-
Endpoint Management integration with Microsoft Endpoint Manager
-
Certificates and authentication
-
Client certificate or certificate plus domain authentication
-
Authentication with Azure Active Directory through Citrix Cloud
-
Authentication with Azure Active Directory Group-Based Administration
-
Authentication with Azure Active Directory through Citrix Gateway for MAM enrollment
-
Authentication with Okta through Citrix Gateway for MAM enrollment
-
Authentication with an on-premises Citrix Gateway through Citrix Cloud
-
-
Compliance Enforcement for Android device (Technical Preview)
-
Kiosk device policy
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Kiosk device policy
The Kiosk policy lets you restrict devices to Kiosk mode by limiting the apps that can run. Citrix Endpoint Management does not control which part of the device locks in Kiosk mode. The device manages the kiosk mode settings after you deploy the policy.
To add or configure this policy, go to Configure > Device Policies. For more information, see Device policies.
To set up iPads to run in Kiosk mode, use the App lock device policy. For information about setting up iPads as kiosks, see Configure an iPad as a kiosk. You can also configure an iPad to open only a single website. For information, see the Webclip policy.
Windows Desktop and Tablet settings
For Windows Desktop and Tablet devices, the Kiosk policy applies only to local users and users enrolled in Azure AD.
A single app or multiple apps can run in Kiosk mode on Windows Desktop and Tablet devices.
Note:
The Kiosk device policy applies only to Windows 10 devices. To deploy a single-app kiosk on Windows 11 devices, you can use the Custom XML device policy to deploy the XML script we provide to the devices. For more information, see Deploy a single-app kiosk on Windows 11 devices.
-
UWP app AUMID: Click Add, select Universal Windows Platform (UWP) app, and enter the application user model ID (AUMID) for each UWP app. For example, enter the following AUMID:
Microsoft.WindowsCalculator_8wekyb3d8bbwe!App
-
Win32 app path and Win32 app AUMID: Click Add, select the Windows desktop (
Win32
) app, and enter the path and the AUMID for eachWin32
app. For example, enter the following path and AUMID:-
%windir%\system32\mspaint.exe
orC:\Windows\System32\mspaint.exe
{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\mspaint.exe
-
- Start layout: Only the default start screen for apps is available.
- Default XML: Only the default XML script is available.
-
Select user type: Specify the user type to receive the Kiosk policy. Your options:
- Local: Citrix Endpoint Management creates a user for the target device or adds an existing user.
- Azure AD: Citrix Endpoint Management adds users enrolled in Azure AD.
-
User name: Enter the user name to receive the Kiosk policy.
- To create a local user name on the target device, enter the name. Make sure that your local user name doesn’t have the domain. If you enter an existing name, Citrix Endpoint Management doesn’t create a user or change the current password.
- To add an Azure AD user, enter the name in the format
azuread\user
. Theuser
portion can be either the Name entered when creating a user in Azure AD, or the User name entered when creating a user in Azure AD. The assigned user can’t be an Azure AD administrator.
- Password: There is no password configuration for the Azure AD users. Type the password only for the local user name.
- Show task bar: Enable the taskbar to provide users with an easy way to view and manage applications. The default is Off.
- Click Next and save the changes.
For a UWP app that you want to allow in Kiosk mode, you need to provide the AUMID. To get a list of the AUMIDs for all Microsoft Store apps installed for the current device user, run the following PowerShell command:
$installedapps = get-AppxPackage
$aumidList = @()
foreach ($app in $installedapps)
{
foreach ($id in (Get-AppxPackageManifest $app).package.applications.application.id)
{
$aumidList += $app.packagefamilyname + "!"+ $id
}
}
$aumidList
<!--NeedCopy-->
Android Enterprise settings
You can allow apps and set lock task mode for dedicated Android Enterprise devices, which are also known as corporate owned single use (COSU) devices.
To allow an app, click Add. You can add multiple apps to the allow list. For more information, see Android Enterprise.
-
Apps to allow: Enter the package name of the app that you want to allow or select the app from the list.
- Click Add new to enter the package name of the allowed app in the list.
- Select the existing app from the list. The list shows apps that are uploaded in Citrix Endpoint Management. By default, Citrix Secure Hub and Google Play services are on the allow list.
- Lock task mode: Choose Allow to set the app to be pinned to the device screen when the user starts the app. Choose Block to set the app not to be pinned. Default is Allow.
When an app is in lock task mode, the app is pinned to the device screen when the user opens it. No Home button appears and the Back button is disabled. The user exits the app using an action programmed into the app, such as signing out.
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.