disable the Single Sign-On with Windows setting on the Access Gateway. Support for Access Gateway SmartAccess controls.Improved logon and logoff operations: Users are prompted to log on to Receiver only when a logon is required. Actions that require a log on include starting an app from Receiver or the Finder, using the Refresh Apps command, viewing or searching for apps, or adding an account. A user is logged on only to the account associated with the requested resource. Users remain logged on until choosing to log off or exit Receiver, roam from the internal network to an external network, or delete passwords. A VPN tunnel is established only if needed. Internal users are logged on to StoreFront.Other Usability improvements: The Request button is removed. Users can now simply click to add an app and, if a request for permission to add the app is required, a dialog box appears. Error messages are clearer. All Receiver User interface (UI) images are retina display compliant.StorageZones Receiver provides support for ShareFile StorageZones, which enable data storage close to users. SHA2 Certs. You can now use server certificates with a public key of 2,048-bit RSA and a SHA256 signature hash algorithm.

Changes

  • Single authentication to the Access Gateway: Use of a single session for both VPN and clientless access so that a Receiver user logs on once for both types of access and consumes only one license. Automatic routing of ICA traffic through the Access Gateway ICA proxy for optimal user experience. Automatic start-up of a VPN tunnel when a user logs on. This feature requires that you disable the Single Sign-On with Windows setting on the Access Gateway. Support for Access Gateway SmartAccess controls.Improved logon and logoff operations: Users are prompted to log on to Receiver only when a logon is required. Actions that require a log on include starting an app from Receiver or the Finder, using the Refresh Apps command, viewing or searching for apps, or adding an account. A user is logged on only to the account associated with the requested resource. Users remain logged on until choosing to log off or exit Receiver, roam from the internal network to an external network, or delete passwords. A VPN tunnel is established only if needed. Internal users are logged on to StoreFront.Other Usability improvements: The Request button is removed. Users can now simply click to add an app and, if a request for permission to add the app is required, a dialog box appears. Error messages are clearer. All Receiver User interface (UI) images are retina display compliant.StorageZones Receiver provides support for ShareFile StorageZones, which enable data storage close to users. SHA2 Certs. You can now use server certificates with a public key of 2,048-bit RSA and a SHA256 signature hash algorithm.