WO2022246343A1 - Dispositif informatique et procédés associés assurant le lancement d'une session virtuelle à partir d'actifs préalablement mis en cache - Google Patents

Dispositif informatique et procédés associés assurant le lancement d'une session virtuelle à partir d'actifs préalablement mis en cache Download PDF

Info

Publication number
WO2022246343A1
WO2022246343A1 PCT/US2022/071370 US2022071370W WO2022246343A1 WO 2022246343 A1 WO2022246343 A1 WO 2022246343A1 US 2022071370 W US2022071370 W US 2022071370W WO 2022246343 A1 WO2022246343 A1 WO 2022246343A1
Authority
WO
WIPO (PCT)
Prior art keywords
browser
sequence
failure
complete
code
Prior art date
Application number
PCT/US2022/071370
Other languages
English (en)
Inventor
Georgy Momchilov
Hubert Divoux
Santosh Gummunur Chiranjeevi Sampath
Deepak Sharma
Original Assignee
Citrix Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/447,838 external-priority patent/US11474840B1/en
Application filed by Citrix Systems, Inc. filed Critical Citrix Systems, Inc.
Publication of WO2022246343A1 publication Critical patent/WO2022246343A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/452Remote windowing, e.g. X-Window System, desktop virtualisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • G06F16/972Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Definitions

  • desktop virtualization a user's operating system, applications, and/or user settings may be separated from the user's physical smartphone, laptop, or desktop computer.
  • a “virtualized desktop” may be stored in and administered by a remote server, rather than in the local storage of a client computing device.
  • VDI Virtual Desktop Infrastructure
  • Virtualization systems may also be implemented in a cloud computing environment in which a pool of computing desktop virtualization servers, storage disks, networking hardware, and other physical resources may be used to provision virtual desktops, and/or provide access to shared applications.
  • a computing device may include a memory and a processor configured to cooperate with the memory to run a browser configured to perform a sequence to obtain an asset and display a user interface for launching a virtual session using the asset.
  • the processor may further run code configured to determine a failure of the browser to complete the sequence, and cause the browser to display the user interface for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence.
  • the code may be configured to determine initiation of the sequence based upon an address loaded by the browser, and the code may determine the failure of the browser to complete the sequence responsive to determining initiation of the sequence.
  • the browser may be configured to perform the sequence at a first Web page and display a second Web page in the user interface for launching the virtual session, and the code may be configured to redirect the browser to the second Web page responsive to determining the failure of the browser to complete the sequence.
  • the code may be configured to cause the browser to display an input element, and detect the failure of the browser to complete the sequence based upon the input element.
  • the input element may comprise a cancel button.
  • the code may be configured to detect the failure of the browser to complete the sequence based upon a timeout period.
  • the asset may comprise a connection lease.
  • the sequence may comprise an authentication sequence.
  • the virtual session may comprise at least one of an application session and a microapp session, for example.
  • a related method may include running a browser at a computing device configured to perform a sequence to obtain an asset and display a user interface for launching a virtual session using the asset.
  • the method may further include running code at the computing device configured to determine a failure of the browser to complete the sequence, and cause the browser to display the user interface for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence.
  • a related non-transitory computer-readable medium may have computer- executable instructions for causing a computing device to perform steps including running a browser configured to perform a sequence to obtain an asset and display a user interface for launching a virtual session using the asset.
  • a further step may include running code configured to determine a failure of the browser to complete the sequence, and cause the browser to display the user interface for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence.
  • FIG. 1 is a schematic block diagram of a network environment of computing devices in which various aspects of the disclosure may be implemented.
  • FIG. 2 is a schematic block diagram of a computing device useful for practicing an embodiment of the client machines or the remote machines illustrated in FIG. 1.
  • FIG. 3 is a schematic block diagram of a cloud computing environment in which various aspects of the disclosure may be implemented.
  • FIG. 4 is a schematic block diagram of desktop, mobile and web-based devices operating a workspace app in which various aspects of the disclosure may be implemented.
  • FIG. 5 is a schematic block diagram of a workspace network environment of computing devices in which various aspects of the disclosure may be implemented.
  • FIG. 6 is a schematic block diagram of a computing system providing virtual session launching based upon cached assets in accordance with an example embodiment.
  • FIG. 7 is a schematic block diagram of a connection lease architecture and independent flow sequences in which the system of FIG. 6 may be implemented in accordance with an example embodiment.
  • FIG. 8 is a schematic block diagram of an example implementation of the system of FIG. 6 within the connection lease architecture of FIG. 7.
  • FIGS. 9-11 are a series of display views of a user interface of the system of FIG. 8 which provide cancellable Web-based authentication to virtual sessions and redirection to an offline resource access page in an example embodiment.
  • FIGS. 12A and 12B are a sequence diagram illustrating a cancellable Web authentication flow for the system of FIG. 8 in accordance with an example implementation.
  • FIG. 13 is a sequence diagram illustrating how the browser extension of the system of FIG. 8 responds to cancellation events in an example implementation.
  • FIG. 14 is a flow diagram illustrating example method aspects associated with the system of FIG. 6.
  • connection leases which provide long-lived and mostly static entitlements to published resources the users are entitled to access.
  • This not only makes the connection lease secure, it also allows the connection leases to be relatively long-lived in that they can be updated on a less frequent basis (e.g., to account for changes in user permissions, network addresses, etc.).
  • challenges may occur when attempting to access published resources through a browser, such as authentication failures. For example, such failures may result from Internet connectivity to cloud or identity platform resources, rendering these services unavailable.
  • third-party identity provider (IDP) services may be down or experiencing intermittent failures.
  • the approach set forth herein allows a browser to present a user interface allowing access to virtual sessions even when an outage or offline condition occurs that would otherwise block authentication and prevent access to the virtual sessions. More particularly, the user interface provides the ability to redirect away from a stuck or failed authentication sequence, yet still access a virtual session using a previously cached asset, such as a cached version of a connection lease.
  • a previously cached asset such as a cached version of a connection lease.
  • this approach helps overcome a stuck authentication flow by redirecting the browser away from an address associated with the authentication sequence and to another address where the virtual session may be accessed through the user interface using the cached asset.
  • the redirection may be performed responsive to an input element (e.g., a cancel button) inserted within the user interface during the authentication sequence or automatically, thereby helping ensure that in offline or outage conditions the user still has the ability to access virtual sessions.
  • a non-limiting network environment 10 in which various aspects of the disclosure may be implemented includes one or more client machines 12A-12N, one or more remote machines 16A-16N, one or more networks 14, 14’, and one or more appliances 18 installed within the computing environment 10.
  • the client machines 12A-12N communicate with the remote machines 16A-16N via the networks 14, 14’.
  • the client machines 12A-12N communicate with the remote machines 16A-16N via an intermediary appliance 18.
  • the illustrated appliance 18 is positioned between the networks 14, 14’ and may also be referred to as a network interface or gateway.
  • the appliance 108 may operate as an application delivery controller (ADC) to provide clients with access to business applications and other data deployed in a data center, the cloud, or delivered as Software as a Service (SaaS) across a range of client devices, and/or provide other functionality such as load balancing, etc.
  • ADC application delivery controller
  • SaaS Software as a Service
  • multiple appliances 18 may be used, and the appliance(s) 18 may be deployed as part of the network 14 and/or 14’.
  • the client machines 12A-12N may be generally referred to as client machines 12, local machines 12, clients 12, client nodes 12, client computers 12, client devices 12, computing devices 12, endpoints 12, or endpoint nodes 12.
  • the remote machines 16A-16N may be generally referred to as servers 16 or a server farm 16.
  • a client device 12 may have the capacity to function as both a client node seeking access to resources provided by a server 16 and as a server 16 providing access to hosted resources for other client devices 12A-12N.
  • the networks 14, 14’ may be generally referred to as a network 14.
  • the networks 14 may be configured in any combination of wired and wireless networks.
  • a server 16 may be any server type such as, for example: a file server; an application server; a web server; a proxy server; an appliance; a network appliance; a gateway; an application gateway; a gateway server; a virtualization server; a deployment server; a Secure Sockets Layer Virtual Private Network (SSL VPN) server; a firewall; a web server; a server executing an active directory; a cloud server; or a server executing an application acceleration program that provides firewall functionality, application functionality, or load balancing functionality.
  • SSL VPN Secure Sockets Layer Virtual Private Network
  • a server 16 may execute, operate or otherwise provide an application that may be any one of the following: software; a program; executable instructions; a virtual machine; a hypervisor; a web browser; a web-based client; a client-server application; a thin-client computing client; an ActiveX control; a Java applet; software related to voice over internet protocol (VoIP) communications like a soft IP telephone; an application for streaming video and/or audio; an application for facilitating real-time-data communications; a HTTP client; a FTP client; an Oscar client; a Telnet client; or any other set of executable instructions.
  • VoIP voice over internet protocol
  • a server 16 may execute a remote presentation services program or other program that uses a thin-client or a remote-display protocol to capture display output generated by an application executing on a server 16 and transmit the application display output to a client device 12.
  • a server 16 may execute a virtual machine providing, to a user of a client device 12, access to a computing environment.
  • the client device 12 may be a virtual machine.
  • the virtual machine may be managed by, for example, a hypervisor, a virtual machine manager (VMM), or any other hardware virtualization technique within the server 16.
  • VMM virtual machine manager
  • the network 14 may be: a local-area network (LAN); a metropolitan area network (MAN); a wide area network (WAN); a primary public network 14; and a primary private network 14. Additional embodiments may include a network 14 of mobile telephone networks that use various protocols to communicate among mobile devices. For short range communications within a wireless local-area network (WLAN), the protocols may include 802.11 , Bluetooth, and Near Field Communication (NFC).
  • WLAN wireless local-area network
  • NFC Near Field Communication
  • FIG. 2 depicts a block diagram of a computing device 20 useful for practicing an embodiment of client devices 12, appliances 18 and/or servers 16.
  • the computing device 20 includes one or more processors 22, volatile memory 24 (e.g., random access memory (RAM)), non-volatile memory 30, user interface (Ul) 38, one or more communications interfaces 26, and a communications bus 48.
  • volatile memory 24 e.g., random access memory (RAM)
  • non-volatile memory e.g., random access memory (RAM)
  • User user interface
  • the non-volatile memory 30 may include: one or more hard disk drives (HDDs) or other magnetic or optical storage media; one or more solid state drives (SSDs), such as a flash drive or other solid-state storage media; one or more hybrid magnetic and solid-state drives; and/or one or more virtual storage volumes, such as a cloud storage, or a combination of such physical storage volumes and virtual storage volumes or arrays thereof.
  • HDDs hard disk drives
  • SSDs solid state drives
  • virtual storage volumes such as a cloud storage, or a combination of such physical storage volumes and virtual storage volumes or arrays thereof.
  • the user interface 38 may include a graphical user interface (GUI) 40 (e.g., a touchscreen, a display, etc.) and one or more input/output (I/O) devices 42 (e.g., a mouse, a keyboard, a microphone, one or more speakers, one or more cameras, one or more biometric scanners, one or more environmental sensors, and one or more accelerometers, etc.).
  • GUI graphical user interface
  • I/O input/output
  • the non-volatile memory 30 stores an operating system 32, one or more applications 34, and data 36 such that, for example, computer instructions of the operating system 32 and/or the applications 34 are executed by processor(s) 22 out of the volatile memory 24.
  • the volatile memory 24 may include one or more types of RAM and/or a cache memory that may offer a faster response time than a main memory.
  • Data may be entered using an input device of the GUI 40 or received from the I/O device(s) 42.
  • Various elements of the computer 20 may communicate via the communications bus 48.
  • the illustrated computing device 20 is shown merely as an example client device or server, and may be implemented by any computing or processing environment with any type of machine or set of machines that may have suitable hardware and/or software capable of operating as described herein.
  • the processor(s) 22 may be implemented by one or more programmable processors to execute one or more executable instructions, such as a computer program, to perform the functions of the system.
  • processor describes circuitry that performs a function, an operation, or a sequence of operations. The function, operation, or sequence of operations may be hard coded into the circuitry or soft coded by way of instructions held in a memory device and executed by the circuitry.
  • a processor may perform the function, operation, or sequence of operations using digital values and/or using analog signals.
  • the processor can be embodied in one or more application specific integrated circuits (ASICs), microprocessors, digital signal processors (DSPs), graphics processing units (GPUs), microcontrollers, field programmable gate arrays (FPGAs), programmable logic arrays (PLAs), multi-core processors, or general-purpose computers with associated memory.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • GPUs graphics processing units
  • FPGAs field programmable gate arrays
  • PDAs programmable logic arrays
  • multi-core processors or general-purpose computers with associated memory.
  • the processor 22 may be analog, digital or mixed-signal.
  • the processor 22 may be one or more physical processors, or one or more virtual (e.g., remotely located or cloud) processors.
  • a processor including multiple processor cores and/or multiple processors may provide functionality for parallel, simultaneous execution of instructions or for parallel, simultaneous execution of one instruction on more than one piece of data.
  • the communications interfaces 26 may include one or more interfaces to enable the computing device 20 to access a computer network such as a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or the Internet through a variety of wired and/or wireless connections, including cellular connections.
  • a computer network such as a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or the Internet through a variety of wired and/or wireless connections, including cellular connections.
  • the computing device 20 may execute an application on behalf of a user of a client device.
  • the computing device 20 may execute one or more virtual machines managed by a hypervisor. Each virtual machine may provide an execution session within which applications execute on behalf of a user or a client device, such as a hosted desktop session.
  • the computing device 20 may also execute a terminal services session to provide a hosted desktop environment.
  • the computing device 20 may provide access to a remote computing environment including one or more applications, one or more desktop applications, and one or more desktop sessions in which one or more applications may execute.
  • An example virtualization server 16 may be implemented using Citrix Hypervisor provided by Citrix Systems, Inc., of Fort Lauderdale, Florida (“Citrix Systems”).
  • Virtual app and desktop sessions may further be provided by Citrix Virtual Apps and Desktops (CVAD), also from Citrix Systems.
  • Citrix Virtual Apps and Desktops is an application virtualization solution that enhances productivity with universal access to virtual sessions including virtual app, desktop, and data sessions from any device, plus the option to implement a scalable VDI solution.
  • Virtual sessions may further include Software as a Service (SaaS) and Desktop as a Service (DaaS) sessions, for example.
  • SaaS Software as a Service
  • DaaS Desktop as a Service
  • a cloud computing environment 50 is depicted, which may also be referred to as a cloud environment, cloud computing or cloud network.
  • the cloud computing environment 50 can provide the delivery of shared computing services and/or resources to multiple users or tenants.
  • the shared resources and services can include, but are not limited to, networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, databases, software, hardware, analytics, and intelligence.
  • the cloud network 54 may include backend platforms, e.g., servers, storage, server farms or data centers.
  • the users or clients 52A-52C can correspond to a single organization/tenant or multiple organizations/tenants. More particularly, in one example implementation the cloud computing environment 50 may provide a private cloud serving a single organization (e.g., enterprise cloud). In another example, the cloud computing environment 50 may provide a community or public cloud serving multiple organizations/ tenants. In still further embodiments, the cloud computing environment 50 may provide a hybrid cloud that is a combination of a public cloud and a private cloud.
  • Public clouds may include public servers that are maintained by third parties to the clients 52A-52C or the enterprise/tenant. The servers may be located off-site in remote geographical locations or otherwise.
  • the cloud computing environment 50 can provide resource pooling to serve multiple users via clients 52A-52C through a multi-tenant environment or multi tenant model with different physical and virtual resources dynamically assigned and reassigned responsive to different demands within the respective environment.
  • the multi-tenant environment can include a system or architecture that can provide a single instance of software, an application or a software application to serve multiple users.
  • the cloud computing environment 50 can provide on-demand self- service to unilaterally provision computing capabilities (e.g., server time, network storage) across a network for multiple clients 52A-52C.
  • the cloud computing environment 50 can provide an elasticity to dynamically scale out or scale in responsive to different demands from one or more clients 52.
  • the computing environment 50 can include or provide monitoring services to monitor, control and/or generate reports corresponding to the provided shared services and resources.
  • the cloud computing environment 50 may provide cloud-based delivery of different types of cloud computing services, such as Software as a service (SaaS) 56, Platform as a Service (PaaS) 58, Infrastructure as a Service (laaS) 60, and Desktop as a Service (DaaS) 62, for example.
  • SaaS Software as a service
  • PaaS Platform as a Service
  • laaS Infrastructure as a Service
  • DaaS Desktop as a Service
  • laaS may refer to a user renting the use of infrastructure resources that are needed during a specified time period.
  • laaS providers may offer storage, networking, servers or virtualization resources from large pools, allowing the users to quickly scale up by accessing more resources as needed.
  • laaS examples include AMAZON WEB SERVICES provided by Amazon.com, Inc., of Seattle, Washington, RACKSPACE CLOUD provided by Rackspace US, Inc., of San Antonio, Texas, Google Compute Engine provided by Google Inc. of Mountain View, California, or RIGHTSCALE provided by RightScale, Inc., of Santa Barbara, California.
  • PaaS providers may offer functionality provided by laaS, including, e.g., storage, networking, servers or virtualization, as well as additional resources such as, e.g., the operating system, middleware, or runtime resources.
  • additional resources such as, e.g., the operating system, middleware, or runtime resources.
  • PaaS include WINDOWS AZURE provided by Microsoft Corporation of Redmond,
  • SaaS providers may offer the resources that PaaS provides, including storage, networking, servers, virtualization, operating system, middleware, or runtime resources.
  • SaaS providers may offer additional resources including, e.g., data and application resources.
  • Examples of SaaS include GOOGLE APPS provided by Google Inc., SALESFORCE provided by Salesforce.com Inc. of San Francisco, California, or OFFICE 365 provided by Microsoft Corporation.
  • Examples of SaaS may also include data storage providers, e.g. DROPBOX provided by Dropbox, Inc. of San Francisco, California, Microsoft SKYDRIVE provided by Microsoft Corporation, Google Drive provided by Google Inc., or Apple ICLOUD provided by Apple Inc. of Cupertino, California.
  • DaaS (which is also known as hosted desktop services) is a form of virtual desktop infrastructure (VDI) in which virtual desktop sessions are typically delivered as a cloud service along with the apps used on the virtual desktop.
  • VDI virtual desktop infrastructure
  • Citrix Cloud is one example of a DaaS delivery platform. DaaS delivery platforms may be hosted on a public cloud computing infrastructure such as AZURE CLOUD from Microsoft Corporation of Redmond, Washington (herein “Azure”), or AMAZON WEB SERVICES provided by Amazon.com, Inc., of Seattle, Washington (herein “AWS”), for example.
  • Citrix Workspace app may be used as a single entry point for bringing apps, files and desktops together (whether on-premises or in the cloud) to deliver a unified experience.
  • the Citrix Workspace app 70 is how a user gets access to their workspace resources, one category of which is applications. These applications can be SaaS apps, web apps or virtual apps.
  • the workspace app 70 also gives users access to their desktops, which may be a local desktop or a virtual desktop. Further, the workspace app 70 gives users access to their files and data, which may be stored in numerous repositories.
  • the files and data may be hosted on Citrix ShareFile, hosted on an on-premises network file server, or hosted in some other cloud storage provider, such as Microsoft OneDrive or Google Drive Box, for example.
  • the workspace app 70 is provided in different versions.
  • One version of the workspace app 70 is an installed application for desktops 72, which may be based on Windows, Mac or Linux platforms.
  • a second version of the workspace app 70 is an installed application for mobile devices 74, which may be based on iOS or Android platforms.
  • a third version of the workspace app 70 uses a hypertext markup language (HTML) browser to provide a user access to their workspace environment.
  • HTML hypertext markup language
  • the web version of the workspace app 70 is used when a user does not want to install the workspace app or does not have the rights to install the workspace app, such as when operating a public kiosk 76.
  • Each of these different versions of the workspace app 70 may advantageously provide the same user experience. This advantageously allows a user to move from client device 72 to client device 74 to client device 76 in different platforms and still receive the same user experience for their workspace.
  • endpoints 74 and 76 are referred to as endpoints.
  • the workspace app 70 supports Windows, Mac, Linux, iOS, and Android platforms as well as platforms with an HTML browser (HTML5).
  • the workspace app 70 incorporates multiple engines 80-90 allowing users access to numerous types of app and data resources. Each engine 80-90 optimizes the user experience for a particular resource. Each engine 80-90 also provides an organization or enterprise with insights into user activities and potential security threats.
  • An embedded browser engine 80 keeps SaaS and web apps contained within the workspace app 70 instead of launching them on a locally installed and unmanaged browser. With the embedded browser, the workspace app 70 is able to intercept user-selected hyperlinks in SaaS and web apps and request a risk analysis before approving, denying, or isolating access.
  • a high definition experience (HDX) engine 82 establishes connections to virtual browsers, virtual apps and desktop sessions running on either Windows or Linux operating systems. With the HDX engine 82, Windows and Linux resources run remotely, while the display remains local, on the endpoint. To provide the best possible user experience, the HDX engine 82 utilizes different virtual channels to adapt to changing network conditions and application requirements. To overcome high-latency or high-packet loss networks, the HDX engine 82 automatically implements optimized transport protocols and greater compression algorithms. Each algorithm is optimized for a certain type of display, such as video, images, or text. The HDX engine 82 identifies these types of resources in an application and applies the most appropriate algorithm to that section of the screen.
  • a workspace centers on data.
  • a content collaboration engine 84 allows users to integrate all data into the workspace, whether that data lives on-premises or in the cloud.
  • the content collaboration engine 84 allows administrators and users to create a set of connectors to corporate and user-specific data storage locations. This can include OneDrive, Dropbox, and on-premises network file shares, for example. Users can maintain files in multiple repositories and allow the workspace app 70 to consolidate them into a single, personalized library.
  • a networking engine 86 identifies whether or not an endpoint or an app on the endpoint requires network connectivity to a secured backend resource.
  • the networking engine 86 can automatically establish a full VPN tunnel for the entire endpoint device, or it can create an app-specific m-VPN connection.
  • a m-VPN defines what backend resources an application and an endpoint device can access, thus protecting the backend infrastructure. In many instances, certain user activities benefit from unique network-based optimizations. If the user requests a file copy, the workspace app 70 can automatically utilize multiple network connections simultaneously to complete the activity faster. If the user initiates a VoIP call, the workspace app 70 improves its quality by duplicating the call across multiple network connections.
  • the networking engine 86 uses only the packets that arrive first.
  • An analytics engine 88 reports on the user’s device, location and behavior, where cloud-based services identify any potential anomalies that might be the result of a stolen device, a hacked identity or a user who is preparing to leave the company.
  • the information gathered by the analytics engine 88 protects company assets by automatically implementing counter-measures.
  • a management engine 90 keeps the workspace app 70 current. This not only provides users with the latest capabilities, but also includes extra security enhancements.
  • the workspace app 70 includes an auto-update service that routinely checks and automatically deploys updates based on customizable policies.
  • a workspace network environment 100 providing a unified experience to a user based on the workspace app 70 will be discussed.
  • the desktop, mobile and web versions of the workspace app 70 all communicate with the workspace experience service 102 running within the Cloud 104.
  • the workspace experience service 102 then pulls in all the different resource feeds 16 via a resource feed micro-service 108. That is, all the different resources from other services running in the Cloud 104 are pulled in by the resource feed micro-service 108.
  • the different services may include a virtual apps and desktop service 110, a secure browser service 112, an endpoint management service 114, a content collaboration service 116, and an access control service 118. Any service that an organization or enterprise subscribes to are automatically pulled into the workspace experience service 102 and delivered to the user's workspace app 70.
  • the resource feed micro-service 108 can pull in on-premises feeds 122.
  • a cloud connector 124 is used to provide virtual apps and desktop deployments that are running in an on-premises data center.
  • Desktop virtualization may be provided by Citrix virtual apps and desktops 126, Microsoft RDS 128 or VMware Horizon 130, for example.
  • device feeds 132 from Internet of Thing (loT) devices 134 may be pulled in by the resource feed micro-service 108.
  • Site aggregation is used to tie the different resources into the user's overall workspace experience.
  • the cloud feeds 120, on-premises feeds 122 and device feeds 132 each provides the user's workspace experience with a different and unique type of application.
  • the workspace experience can support local apps, SaaS apps, virtual apps, and desktops browser apps, as well as storage apps. As the feeds continue to increase and expand, the workspace experience is able to include additional resources in the user's overall workspace. This means a user will be able to get to every single application that they need access to.
  • the unified experience starts with the user using the workspace app 70 to connect to the workspace experience service 102 running within the Cloud 104, and presenting their identity (event 1).
  • the identity includes a user name and password, for example.
  • the workspace experience service 102 forwards the user’s identity to an identity micro-service 140 within the Cloud 104 (event 2).
  • the identity micro-service 140 authenticates the user to the correct identity provider 142 (event 3) based on the organization’s workspace configuration.
  • Authentication may be based on an on- premises active directory 144 that requires the deployment of a cloud connector 146.
  • Authentication may also be based on Azure Active Directory 148 or even a third party identity provider 150, such as Citrix ADC or Okta, for example.
  • the workspace experience service 102 requests a list of authorized resources (event 4) from the resource feed micro-service 108.
  • the resource feed micro-service 108 requests an identity token (event 5) from the single-sign micro-service 152.
  • the resource feed specific identity token is passed to each resource’s point of authentication (event 6).
  • On-premises resources 122 are contacted through the Cloud Connector 124.
  • Each resource feed 106 replies with a list of resources authorized for the respective identity (event 7).
  • the resource feed micro-service 108 aggregates all items from the different resource feeds 106 and forwards (event 8) to the workspace experience service 102.
  • the user selects a resource from the workspace experience service 102 (event 9).
  • the workspace experience service 102 forwards the request to the resource feed micro-service 108 (event 10).
  • the resource feed micro-service 108 requests an identity token from the single sign-on micro-service 152 (event 11).
  • the user s identity token is sent to the workspace experience service 102 (event 12) where a launch ticket is generated and sent to the user.
  • the user initiates a secure session to a gateway service 160 and presents the launch ticket (event 13).
  • the gateway service 160 initiates a secure session to the appropriate resource feed 106 and presents the identity token to seamlessly authenticate the user (event 14).
  • the session initializes, the user is able to utilize the resource (event 15). Having an entire workspace delivered through a single access point or application advantageously improves productivity and streamlines common workflows for the user.
  • a computing system 200 illustratively includes a computing device 201 which allows for redirection away from failed Web-based authentication sequences is first described.
  • the system 200 illustratively includes a computing device 201 , which in an example embodiment may be a client endpoint device such as a smartphone, laptop computer, desktop computer, tablet computer, etc.
  • the computing device 201 illustratively includes a memory 202 and a processor 203 cooperating with the memory 202 to run a browser 204 configured to complete a sequence (e.g., an authentication sequence) to obtain an asset and display a user interface (Ul) 205 (e.g., in an online mode) for launching a virtual session using the asset.
  • a sequence e.g., an authentication sequence
  • User user interface
  • the processor 203 is further configured to run code 210 (e.g., a browser extension, as will be discussed further below) configured to determine a failure of the browser 204 to complete the sequence. Responsive to detection of the failure to complete the sequence, the code 210 causes the browser 204 to display the Ul 205 (e.g., in an offline mode) for launching the virtual session using a previously cached version of the asset, as will also be discussed further below.
  • code 210 e.g., a browser extension, as will be discussed further below
  • the code 210 causes the browser 204 to display the Ul 205 (e.g., in an offline mode) for launching the virtual session using a previously cached version of the asset, as will also be discussed further below.
  • the computing system 250 provides access to virtual sessions based upon connection leases.
  • the connection lease generation functions are performed within a cloud computing service 255 (e.g., Citrix Cloud) which illustratively includes a cloud interface 256 configured to interface with a client device 252 for enrollment and lease generation to access virtual sessions 254.
  • the cloud interface 256 may be implemented with Citrix Workspace (CWA), and the client device 252 may be running Citrix Workspace App, although other suitable platforms may be used in different embodiments.
  • the cloud computing service 255 further illustratively includes a Root of Trust (RoT) 257, Connection Lease Issuing Service (CLIS) 258, gateway service 259, broker 260, and database 261 , which will be described further below.
  • RoT Root of Trust
  • CLIS Connection Lease Issuing Service
  • the client device 252 has a public-private encryption key pair associated therewith, which in the illustrated example is created by a hardware-backed key store 262.
  • the hardware-backed key store 262 prevents the client device 252 operating system (OS) from accessing the private key.
  • the client device 252 OS performs cryptographic operations with the private key, but without the ability to access/export the key.
  • Examples of hardware-backed key stores include Trusted Platform Module (TPM) on a personal computer (PC), iOS Secure Enclave, and Android Hardware Key Store, for example, although other suitable encryption key generation platforms may also be used.
  • TPM Trusted Platform Module
  • PC personal computer
  • iOS Secure Enclave iOS Secure Enclave
  • Android Hardware Key Store for example, although other suitable encryption key generation platforms may also be used.
  • a hardware-backed key store 262 such as a TPM, is a microchip installed on the motherboard of client device 252 and designed to provide basic security-related functions, e.g., primarily involving encryption keys.
  • a hardware-backed key store 262 communicates with the remainder of the system by using a hardware bus.
  • a client device 252 that incorporates a hardware- backed key store 262 can create cryptographic keys and encrypt them so that they can only be decrypted by the hardware-backed key store 262.
  • wrapping or binding a key can help protect the key from disclosure, such as from other parts of the client device 252 (e.g., the client device operating system (OS) as described above), and therefore from potential exfiltration to malicious processes running on the client device or from exfiltration to other devices.
  • a hardware-backed key store 262 could have a master wrapping key, called the storage root key, which is stored within the hardware-backed key store 262 itself.
  • the private portion of a storage root key or endorsement key that is created in a hardware-backed key store 262 is never exposed to any other component, software, process, or user. Because a hardware-backed key store 262 uses its own internal firmware and logic circuits to process instructions, it does not rely on the operating system, and it is not exposed to vulnerabilities that might exist in the operating system or application software.
  • the client device 252 provides its public key to the cloud interface 256 (step (1) in FIG. 7), which then has the public key signed by the RoT 257 (step (2) in FIG. 7) and returns the signed public key to the client device (step (3) in FIG. 7). Flaving the public key signed by the RoT 257 is significant because the gateway 263, the virtual delivery appliance 253, and the broker 260 also trust the RoT and can therefore use its signature to authenticate the client device public key.
  • the client device 252 may then communicate with the CLIS 258 via the cloud interface 256 to obtain the connection lease (step (4) in FIG. 7).
  • the client device 252 public key may be provided to a host or virtual delivery appliance 253 (e.g., Citrix VDA) either indirectly via the broker 260 or directly by the client device.
  • the virtual delivery appliance 253 is enabled for use with connection leases, in contrast to legacy virtual delivery appliances which are not. If the client device 252 public key is indirectly provided to the virtual delivery appliance 253, then the security associated with the client-to-broker communications and virtual delivery appliance-to- broker communications may be leveraged for secure client public key transmission. However, this may involve a relatively large number of client public keys (from multiple different client devices 252) being communicated indirectly to the virtual delivery appliance 253.
  • the client device 252 public key could be directly provided by the client device to the virtual delivery appliance 253, which in the present case is done via the gateway 263 (step (5) in FIG. 7). Both the client device 252 and the virtual delivery appliance 253 trust the RoT 257. Since the virtual delivery appliance 253 trusts the RoT 257 and has access to the RoT public key, the virtual delivery appliance 253 is able to verify the validity of the client device 252 based on the RoT signature on the public key and, if valid, may then trust the client device public key. In yet another embodiment, the client device public key may also optionally be signed by the broker 260 beforehand. Both the client device 252 and the virtual delivery appliance 253 trust the broker 260.
  • the virtual delivery appliance 253 Since the virtual delivery appliance 253 trusts the broker 260 and has access to the broker public key, the virtual delivery appliance 253 is able to verify the validity of the client device 252 based on the broker signature on the public key and, if valid, may then trust the client device public key.
  • the signed public key of the client device 252 is provided directly to the virtual delivery appliance 253 along with the connection lease via a gateway 263.
  • the gateway 263 may be implemented using Citrix Gateway, for example, although other suitable platforms may also be used in different embodiments.
  • the virtual delivery appliance 253 and gateway 263 may communicate with the broker 260 and gateway service 259 (which may be implemented using Citrix Secure Web Gateway, for example) via a cloud connector 264.
  • the cloud connector 264 may be implemented with Citrix Cloud Connector, although other suitable platforms may also be used in different embodiments.
  • Citrix Cloud Connector is a component that serves as a channel for communication between Citrix Cloud and customer resource locations, enabling cloud management without requiring complex networking or infrastructure configuration.
  • other suitable cloud connection infrastructure may also be used in different embodiments.
  • the client device 252 signed public key or a hash of the client device signed public key (thumbprint) is included in the connection lease generated by the CLIS 258 and is one of the fields of the connection lease that are included when computing the signature of the connection lease.
  • the signature of the connection lease helps ensure that the connection lease contents are valid and have not been tampered with. As a result, a connection lease is created for the specific client device 252, not just a specific authenticated user.
  • the virtual delivery appliance 253 may use a challenge- response to validate that the client device 252 is the true owner of the corresponding private key.
  • the virtual delivery appliance 253 validates that the client device 252 public key is valid, and more particularly signed by the RoT 257 and/or broker 260 (step (6) in FIG. 7).
  • the client device 252 public key was sent directly by the client device to the virtual delivery appliance 253, as noted above.
  • connection lease revocation may be applied when a client device 252 or virtual delivery appliance 253 is offline with respect to the CLIS 258 or broker 260. Being online is not a requirement for use of a connection lease since connection leases may be used in an offline mode.
  • Connection lease and revocation list details may be stored in the database 261 for comparison by the broker 260 with the information provided by the virtual delivery appliance 253.
  • the virtual delivery appliance 253 challenges the client device 252 to sign a nonce (an arbitrary number used once in a cryptographic communication) with its private key (step (7) in FIG. 7).
  • the virtual delivery appliance 253 verifies the signature of the nonce with the client device 252 public key. This allows the virtual delivery appliance 253 to know that the client device 252 is in fact the owner of the corresponding private key. It should be noted that this step could be performed prior to validating the public key of the client device 252 with the RoT 257 and/or broker 260 in some embodiments, if desired.
  • the virtual delivery appliance 253 validates that the connection lease includes the public key (or hash of public key) matching the client device 252 public key. More particularly, the virtual delivery appliance 253 first validates the connection lease signature and date, making sure that the broker 260 signature on the lease is valid (using the RoT 257 signed broker public key, since the virtual delivery appliance trusts the RoT) and that the lease has not expired. Moreover, the virtual delivery appliance 253 may verify that the connection lease includes the client device 252 public key, or a hash of the client device public key, in which case the virtual delivery appliance computes the hash of the client device public key. If the connection lease includes the matching client device 252 public key, then the virtual delivery appliance 253 confirms that the connection lease was sent from the client device for which it was created.
  • connection lease management infrastructure also advantageously allows for connection lease validation using a “reverse prepare for session” operation from the virtual delivery appliance 253 (e.g., a Citrix VDA, etc.), as a target resource location, to the Broker 260 (e.g., Citrix Virtual Apps and Desktops Broker). This may be done in conjunction with the connection lease exchange that occurs between the client device 252 and the virtual delivery appliance 253, and utilizing signed responses from the broker 260 and virtual delivery appliance 253. These play a significant role for the resiliency, security, performance and user experience (UX) with respect to connection leasing.
  • UX user experience
  • the browser 204 illustratively includes a Progressive Web App (PWA) and in-app caching module 282 for caching of static assets in static assets cache 291 of browser local storage (cache) 290.
  • the static assets may include app code such as Javascript (JS), hyper-text markup language (FITML), cascading style sheets (CSS), images, etc., which are used to render a user interface.
  • the PWA and in-app caching module 282 further provides multi-feed resource awareness and caches 292a-292n for dynamic assets including published assets (such as virtual apps and desktops).
  • An authentication manager 284 may cooperate with PWA and in- app caching module 282 to perform the requisite authentication to retrieve and update the static/multi-feed assets in the caches 291 and 292a-292n.
  • the browser 204 further illustratively includes Web proxy code 283 (Web proxy) configured to perform calls home to the CLIS 258 to get online status and facilitate operation when the cloud computing service 255 is offline. That is, the Web proxy 283 helps ensure that the user interface can be loaded in an offline mode, and optionally that a reconnect banner can be used allowing for reconnection when the cloud computing service 255 comes back online.
  • Javascript (JS) bridge methods may be utilized by the Web proxy 283 to get online status from the CLIS 258, for example.
  • a CL synch engine 285 communicates with the CLIS 258 to perform operations such as CL and key synchronization, although in some embodiments these operations may optionally be delegated as background operations to the native CWA instance 208 when the browser 204 is closed, as will be discussed further below.
  • the native CWA instance 208 illustratively includes a common connection manager (CCM) 286 and an HDX engine 287 for communicating with a gateway 263, connector 264, and/or virtual delivery appliance 253 to access virtual resources (e.g., virtual apps/desktops, SaaS/DaaS servers, etc.), as discussed further above.
  • a Self- Service Plugin (SSP) 288 may perform calls home to the CLIS 258 on behalf of the CWA instance 208.
  • the endpoint device 201 further illustratively includes a native message host 293 which allows one or more browser extensions 210 to communicate with the CCM 286, as will be discussed further below.
  • the CLs are bound to the endpoint private/public key pair, such as by using the endpoint private/public key pair to encrypt the connection lease, or embedding a version of the endpoint public key signed by the RoT 257 in the connection lease, for example.
  • user CLs are stored in a local file storage 273 in respective stores 274a-274n.
  • the endpoint private/public key pair may be stored in a key store 275 (e.g., by a TPM).
  • Signed public keys (e.g., for the gateway 263, virtual delivery appliance 253, etc.) may be stored in a key store 276 in the local storage 273.
  • the endpoint device 201 , gateway 263, connector 264, and VDA 253 may utilize a connection lease exchange mutual trust protocol (CLXMTP) between one another to exchange and perform validation of the public keys and CLs of one another.
  • CLXMTP connection lease exchange mutual trust protocol
  • the initial CLXMTP connection between these components is used for CL exchange and validation
  • the subsequent HDX connections are used to exchange information after validation has been performed via the CLXMTP connections, as shown.
  • the HDX engine 287 cooperates with the VDA to establish: (1) a transport layer session between the endpoint device and the virtual delivery appliance; (2) a presentation layer session via the transport layer session; and (3) a connection lease exchange tunnel via the presentation layer session.
  • the VDA 253 may accordingly receive a connection lease from the endpoint device 201 through the connection lease exchange tunnel, and then perform the above-described lease validation process with the broker computing device 260.
  • the VDA 253 may further issue a resource connection ticket to the endpoint device 201 through the connection lease exchange tunnel responsive to the validation. This process may be similarly performed between the endpoint 201 and the gateway 263, as well as between the gateway 263A/DA 253 and the connector 264.
  • the presentation layer session may be a Common Gateway Protocol (CGP) session
  • the transport layer session may be a Transport Layer Security (TLS) session or a Transmission Control Protocol (TCP) session.
  • the transport layer session may comprise at least one of an Enlightened Data Transport (EDT) session, Datagram Transport Layer Security (DTLS) session, and a User Datagram Protocol (UDP) session.
  • EDT Enlightened Data Transport
  • DTLS Datagram Transport Layer Security
  • UDP User Datagram Protocol
  • the browser extension 210 and native messaging host 293 provide a secure bridge between the browser 204 and native CWA instances 208, relaying various types of control and data.
  • This allows the browser 204 to advantageously initiate or launch published resources to access virtual sessions while leveraging the secure native CL and keys storage, and CLXMTP capabilities, of the CWA instance 208, as well as maintaining CL and token binding to the native CWA instance.
  • the example approach also allows for the reuse of existing functionality in the browser 204, e.g., user interface and resource caching.
  • the native CCM 286 is securely bootstrapped by and communicates with the native messaging host 293, and maintains per-browser-tab contexts, etc.
  • Workspace 256 to CWA instance 208 communication may be encrypted and “hidden” from browser 204, if desired.
  • the CL sync engine 285 may support synchronization of multiple stores from the Workspace storefront 256. This may run in a global browser extension 210 background thread, helping ensure that the synchronization can be done in the background, although this may also be run in a per-tab (per-store) browser extension thread in some embodiments.
  • the browser extension 210 may be downloaded from an online marketplace 265 as a plugin app to the particular browser 204 being used (e.g., Chrome, Safari, Edge, etc.). Javascript bridge methods for storage of files (e.g., CLs and signed public keys) may be implemented in the browser extension 210 and relayed to the native CWA instance 208 for storage.
  • the browser extension 210 relays various types of control and data between the browser 204 and native CWA instance 208.
  • the following permissions may be declared in a browser extension 210 manifest: native communication (“nativeMessaging”); background (“background”); and multiple tabs (“tabs”).
  • native communication (“nativeMessaging”); background (“background”); and multiple tabs (“tabs”).
  • tabs multiple tabs
  • the native message host 293 utilizes a Browser-Native Protocol (BNP) for relaying communications between the browser extension 210 and the CCM 286.
  • BNP Browser-Native Protocol
  • the BNP may be extensible and backward compatible, since browser extension and native CWA instance 208 components may be updated independently.
  • the browser extension 210 can be downloaded via the marketplace 265 as noted above (or other sources based upon enterprise policy), while the native messaging host 293, CCM 286 and the rest of the native CWA instance 208 components are installed and updated as a native application.
  • the browser extension 210 may trigger silent telemetry launches based on telemetry site properties.
  • Some of the browser extension 210 and native messaging host 293 code may be shared between different browsers (e.g., Chrome and Edge Chromium), between Javascript bridge method implementations in browser extensions; and for the BNP protocol implementation.
  • the following table provides a list of example information which may be sent from the CWA instance 208 to the browser 204, and vice-versa, using the BNP.
  • GCT gateway connection ticket
  • the BNP protocol may support other features such as secure (protected) ICA file launches, and a Web-based connection status user interface, for example.
  • the CCM 286 hosts the BNP and communicates with the native messaging host 293 over a securely bootstrapped connection, e.g., an anonymous duplex named pipe.
  • CCM 286 may be implemented as a single instance on an endpoint device 201.
  • N 1 relationship between the browser extension 210/native messaging host 293 combo and CCM 286. That is, N browser tabs in the same or different browsers 204 communicate with a single instance of CCM 286.
  • CCM 286 manages one or more communication contexts with the respective browser tabs. Each context may be identified by a [BE ID, Tab ID] and may also contain BE Type, User ID, Customer ID, Store URL, negotiated capabilities, etc.
  • Functionality of the CWA instance 208 which may be leveraged to implement the data exchange with the browser 204 may include: private/public key pair ownership; secure storage of signed public keys, LLAuthTs, PAuthTs, etc., as well as data protection (DP) API or key chain; storage of CLs per user, per store; CL parsing and decryption; attempting different options in CL, such as a zone depth first search, redirect target, fan-out, power management (deny with retry), etc.; CLXMTP via the gateway 263 and connector 264; temp ICA file generation for both the gateway (with GCT) and direct connections; silent telemetry launching; connector as a beacon; and SSOn to HDX with Long-lived Auth Tokens (LLAuthT) and Polymorphic Auth Tokens (PAuthT).
  • DP data protection
  • Security of communications may be handled natively by the browser extension 210 and using existing browser technology.
  • the browser extensions 210 may be signed and deployed via the marketplace 265 (or otherwise via enterprise policy).
  • Production browsers e.g., Google Chrome, Microsoft Edge Chromium, Safari, only load signed browser extensions (plugins).
  • the native messing host 293 may be hard-coded to communicate with a specific browser extension 210 by ID.
  • a browser extension 210 as instructed by its manifest, may be hardcoded to communicate with the native messing host 293 (e.g., by path and module name).
  • additional module signature validation may be required for replacing the native messaging host 293 in some embodiments, although even without such validation replacing it may otherwise require admin privileges, which still affords significant protection.
  • the native messaging host 293 plays a relaying role between the browser extension 210 and the CCM 286 (i.e. , relaying messages back and forth).
  • the native messaging host 293 carries out the following sequence of operations to securely bootstrap the communication between a browser extension 210 instance and the connection manager process:
  • connection manager process (unique) instance to ensure that the connection manager process is not being spoofed - i.e. replaced with a malicious process
  • steps (1 ) and (2) can be achieved as follows.
  • the CCM 286 e.g., a Win32 application
  • the native messaging host 293 looks up the hidden window via the Win32 EnumWindows function and retrieves a handle to the hidden window. From the hidden window handle the CCM 286 Process ID is retrieved via the Win32 GetWindowThreadProcessld function. From the CCM 286 process ID, the native messaging host 293 process obtains a handle to the CCM.
  • the handle to the CCM 286 allows the native messaging host 293 to retrieve information about the process (e.g., its path).
  • the native messaging host 293 may then verify that the path is the expected installation path for the CMM 293, and verify that the CCM binary is digitally signed by the expected entity (e.g., the company that produced the binary).
  • step (4) can be achieved in different ways.
  • One is by sending a window message (e.g., with the Win32 PostMessage function).
  • Another is by making an RPC/COM call to the CCM 293 (if it is playing the role of a COM server).
  • the CCM 286 After receiving the two anonymous named pipe handles from the native messaging host 293, the CCM 286 performs the following steps: (1) create a reader/writer context (specific to the native messaging host); (2) open the two anonymous named pipes from their handles; and (3) prepare to read messages from reader anonymous named pipe and prepare to write messages to writer anonymous named pipe.
  • This approach advantageously leverages functionality already built for the browser 204 (Web-based) and native CWA instance 208. Moreover, it provides for secure communication between the browser 204 and native CWA instance 208, without interrupting other connection lease security measures such as CL and GCT user-device binding. Moreover, this approach improves the user experience of browser 204 to native CWA instance 208 IPC, while being transparent to the user. For example, this approach allows for a single prompt to endorse a browser extension 210, as opposed to multiple prompts with existing approaches. It may also be leveraged for additional requirements, such as to protect ICA files, provide a Web-based connection status user interface, and allow for an HTML5 receiver to support native virtual channel (e.g. USB, etc.) desktop integration, for example.
  • native virtual channel e.g. USB, etc.
  • a “background” permission may optionally be declared in the browser extension 210 manifest (e.g., in Chrome) to cause the browser 204 to start up early and shut down late, so that apps and extensions can have a longer life for performing synch and update operations, for example.
  • Connection leases CLs
  • PWA Progressive Web App
  • Web-based user interface Ul
  • the system 250 will support native CWA apps.
  • a significant amount of users may utilize a browser for the Workspace/StoreFront store 256, but also have a native CWA instance installed on the endpoint device 252, so that following the launch within the browser (Workspace Store) window, the native HDX Engine is invoked with the downloaded ICA (connection descriptor) file.
  • This use case may be considered a “hybrid” case.
  • This approach helps ensure familiar user experience (UX) with the browser and at the same time better HDX performance (e.g., for graphics, multimedia) and feature set (e.g. Smart Card, USB, Seamless Windows) compared to using an HTML5 HDX Engine in the browser.
  • the user authentication context is in the browser 204, and using a browser has unique challenges.
  • the browser does not offer the same level of security for asset storage as a native CWA instance, such as: access to the TPM, storage of private/public key pairs, signed public keys, Connection Leases (CL), Gateway Connection Tickets (GCT), Long Lived Auth Tokens (LLAuthT), Polymorphic Auth Tokens (PAuthT) for single sign on (SSOn) into HDX, etc.
  • Another challenge is that the browser 204 does not offer the same level of persistence, e.g., the browser could be configured to clear the cache upon exit, including device reboot.
  • the browser 204 has a limited lifetime, in that it can be closed by a user after a brief use. This diminishes the opportunity for background operations that are important for resiliency, e.g., periodic download of CLs, which may otherwise be performed by a native app. Browsers may also have a significant attack surface, and access to native (raw) sockets is generally limited.
  • WebSockets can be used to channel protocols such as secure connection lease protocols (which will be discussed further below), this requires adding WebSocket support to multiple backend systems such as Gateway, Connection, and VDA, which bears a higher engineering cost.
  • the browser user interface would typically display a failure message informing the user that the system cannot perform the authentication, with no options for the user except closing the user interface window or potentially attempting to re-start the authentication process over again. Also, the system would typically block all access to the user’s published resources in response to an authentication failure (e.g., Internet connection is available but CIP is down, the auth manager 284 times out, etc.), which may diminish resiliency and user experience.
  • an authentication failure e.g., Internet connection is available but CIP is down, the auth manager 284 times out, etc.
  • Authentication in the browser 204 involves multiple page redirects between an authentication Ul, CIP (DSAuth and OIDC), third-party IDP, etc. If the authentication process gets stuck or fails, in a typical implementation the user would be able to close a logon page/tab but not return back to the authentication Ul.
  • an authentication login screen 294 is provided by the browser 204 for providing logon authentication credentials, e.g., user name and password.
  • logon authentication credentials e.g., user name and password.
  • the browser 204 transitions (as shown in FIG. 10) to the authentication Ul (as shown here for Citrix Workspace, for example) while the above-described authentication proceeds.
  • the browser 204 presents the authentication Ul 295 in a cancellable form as shown by FIG.
  • the browser 204 provides users with the ability to perform redirections to another page(s), here through an embedded banner 296 including a “cancel” button 297 or other forms of input devices.
  • the cancel button 297 provides the user with a way to go back “Home” to a resources page 298 (shown in FIG. 11) when the authentication process is otherwise stuck or inoperative. This helps ensure that in offline conditions, or if the authentication fails, times-out or is canceled by the user, the resources page 298 can be loaded in an offline mode to enable the user to use cached assets to access applications in which the user would normally be entitled to use.
  • the browser extension 210 also serves as a “watchdog” for providing the cancellable Web-based authentication Ul 295. More particularly, the browser extension 210 may insert the cancel/home button 297 (or other actionable Ul element) into various types of authentication-related web pages, including across redirects, for example.
  • the browser extension 210 may be configured to monitor auth-related URL addresses and state transitions, e.g., to determine when the authentication login page 294 is loaded (signaling the start of the auth sequence), or when the resources page 298 is loaded (signaling the end of the authentication sequence).
  • the cloud interface 256 e.g., Workspace
  • the browser extension 210 loads the resource page 298 in an in offline mode, i.e. , from cached assets.
  • the offline mode some resources are available while others are not. More particularly, those that are CL enabled and have a cached CL from a prior logon may be shown as available for launch in the page 298, while those that are not CL enabled may be presented as unavailable (and optionally with an indication that they are “currently unavailable” as shown in the present example). For example, some SaaS apps may not be CL enabled and accordingly require a successful authentication each time they are launched. In some embodiments, sensitive resources such as files and notifications may be hidden (not presented) in the offline mode.
  • Example HTML code which may be embedded by the browser extension 210 within the Ul page code for inserting or injecting the banner 296 and cancel button 297 is as follows:
  • ⁇ span style- ' position absolute; z-index: 100; font-size: medium; left: 30%; top: 11%; display: inline; border: 1px dotted; background: white; margin: 20px; padding: 20px; color: black;
  • button style- ' display inline-block
  • multi-feed awareness may be provided. For example, if only the broker 260 is down but Workspace 256 or the Internet connection are still up, Ul caching may still be performed intelligently by being aware of the broker 260 health and showing previously cached resources. Similarly, if an aggregated on- prem site is down, this may not otherwise affect the availability or freshness of available assets.
  • the browser extension 210 may display an embedded/preconfigured error page, for example.
  • An error page may similarly be displayed where no dynamic assets (published resources) are available.
  • a connection lease wallet may be used to help overcome the FTU and stateless thin terminal use cases, by allowing the user to securely roam their leases and Ul cache, e.g., with their smart phone (virtual smart card) or a traditional physical smart card.
  • the browser extension 210 may be configured for monitoring different URLs or modes of operation.
  • the authentication Ul 295 may be also configurable and brandable. This approach provides resiliency and enhanced user experience in browser-based authentication flows, in that the user has the ability to break out of a failed authentication flow and return to the resources or home page 298 to launch those CL enabled resources for which CLs have previously been cached.
  • the browser extension 210 may similarly be used to improve authentication flows with microapps.
  • different types of Web-based Ul flows not necessarily authentication related, can be made cancellable by the browser extension 210 to provide resiliency features, which may configure URLs to be monitored as well.
  • authentication in the browser 204 may utilize the WebProxy 283 and an SSO Proxy (in WSP).
  • SSO Proxy 288 performs a conversion from browser cookies to DSAuthT.
  • the LeaseCallHome API will be handled by SSO Proxy and redirected via API Gateway to CLIS 258.
  • the authentication manager 284 implemented in the browser 204 helps perform these functions, as well as provide feature and capability sharing so that published resources will remain “green” or up to date.
  • the browser extension 210 autonomously determines the start of an authentication flow based on URL monitoring of auth-related URLs and state transitions. That is, the browser extension 210 knows the URLs associated with initiation and completion of the particular authentication flow, so that when the browser 204 accesses these particular URLs it knows the authentication flow has begun/concluded.
  • the Citrix Identity Platform CIP
  • the authentication itself would be done by Okta, by displaying an embedded Web Ul (from Okta, possibly with customer branding). This assumes a trust relationship between CIP and Okta (e.g., via SAML).
  • the browser extension 210 (with the required privileges) can monitor the successive URLs from Okta that leads to a successful authentication (or the opposite, and then switch to the cached asset Ul used in offline mode).
  • the browser extension can also monitor the duration of the Okta request(s) and rely on a predefined timeout to decide to cancel the authentication sequence.
  • the browser extension 210 could be notified by the Workspace Ul prior to starting an authentication flow, for example.
  • the browser extension 210 may perform a URL discovery where it learns what URLs to monitor for the authentication flow (e.g., from the CWA instance 208) and begins monitoring the browser 204 accordingly.
  • the browser extension 210 may insert or inject a “Cancel” or “Flome” button into WSUI.
  • the browser extension 210 becomes a “watchdog” and monitors URLs loaded in the tab (or, alternatively, waits to be notified of events).
  • the browser extension 210 monitors for cancel events (e.g., the user clicking on the cancel button 297), and/or an optional authentication timeout period (if defined).
  • the authentication time period may correspond to a maximum authentication time expected.
  • the browser extension 210 may be configured for different URLs (that is, for different authentication sequences) or modes of operation.
  • the Ul and banner 296/button 297 may be also configurable and brandable for use with different organizations or enterprises.
  • the Web proxy 283 starts the DSAuth process with the CIP 321 , and provides the Web view URL for the CIP to the browser 204. This redirects the browser to CIP-OIDC 322, which is in turn followed by a redirect to an IDP 323.
  • the CIP-OIDC 322 redeems a code from the browser 210 with the IDP 323, which returns the appropriate tokens to the CIP-OIDC.
  • the CIP-OIDC 322 redirects the browser 204 to the CIP-DSAuth 322 with a code that the browser then redeems to the CIP-DSAuth (FIG. 12B).
  • a similar code redemption or exchange is performed between the CIP-DSAuth 322 and CIP-OIDC 322 to that described above, and the CIP-DSAuth redirects the browser 204 to the Web Proxy 283.
  • the browser extension 210 is monitoring the then current state of the authentication processes (login started, login at IDP, IDP returned, getting DSAuth token, DSAuth complete) based upon the URL to which the browser 204 is redirected. Moreover, the browser extension 210, in some examples, may continue to inject the cancel button 297 (or other appropriate Ul element) after each successive redirect until the browser has completed a form post and the Web proxy 283 redirects the browser 204 with explicit authentication to proceed. At this point, the browser extension 210 determines that the login is completed and it removes the cancel button 297 from the Ul, and the session is established.
  • the browser extension 210 autonomously determines if the authentication is successful based on URL monitoring of auth-related URLs and state transitions (or, alternatively, by having the WSUI notify the browser extension that login has completed), as discussed above.
  • the browser extension 210 may then remove the button popup window 296 and cancel button 297 from the WSUI and stop being a watchdog, as noted above.
  • the browser extension 210 loads the resources page 298 in offline mode, i.e. , from cached assets, as discussed above with reference to FIG. 11. Offline mode could be requested either via URL parameter (query string) or via messaging, for example.
  • the browser extension 210 may display an embedded/preconfigured error page. For example, in the FTU case there may not even be an error WSUI page available to show. Furthermore, if no dynamic assets (published resources) are available, the WSUI may display an error page.
  • Various other approaches may be used for presenting a cancellation or redirection element to a user besides the embedded FITML banner 296 and button 297.
  • One such approach is showing some or all of the authentication Ul in an iFrame, although some third party IDPs will block using an iFrame for authentication (for security reasons).
  • Another approach involves using a popup box to show the authentication Ul, which allows the user to close it/cancel it.
  • One benefit of this approach is that it may be implemented without the browser extension 210, and may be used in a “pure browser” case where no CWA instance 208 is installed. However, popups may be blocked in some browser configurations, and a blocked popup can automatically result in WSUI operating in offline mode.
  • Auth Ul needs to be shown in online conditions.
  • WSUI could be instrumented to use the regular Auth flow during FTU, but attempt a pop-up subsequently.
  • a combination of approaches could be used, such as the above-described authentication flow during FTU, but subsequently attempting a popup.
  • the browser extension 210 may operate as a watchdog coordinating with CIP-DSAuth 321.
  • the authentication page may issue a ticket and give it to the browser extension 210, which becomes a watchdog and talks to CIP-DSAuth 321 to find out if authentication is successful. If authentication is not successful after a timeout, the browser extension 210 loads the WSUI in offline mode.
  • microapp-related authentication flows can be made cancellable in order to provide resiliency features and improved UX.
  • SP Service Provider
  • SoR System of Record
  • IDP initiated flow is typically supported by more apps, but the UX may be sub-optimal.
  • the browser extension 210 When the browser extension 210 detects the beginning of the authentication flow between the browser and an authentication entity 331 (e.g., WSP 283, CIP-DSAuth 321/CIP-OIDC 322, IDP 323, etc.), it may inject the banner 296/cancel button 297 into the authentication Ul 295, in some examples. In instances in which a timeout of the process triggers a redirection, banner 296/cancel button 297 may not be provided.
  • an authentication entity 331 e.g., WSP 283, CIP-DSAuth 321/CIP-OIDC 322, IDP 323, etc.
  • the user may click the cancel button 297 (or a timeout occurs in some embodiments) which indicates a cancellation (or timeout) state to the browser extension 210.
  • the browser extension 210 redirects the browser 204 to the offline Web Ul, which may be done via a URL parameter such as a query string or messaging, for example. If no static or dynamic assets are available (e.g.,
  • the browser 204 displays an error page. Otherwise, the resource page 298 can be displayed with cached static and dynamic assets. The user may then launch available published resources using the cached static/dynamic assets, and may optionally re-attempt authentication at a later time.
  • the browser 204 When the re-authentication attempt is made, the browser 204 once again initiates the authentication flow with the authentication entity 331 , and the browser extension 210 again injects a cancellation Ul element (e.g., the banner 296/button 297) in each page in the authentication sequence until the authentication is successfully completed, as discussed further above.
  • a cancellation Ul element e.g., the banner 296/button 297
  • the re-authentication process may be performed automatically without user input.
  • the browser 204 may attempt authentication after a specified period.
  • health checkers may be employed to determine when authentication resources are back online as well.
  • the above-described approach utilizing the browser extension 210 may be used to improve authentication flow and UX with microapps. More particularly, the browser extension 210 can be leveraged to make the auth flow with microapps both simpler and more reliable than the SP and IDP approaches.
  • a user would like to write a JIRA comment in a story using Workspace microapp actions but has not yet logged in, i.e. , approved Workspace to access JIRA. Workspace starts an IDP initiated flow, which takes the user to the JIRA home page.
  • WSUI needs to execute an action, e.g., adding a JIRA comment in this case.
  • WSUI browser 204 notifies the browser extension 210 that it is going to trigger an action in a popup.
  • WSUI provides two URLs: one to login and a second one to execute the action.
  • the browser extension 210 monitors the URLs loaded inside the popup (IDP,
  • the browser extension 210 notifies WSUI, e.g., that a default JIRA dashboard has been loaded.
  • WSUI via the browser extension 210 will then redirect the popup URL to execute the action.
  • An admin can configure the expected landing pages so that login detection is accurate. Even if not configured, domains of IDP/SoR can be compared with the loaded URL to guess the login state.
  • a related method begins at Block 401 and illustratively includes running a browser 204 at a computing device 201 configured to perform a sequence to obtain an asset and display a user interface 205 for launching a virtual session using the asset, at Block 402.
  • the method further illustratively includes running code (e.g., browser extension) 210 at the computing device 201 configured to determine a failure of the browser 204 to complete the sequence, at Block 403, and cause the browser to display the user interface 205 (e.g., in an offline mode) for launching the virtual session using a previously cached version of the asset responsive to the failure of the browser to complete the sequence (Block 405).
  • running code e.g., browser extension
  • the browser 204 is able to display the user interface for launching the virtual session (e.g., in an online mode) using the newly obtained version of the asset (Block 404), as discussed further above.
  • the method of FIG. 14 illustratively concludes at Block 406.
  • aspects described herein may be embodied as a device, a method or a computer program product (e.g., a non-transitory computer-readable medium having computer executable instruction for performing the noted operations or steps). Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects.
  • Such aspects may take the form of a computer program product stored by one or more computer-readable storage media having computer- readable program code, or instructions, embodied in or on the storage media.
  • Any suitable computer readable storage media may be utilized, including hard disks, CD- ROMs, optical storage devices, magnetic storage devices, and/or any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Computer And Data Communications (AREA)

Abstract

Un dispositif informatique peut comprendre une mémoire et un processeur configuré pour coopérer avec la mémoire afin d'exécuter un navigateur configuré pour effectuer une séquence afin d'obtenir un actif et afficher une interface utilisateur pour le lancement d'une session virtuelle à l'aide de l'actif. Le processeur peut en outre exécuter un code configuré pour déterminer un échec d'accomplissement de la séquence par le navigateur, et amener le navigateur à afficher l'interface utilisateur pour le lancement de la session virtuelle à l'aide d'une version précédemment mise en cache de l'actif en réponse à l'échec d'accomplissement de la séquence par le navigateur.
PCT/US2022/071370 2021-05-17 2022-03-28 Dispositif informatique et procédés associés assurant le lancement d'une session virtuelle à partir d'actifs préalablement mis en cache WO2022246343A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US202163189380P 2021-05-17 2021-05-17
US63/189,380 2021-05-17
US17/447,838 2021-09-16
US17/447,838 US11474840B1 (en) 2021-05-17 2021-09-16 Computing device and related methods providing virtual session launching from previously cached assets

Publications (1)

Publication Number Publication Date
WO2022246343A1 true WO2022246343A1 (fr) 2022-11-24

Family

ID=81595715

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/071370 WO2022246343A1 (fr) 2021-05-17 2022-03-28 Dispositif informatique et procédés associés assurant le lancement d'une session virtuelle à partir d'actifs préalablement mis en cache

Country Status (1)

Country Link
WO (1) WO2022246343A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190098095A1 (en) * 2017-09-22 2019-03-28 Citrix Systems, Inc. Automated address failover for receivers and browsers using a cloud service
US20190132381A1 (en) * 2012-03-02 2019-05-02 Citrix Systems, Inc. Reverse Seamless Integration Between Local and Remote Computing Environments
US20200371829A1 (en) * 2019-05-20 2020-11-26 Citrix Systems, Inc. Connection leasing system and related methods for use with legacy virtual delivery appliances
US20220050699A1 (en) * 2020-08-13 2022-02-17 Citrix Systems, Inc. Workspace resiliency with multi-feed status resource caching

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190132381A1 (en) * 2012-03-02 2019-05-02 Citrix Systems, Inc. Reverse Seamless Integration Between Local and Remote Computing Environments
US20190098095A1 (en) * 2017-09-22 2019-03-28 Citrix Systems, Inc. Automated address failover for receivers and browsers using a cloud service
US20200371829A1 (en) * 2019-05-20 2020-11-26 Citrix Systems, Inc. Connection leasing system and related methods for use with legacy virtual delivery appliances
US20220050699A1 (en) * 2020-08-13 2022-02-17 Citrix Systems, Inc. Workspace resiliency with multi-feed status resource caching

Similar Documents

Publication Publication Date Title
EP3742289B1 (fr) Appareil de distribution virtuelle comportant une authentification à distance et procédés associés
US20160191645A1 (en) Containerizing Web Applications for Managed Execution
US11469894B2 (en) Computing system and methods providing session access based upon authentication token with different authentication credentials
US11645102B2 (en) Connection leasing system and related methods for use with legacy virtual delivery appliances
US11893405B2 (en) Workspace resiliency with multi-feed status resource caching
US11658907B2 (en) System and method for validating virtual session requests
US11805086B2 (en) State-sharing plug-in in a computing workspace environment
US11803398B2 (en) Computing device and associated methods providing browser launching of virtual sessions in an application
WO2023283499A1 (fr) Authentification multifactorielle de la session informatique
US11474840B1 (en) Computing device and related methods providing virtual session launching from previously cached assets
US11509465B2 (en) Computing device and related methods providing virtual session access using group connection leases and user interface (UI) caches
US11803635B2 (en) Passing local credentials to a secure browser session
WO2022246343A1 (fr) Dispositif informatique et procédés associés assurant le lancement d'une session virtuelle à partir d'actifs préalablement mis en cache
US12034845B2 (en) Smart card and associated methods for initiating virtual sessions at kiosk device
WO2022177613A1 (fr) Dispositif informatique et procédés associés fournissant un lancement de navigateur de sessions virtuelles dans une application
US20230179632A1 (en) Token-based session establishment for client computing devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22722390

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22722390

Country of ref document: EP

Kind code of ref document: A1