Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM Procedure)
Use this type of resource profile to enable a terminal session on a Citrix Metaframe server using settings that you specify in a customized ICA file.
To configure a Citrix resource profile that uses a custom ICA file:
- In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree tab, and then double-click the Secure Access device for which you want to configure a Citrix terminal services resource profile that uses custom ICA settings.
- Click the Configuration tab, and select Users > Resource Profiles > Terminal Services. The corresponding workspace appears.
- Click the New button and the New dialog box appears.
- Add or modify settings as specified in Table 22.
- Click one:
- OK—Saves the changes.
- Cancel—Cancels the modifications.
Table 22: Citrix Terminal Services (Custom ICA) Resource Profile Configuration Details
Option | Function | Your Action |
---|---|---|
Settings tab | ||
Name | Specifies a unique name for the resource profile. | Enter the name. |
Description | Describes the resource profile. | Enter the description. |
Java Support Options | Allows you to enable or disable Java applet support. | Select one of the following options from the Java Support Options drop-down list:
|
Applet to use | Specifies the Java applet that you want to associate with the resource profile. | Select a Java applet from the Applet to use drop–down list. |
Applet HTML | Specifies the HTML page definition that includes references to your Java applets. | Enter the HTML page definition. Note: The maximum size of the HTML that can be specified is 25KB. |
Type | Allows you to specify the terminal service. | Select Citrix using Custom ICA option to configure a citrix resource profile that uses a custom ICA file. |
Citrix using Custom ICA > Settings tab | ||
Custom ICA File | Specifies the ICA file that contains the session parameters that you want use. | Click the Browse button to select an ICA file. |
Custom ICA Filename | Specifies the unique name for the custom ICA file. | Enter the name. |
Citrix using Custom ICA > Autopolicy: Terminal Services Access control > Rules tab | ||
Name | Specifies the name of a policy that allows or denies users access to the resource profile. | Enter a name. |
Action | Enables you to allow or deny user access to resource. | Select either Allow or Deny from the Action drop–down list. |
Resources | Specifies the metaframe servers to which you want to enable access. | Enter the metaframe server. |
Citrix using Custom ICA > Bookmarks | ||
Name | Specifies the name of the session bookmark. | Enter the name. |
Description | Describes the resource profile. | Enter a description. |
Username | Specifies the username that the Secure Access device should pass to the terminal server. | Enter the username. |
Password Type | Specifies the static password or variable password. You can also use the password stored in the Secure Access device's primary or secondary authentication server. Or you can use the domain credentials to pass the user's cached domain credentials to the Windows Terminal Services server. | Select either Variable Password or Password from the Password Type drop–down list. |
Variable Password | Specifies the variable password. | Enter the <password> variable. Or use the following syntax to submit the password for the secondary authentication server: <Password@Secondary ServerName> or <Password[2]>. |
Explicit Password | Specifies the explicit password. | Enter the explicit password. |
Auto-launch | Allows you to automatically launch this terminal services session bookmark when users sign into the Secure Access device. | Select the Auto-launch check box to enable this feature. |
Applies to roles | Specifies the roles to which you want to display the session bookmarks. | Select one of the following options from the drop-down list:
|
Settings > Role Selections tab | ||
Roles Selections | Specifies the roles to which the resource profile applies. Note: The Role Selections tab is enabled only when you select the Subset of Terminal Service Profile roles check box from the Applies to roles drop down list. | Select the role and, click Add. |