Administrator Guide

Table Of Contents
Citrix ADC Native OTP
Citrix ADC (formerly NetScaler) Native OTP enables Citrix ADC Gateway to use one-time passwords (OTPs) for authentication
without the need of an extra authenticating server. A one-time password that is generated by Google Authenticator is
considered to be highly secure as passcodes are randomly generated.
If you access the Broker agent using Citrix ADC native OTP authentication, lock terminal is not supported as it is a web-based
authentication. When you try to use lock terminal, a message is displayed where you can click either Continue to log off or click
Cancel to stay on the screen. You are automatically signed off from the account in sixty seconds for security purposes.
Figure 24. Unable to lock account
For more information about Native OTP support for authentication, see the NetScaler Gateway12.0 documentation at
docs.citrix.com.
Log in to Citrix ADC using the passcode
Prerequisites
Ensure that you are using Citrix ADC (formerly NetScaler) 12.0 build 51.24 and later versions.
Ensure that you have registered your device with Citrix ADC. For a detailed procedure on how to register your device with
Citrix ADC, see the Native OTP support for authentication article at docs.citrix.com.
About this task
This section describes how to log in to Citrix ADC using the OTP.
Steps
1. From the desktop menu, click System setup > Remote Connections.
The Remote Connections dialog box is displayed.
2. Click the Broker Setup tab and select Citrix Virtual Apps and Desktops from the Broker Type drop-down list.
3. Enter the IP address of the Citrix ADC FQDN server in the Broker Server field.
You can configure other options if required.
4. Click OK.
The NetScaler login window is displayed.
5. Launch the Google Authenticator application on your phone and get the passcode.
6. In the Citrix ADC login window, enter the passcode and click OK.
If the authentication is successful, you are logged into Citrix ADC.
Citrix Federated Authentication Service SAML with Microsoft Azure Active
Directory
ThinOS supports the Citrix Federated Authentication Service with Microsoft Azure Active Directory during single sign-on to
Citrix ADC using the Security Assertion Markup Language (SAML) based authentication. The FAS server delegates the user
authentication to the Microsoft ADFS server or Azure AD with Security Assertion Markup Language (SAML). Both, Azure AD
Multiple Factors Authentication (MFA) and Self-service password reset (SSPR), are supported.
70
Configuring connection brokers