© 2014 Citrix. Confidential.1
© 2014 Citrix. Confidential.2
© 2014 Citrix. Confidential.3
© 2014 Citrix. Confidential.4
© 2014 Citrix. Confidential.5
© 2014 Citrix. Confidential.6
© 2014 Citrix. Confidential.7
© 2014 Citrix. Confidential.8
© 2014 Citrix. Confidential.9
© 2014 Citrix. Confidential.10
© 2014 Citrix. Confidential.11
© 2014 Citrix. Confidential.12
© 2014 Citrix. Confidential.13
© 2014 Citrix. Confidential.14
© 2014 Citrix. Confidential.15
Feedback
Please tweet about this session
#SYN607 and #CitrixSynergy
Andrew @NStipster
Lucas...
© 2014 Citrix. Confidential.16
Upcoming SlideShare
Loading in …5
×

Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

1,718 views

Published on

This session will cover how Worx home user authentication and communication flow works and what tools can be used for troubleshooting common authentication issues.

What you will learn
- XenMobile Enterprise authentication flow
- How Single Sign-on works between NetScaler Gateway and App Controller
- How "Step up" authentication works for WorxMail and WorxWeb

Published in: Technology, Business
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,718
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
121
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide
  • http://somenewsfromnowhere.blogspot.co.uk/2010/06/use-of-industrial-facades_17.html

    We are very excited about our upcoming Synergy 2014 conference. This is our second year in Los Angeles and we expect it to be the biggest and best show ever.
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • https://www.owasp.org/index.php/Top_10_2013-A1-Injection

    Inject into SQL/OS/LDAP

    Untrusted data is sent as part of a command or query

    Trick interpreter into executing unintended commands
  • Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow in XM Enterprise Edition

    1. 1. © 2014 Citrix. Confidential.1
    2. 2. © 2014 Citrix. Confidential.2
    3. 3. © 2014 Citrix. Confidential.3
    4. 4. © 2014 Citrix. Confidential.4
    5. 5. © 2014 Citrix. Confidential.5
    6. 6. © 2014 Citrix. Confidential.6
    7. 7. © 2014 Citrix. Confidential.7
    8. 8. © 2014 Citrix. Confidential.8
    9. 9. © 2014 Citrix. Confidential.9
    10. 10. © 2014 Citrix. Confidential.10
    11. 11. © 2014 Citrix. Confidential.11
    12. 12. © 2014 Citrix. Confidential.12
    13. 13. © 2014 Citrix. Confidential.13
    14. 14. © 2014 Citrix. Confidential.14
    15. 15. © 2014 Citrix. Confidential.15 Feedback Please tweet about this session #SYN607 and #CitrixSynergy Andrew @NStipster Lucas @NS_Informer NetScaler @netscaler
    16. 16. © 2014 Citrix. Confidential.16

    ×