Your SlideShare is downloading. ×
0
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

877

Published on

This session will cover how Worx home user authentication and communication flow works and what tools can be used for troubleshooting common authentication issues. …

This session will cover how Worx home user authentication and communication flow works and what tools can be used for troubleshooting common authentication issues.

What you will learn
- XenMobile Enterprise authentication flow
- How Single Sign-on works between NetScaler Gateway and App Controller
- How "Step up" authentication works for WorxMail and WorxWeb

Published in: Technology, Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
877
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
98
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • http://somenewsfromnowhere.blogspot.co.uk/2010/06/use-of-industrial-facades_17.html

    We are very excited about our upcoming Synergy 2014 conference. This is our second year in Los Angeles and we expect it to be the biggest and best show ever.
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • Transcript

    • 1. © 2014 Citrix. Confidential.1
    • 2. © 2014 Citrix. Confidential.2
    • 3. © 2014 Citrix. Confidential.3
    • 4. © 2014 Citrix. Confidential.4
    • 5. © 2014 Citrix. Confidential.5
    • 6. © 2014 Citrix. Confidential.6
    • 7. © 2014 Citrix. Confidential.7
    • 8. © 2014 Citrix. Confidential.8
    • 9. © 2014 Citrix. Confidential.9
    • 10. © 2014 Citrix. Confidential.10
    • 11. © 2014 Citrix. Confidential.11
    • 12. © 2014 Citrix. Confidential.12
    • 13. © 2014 Citrix. Confidential.13
    • 14. © 2014 Citrix. Confidential.14
    • 15. © 2014 Citrix. Confidential.15 Feedback Please tweet about this session #SYN607 and #CitrixSynergy Andrew @NStipster Lucas @NS_Informer NetScaler @netscaler
    • 16. © 2014 Citrix. Confidential.16

    ×