

Upload and install the SAML signing certificate to your NetScaler’s CA certificates.We just need to edit an existing virtual gateway to reflect our new SAML authentication against Azure AD. The configuration on the NetScaler side is quite straight forward. We need this later on our NetScaler to set up the SAML authentication. Download the SAML signing certificate (Base64).Make new certificate active and set a notification email
CITRIX REGISTER VIP ACCESS HOW TO
When the active signing certificate approaches its expiration date, notifications are sent to this email address with instructions on how to update the certificate. Make the new certificate active and set a notification email.Select erprincipalname for the User Identifier.Set the Sign on URL to your NetScaler gateway address.Set the Reply URL to the URL of your NetScaler gateway and append /cgi/samlauth.Set the Identifier to the URL of your NetScaler gateway.Move on to the Single sign-on settings and enable SAML-based sign-on.Add users and groups you want to grant access to the applicationĪssign users and groups to your application Assign users and groupsĪssigned user to the enterprise application.If this option is set to no, then any users who navigate to the application will be granted access. If this option is set to yes, users must first be assigned to this application before being able to access it.

Here you also can globally enable or disable the application and choose if a user assignment is required for the application.
