Citrix

The Citrix integration enables biometric authentication via SAML 2.0 for Citrix Cloud and Citrix Workspace, covering both cloud identity federation and on-premises Gateway deployments for virtual apps and desktops.

Integration type

SSO

Updated

Overview

1Kosmos integrates with Citrix as a SAML 2.0 identity provider to secure administrator and subscriber access to Citrix Cloud and Citrix Workspace. Users authenticating through Citrix Workspace are redirected to 1Kosmos for biometric verification before being returned to their virtual app or desktop session. The integration covers Citrix Cloud identity federation (managed through Identity and Access Management in the Citrix Cloud admin console) as well as on-premises Citrix Gateway (NetScaler) deployments.

For Citrix Cloud, the SAML configuration is established by creating a SAML connection in Identity and Access Management → Authentication. Citrix Cloud provides fixed SP Entity IDs and ACS URLs based on the region of the tenant. For Citrix Gateway, the ACS URL follows the pattern https://[gateway-fqdn]/cgi/samlauth and the Entity ID is the gateway FQDN or a URI configured during SAML action setup.

Citrix Cloud supports both HTTP-POST and HTTP-Redirect binding. Users must have Active Directory accounts that are synchronized to the SAML identity provider for the authentication flow to succeed.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Citrix Cloud subscription: Administrator access to Identity and Access Management in the Citrix Cloud admin console, or ASDM/SSH access for Citrix Gateway/NetScaler.

  • Active Directory synchronization: User accounts must exist in Active Directory and be synchronized to your SAML identity provider. Citrix Cloud requires AD attributes (sAMAccountName, userPrincipalName) from the SAML assertion to locate the user.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Citrix:

Field

Where to find it

SAML Metadata URL or XML

AdminX → Settings → IdP Configuration → Metadata URL

SSO Service URL

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

Signing Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Fixed Citrix Cloud SP values to enter in AdminX:

Region

SP Entity ID

ACS URL

US / EU / APAC South

https://saml.cloud.com

https://saml.cloud.com/saml/acs

Japan

https://saml.citrixcloud.jp

https://saml.citrixcloud.jp/saml/acs

Government (US)

https://saml.cloud.us

https://saml.cloud.us/saml/acs

Citrix Gateway SP values (on-premises):

Field

Value

ACS URL

https://[gateway-fqdn]/cgi/samlauth

SP Entity ID

https://[gateway-fqdn] (or the FQDN configured as Issuer Name in the NetScaler SAML action)


Integration steps

Step 1: Add Check Point as a SAML application in AdminX (Citrix Cloud)

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Scroll to Custom App, select SAML 2.0 Generic, and click Add integration.

  • Enter "Citrix Cloud" as the Application Name, set Instance to Production, and enter your Citrix Workspace URL (https://[company].cloud.com) as the Application Access URL. Click Next.

  • Set the NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress. Add claims for email (Username), cip_upn (userPrincipalName), cip_oid (objectGUID), and displayName. Click Next.

  • Enter the Citrix Cloud SP Entity ID and ACS URL for your region from the table above. Enable Assertion signing and click Save.

Step 2: Configure the SAML connection in Citrix Cloud

  • Log in to the Citrix Cloud admin console and navigate to Identity and Access Management → Authentication.

  • Locate SAML 2.0 and select Connect from the ellipsis menu.

  • When prompted for your unique sign-in URL, enter a short URL-friendly identifier for your company (e.g., https://citrix.cloud.com/go/mycompany) and click Save and continue.

  • In the Configure SAML Identity Provider section, enter the 1Kosmos IdP Entity ID, SSO Service URL, and binding mechanism (HTTP Post). Upload the 1Kosmos signing certificate into the X.509 Certificate field.

  • Set SAML Response to Sign Either Response or Assertion and click Test and Finish.

Step 3: Assign the SAML authentication method in Workspace Configuration

  • In the Citrix Cloud admin console, navigate to Workspace Configuration → Authentication.

  • Select SAML 2.0 as the workspace authentication method.

  • Save the configuration. Users accessing Citrix Workspace will now be redirected to 1Kosmos for authentication.

Step 4: Configure Citrix Gateway (on-premises, if applicable)

  • Log in to the NetScaler/Citrix ADC management console and navigate to NetScaler Gateway → Policies → Authentication → SAML.

  • Create a new SAML Action. In the SAML IDP Metadata URL field, paste the 1Kosmos metadata URL. Set the Issuer Name to your gateway FQDN. Click Create.

  • Create a SAML Policy using the action, set the expression to ns_true, and bind the policy to the authentication virtual server for your gateway virtual server.

  • In AdminX, create a separate SAML application entry for Citrix Gateway using https://[gateway-fqdn]/cgi/samlauth as the ACS URL and the gateway FQDN as the Entity ID.

Step 5: Test the integration

  • Navigate to your Citrix Workspace URL and attempt to sign in.

  • Confirm you are redirected to the 1Kosmos login screen. Scan the QR code with the 1Kosmos mobile app and complete biometric authentication.

  • Confirm you are returned to Citrix Workspace with the correct virtual apps and desktops displayed.


Attribute mappings

Source (1Kosmos)

Target (Citrix Cloud)

Description

user.email

email / NameID

Primary identifier

user.upn

cip_upn (userPrincipalName)

Required for AD identity lookup in Citrix Cloud

user.objectGUID

cip_oid (objectGUID)

Used by Citrix Cloud to uniquely resolve the AD user

user.displayName

displayName

User display name

Integration notes

Citrix Cloud SAML authentication requires that the SAML assertion contain AD user attributes (UPN and objectGUID) so that Citrix Cloud can resolve the authenticated user against the Active Directory domain.

If these attributes are missing from the assertion, users will fail to log in even after successful biometric authentication. Some SAML providers prohibit reusing the same SP Entity ID across multiple applications.

If this applies to your configuration, use Citrix Cloud's scoped Entity ID feature by enabling Configure scoped SAML Entity ID during the SAML connection setup, which generates a unique Entity ID per connection.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.