Configure

Feature flag management

Feature flags are used to enable or disable features dynamically. If an issue occurs with Citrix Workspace app in production, the affected feature can be disabled dynamically, even after the feature is shipped.

How to configure

No configurations are needed to enable traffic for feature management, except when a firewall or proxy is blocking outbound traffic. In such cases, you need to enable traffic using specific URLs or IP addresses, depending on your policy requirements.

Enable traffic for feature flag management

For Citrix Workspace app version 2409 and later:

To ensure optimal functionality and access to preview features, you need to enable traffic to the URL features.netscalergateway.net.

Known issues and workarounds

If you can’t upgrade to Citrix Workspace app for ChromeOS 2409 or later and experience inconsistencies with the following feature in versions older than 2409, set the recommended configuration values as follows:

  • Unable to copy and paste cells between the published Microsoft Excel app and Google Sheets. As a workaround, disable the DDC policy Restrict client clipboard write to disallow image format. For more information, see Client clipboard redirection. [CVADHELP-18566]

  • In a session, you might observe poor audio quality. The pitch of the audio stream might change automatically. As a workaround, set the attribute AudioRedirectionV4 to false. For detailed steps on how to disable AudioRedirectionV4, see Plug and play audio device support section. [CVADHELP-24447]

Note on Configuration JSON

With the version 2202.1 (22.2.1.8), Citrix Workspace app honors only valid JSON for pushing the configuration. Do the following to validate the JSON file:

  1. Verify the JSON data. Use the link https://jsonlint.com/ to verify.
  2. Follow the steps mentioned in the Get started page to update:

    • Google Policy
    • web.config
    • default.ica
    • configuration.js

    We recommend using the Configuration utility tool to generate valid JSON settings to customize Citrix Workspace app for ChromeOS using:

    • configuration.js
    • web.config
    • default.ica
    • Google Policy

Note:

You might experience session launch issues when the configuration JSON is invalid.

HTTP proxy setting on Chromebook

In case you have set up the HTTP proxy setting on your Chromebook, it’s possible that your sessions might not start.

To resolve the issue, you can disable the nativeSocket setting on the Google Admin Console and make sure that you’ve enabled the WebSockets connections policy in DDC. For more information, see the WebSocket article.

The following is an example of JSON data:

{
        "settings": {
        "Value": {
              "settings_version": "1.0",
              "engine_settings": {
                         "transport":
                                { "nativeSocket": false
                                  }
                            }
                     }
          }
}
<!--NeedCopy-->

Warning:

Disabling the nativeSocket attribute enables WebSocket connection, which might affect performance in comparison to using a native socket.

Support for HTTP proxy

Starting from the 2411 version, Citrix Workspace app for ChromeOS provides enhanced HTTP proxy support. Enterprises can use this feature for both TCP and UDP connections, ensuring Citrix Workspace app is compatible with your organization’s networking requirements.

For more information, see the Google support article.

Kiosk mode

Citrix Workspace app for ChromeOS kiosk mode helps you to run all apps in the same window. Using this feature, you can run Citrix Workspace apps in kiosk mode, and then launch any Windows app or desktop using the same mode. In addition, kiosk mode allows you to publish remote apps or desktops as a dedicated Chrome package using a persistent URL.

How to configure

You can control this feature by adjusting the kiosk settings in the Chrome admin panel. This setting applies for managed Chrome devices only.

See the Google support site for instructions on enabling the Citrix Workspace app to run in kiosk mode on managed and non-managed Chrome devices.

If you’re deploying a Citrix Workspace app, you must publish using the visibility options set to Public/unlisted to verify interoperability with kiosk mode. Go to the Chrome Web Store Developer Dashboard

The store URL is read-only when kiosk mode is active and can’t be edited using the Account settings screen. However, you can change this setting by either:

  • repackaging the app with the .cr file, or
  • using the Google Admin Console. Use Google Policy Management to access Google Admin Console.
    <Services version="1.0">
    <Service>
    <rfWeb>http://your_RfWebURL_or_persistenturl</rfWeb>
    <Name>Mystore</Name>
    <Gateways>
    <Gateway>
    <Location>https://yourcompany.gateway.com</Location>
    </Gateway>
    </Gateways>
    <Beacons>
    <Internal>
    <Beacon>http://yourcompany.internalwebsite.net</Beacon>
    </Internal>
    <External>
    <Beacon>http://www.yourcompany.externalwebsite.com</Beacon>
    </External>
    </Beacons>
    </Service>
    </Services>

<!--NeedCopy-->

If you’re using the Google Admin Console, edit the policy.txt file containing the Citrix Workspace configuration. Replace the value of “url” under “rf_web” with a persistent URL.

    {
    "settings": {
    "Value": {
    "settings_version": "1.0",
    "store_settings": {
    "beacons": {
    "external": [
    {
    "url": "http://www.yourcompany.externalwebsite.com"
    }
    ],
    "internal": [
    {
    "url": "http://yourcompany.internalwebsite.net"
    }
    ]
    },
    "gateways": [
    {
    "is_default": true,
    "url": "https://yourcompany.gateway.com"
    }
    ],
    "name": "mystore",
    "rf_web": {
    "url": " http://your_RfWebURL_or_persistenturl "
    }
    }
    }
    }
    }
<!--NeedCopy-->

Global App Configuration service

From this release, as an administrator, you can use the Global App Configuration service to:

  • centrally manage and configure app settings and set defaults.
  • apply the settings for both managed and unmanaged (BYOD) devices
  • apply the settings for both cloud users (domain claimed) and on-premises users (URL claimed).

For more information, see the Global App Configuration service documentation.

Notes:

This feature is available for workspace and HTTPS‑based stores only. For the Global App Configuration service to work, verify if your users can access the URL https://discovery.cem.cloud.us, https://gacs-discovery.cloud.com, and https://gacs-config.cloud.com.

Limitations

  • Custom domain URLs feature doesn’t adhere to the Global App Configuration service (GACS) settings.
Configure