![]() ![]() Open the Citrix Workspace app Group Policy Object administrative template by running gpedit.msc.You can disable the LaunchDarkly service by using a Group Policy Object (GPO) policy. Verify if the apps can communicate with the following services if you have split tunneling on the Citrix ADC set to OFF for the following services: For details about the status of the infrastructure changes, see the LaunchDarkly Status page. You can use this list to know that your firewall configurations are updated automatically in keeping with the infrastructure updates. If you must list IP addresses in an allow list, for a list of all current IP address ranges, see LaunchDarkly public IP list. You can enable traffic and communication to LaunchDarkly in the following ways: Enable traffic to the following URLs In that case, you enable traffic to LaunchDarkly via specific URLs or IP addresses, depending on your policy requirements. You do not need to make any configurations to enable traffic to LaunchDarkly, except when you have a firewall or proxy blocking outbound traffic. To do so, we use feature flags and a third-party service called LaunchDarkly. If an issue occurs with Citrix Workspace app in production, we can disable an affected feature dynamically in Citrix Workspace app even after the feature is shipped. This article discusses the tasks and considerations that are relevant for administrators of Citrix Workspace app for Windows. When using the Citrix Workspace app for Windows, the following configurations allow you to access their hosted applications and desktops. Questo articolo è stato tradotto automaticamente. (Aviso legal)Įste artigo foi traduzido automaticamente. (Clause de non responsabilité)Įste artículo ha sido traducido automáticamente. (Haftungsausschluss)Ĭe article a été traduit automatiquement. This article has been machine translated.ĭieser Artikel wurde maschinell übersetzt. Questo contenuto è stato tradotto dinamicamente con traduzione automatica. (Aviso legal)Įste texto foi traduzido automaticamente. (Clause de non responsabilité)Įste artículo lo ha traducido una máquina de forma dinámica. (Haftungsausschluss)Ĭet article a été traduit automatiquement de manière dynamique. Browser add-ons, extensions and plugins are not disabled.This content has been machine translated dynamically.ĭieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. When unchecked, URLs are not redirected from hosted desktop to client or vice versa. Browser add-ons, extensions and plugins required for this feature would also need to enable. URL blacklist and whitelist on host determine which URLs would be redirected. When this is checked, client allows URLs to be redirected from hosted desktop browser to locally installed browser or vice versa. When disabled, client doesn't present local apps inside hosted desktop. When this policy is enabled, client presents locally installed applications inside hosted desktop as shortcuts. When users launch locally installed applications using shortcuts, applications appear to be running on their hosted desktop even though it is running on their local device. Local App Access enables the integration of locally installed applications within a hosted desktop. Use this policy to control how the client presents local applications inside a hosted desktop. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |