Contextual access

Gain the controls needed to ensure the right levels of authentication and authorization

Citrix security solutions have built-in identity and access capabilities so you can control access to your apps, data, and network beyond just credentials. Managing user access calls for a balanced approach that’s convenient for users and more secure than a simple user name and password combination.

Bolster your security with multifactor authentication and seamless sign-in

Because passwords are so vulnerable, requiring people to use at least two forms of authentication—like a password and token—to access apps and desktops is essential for effective security. This multifactor authentication process makes it significantly harder for an attacker to impersonate a user, even if the primary password has been exposed.

Citrix Virtual Apps and Desktops and Citrix Gateway support multifactor authentication and activity logging for compliance support.

With Citrix Gateway, simplify the sign-in experience for your users while encouraging the use of strong passwords.

  • Federation of identity: Centrally manage access to third-party cloud services, by binding access to your user directory and eliminating the need for separate sign-in credentials.
  • Single sign-on (SSO): Enable single sign-on so people don’t have to re-enter their credentials into multiple systems.

Provide the right level of authorization and access control

With Citrix Virtual Apps and Desktops and Citrix Gateway, you can achieve more granular contextual access control by setting policies to allow different levels of access based on who, what, when, where, and why someone is seeking access.

Authorizing users based on task or location is especially effective for remote workers and third parties. Because Citrix Gateway integrates with role-based access mechanisms like Active Directory, you can create predefined access control policies at the both group and user level.

Being able to also authorize access based on device allows you to quarantine or grant limited access for devices out of compliance.

Apply policies precisely across devices and locations

Policy orchestration allows enterprise security policies to be applied for all the ways a user will access business resources, while considering the location, device, and other context to provide the best user experience balanced with the most security.

With Citrix you can leverage the suite and breadth of enforcement points offered and use a rich palette of policies that can be applied to these different enforcement points. This provides a huge advantage over individual point products that cannot offer multiple vantage points or enforcement actions across multiple devices as they move across multiple locations and security domains.

Explore related products

Citrix Gateway

Provide secure remote access to apps and desktops from any device.

Explore Citrix Gateway

Citrix Virtual Apps and Desktops

Deliver Citrix Virtual Apps and Desktops securely and centrally from the data center or cloud.

Explore Citrix Virtual Apps and Desktops