Applicable Products
- NetScaler Gateway
- Receiver for Android
- Receiver for Linux
- Receiver for Mac
- Receiver for Windows
Symptoms or Error
- Citrix Workspace app is the easy-to-install client software that provides seamless, secure access to everything you need to get work done. With this free download, you easily and securely get instant access to all applications, desktops and data from any device, including smartphones, tablets, PCs and Macs.
- Citrix Receiver Updates logging is enabled by default with Citrix Receiver for Mac Version 12.6 and later. This is helpful when troubleshooting Receiver auto-update related issues.
- Citrix Workspace app 1910.2 for Mac. Oct 17, 2019 NEW. We are sorry! The item you are trying to access is restricted and requires additional permissions!
Citrix Workspace lis the easy-to-install client software that provides seamless, secure access to everything you need to get work done. With this free download, you easily and securely get instant access to all applications, desktops and data from any device, including smartphones, tablets, PCs and Macs. Download Citrix Receiver, free Citrix product trials, version updates, utilities and more. https://pfcrdla.weebly.com/blog/photo-editing-programs-for-mac.
Users may receive the following error when launching an application with Receiver for Windows 4.7, Receiver for Mac 12.5, Receiver for Android 3.12.2, Receiver for Linux 13.6 and newer:
Error: You have not chosen to trust '(CERT INFO)', the issuer of the server's security certificate. Contact your help desk for assistance. Teamviewer for macbook pro.
Error: You have not chosen to trust '(CERT INFO)', the issuer of the server's security certificate. Contact your help desk for assistance. Teamviewer for macbook pro.
Receiver for Mac
Receiver for Android
Solution
Important! This article is intended for use by System Administrators. If you are experiencing this issue and you are not a System Administrator, contact your organization’s Help Desk for assistance and refer them to this article.
This issue may be caused by an out-of-date intermediate certificate installed at NetScaler Gateway. This does not mean that the CA certificates currently being used is expired but the CA has since released newer versions of that certificate.
Verify the certificate bindings at the NetScaler Gateway to resolve this issue.
To confirm this, visit the NetScaler Gateway website using a web browser, and examine the certificate chain in the web browser. You may wish to cross-check this by repeating with more than one web browser (such as with Google Chrome and Mozilla Firefox). Then, compare all the certificates in the browser's certificate chain with the certificate chain at NetScaler Gateway.
Note: Compare all the serial numbers in the certificates and not just the Subject Name. If there are any mismatches in intermediate certificates, this is a possible cause.
Update NetScaler Gateway with the corresponding intermediate certificates, as they appear in the web browser. You can export the intermediate certificates from the web browser. If you used more than one web browser, it is possible that they yield different certificate chains. If so, use the newer certificate chain. For more information about installing and linking an intermediate certificate with Primary CA on a NetScaler Gateway appliance, refer to CTX114146.
Problem Cause
The Receiver for Windows 4.7, Receiver for Mac 12.5, Receiver for Linux 13.6 and newer versions are going to validate the root certificates even if it trusts the intermediate, which is not the case with the browsers. If the browser trusts the intermediate, it trusts the server certificate, without going down to the root certificate and will display the newer version of the root from its certificate store and not the actual root certificate sent by the server or NetScaler Gateway.
In Receiver for Android 3.12.2, joint server certificate validation is turned off by default. If this policy is enabled in the Receiver without the correct set of certificates configured on the server/gateway, users may see the error message.
In Receiver for Android 3.12.2, joint server certificate validation is turned off by default. If this policy is enabled in the Receiver without the correct set of certificates configured on the server/gateway, users may see the error message.
Additional Resources
- CTX221453 - Citrix Receiver - SSL Error when connecting via NetScaler
- Citrix Documentation - Receiver for Mac, Receiver for Android
- CTX114146 - How to Install and Link Intermediate Certificate with Primary CA on NetScaler Gateway
Applicable Products
- Receiver for Mac
Objective
This article provides an overview of logging features available with Receiver for Mac, and explains how to use them in the Receiver.
Receiver for Mac has the logging interface in the Advanced tab of the Receiver Preferences. The Preferences menu can be accessed from the Desktop Viewer Window or the Apple application bar along the top. There are five types of logging available in Receiver for Mac: Installer Logging, Session Logging, Store Logging, Always-on Logging, and Receiver Updates Logging. Installer logging, Always-on and Receiver Updates logging are enabled by default. Conversely, Session Logging and Store Logging are disabled by default. Installer Logging captures debug messages from the Receiver during the installation.
Session Logging includes all the diagnostic logging from the ICA session. Therefore, it only applies to the Citrix Viewer when the session is up. Use this logging for any problem within the ICA session, perhaps unexpected behavior in an ICA session.
Store Logging includes logging of AuthManager and StoreComms. As expected, the AuthManager handles the authentication between the user and the Receiver Store or Site. The StoreComms manages the information about the Store configurations and connection settings.
Receiver for Mac 12.2 introduced the Always-on Logging feature, which helps collect important one-time event. This feature is enabled by default and turns on basic level of logging regardless of the logging configuration.Store Logging includes logging of AuthManager and StoreComms. As expected, the AuthManager handles the authentication between the user and the Receiver Store or Site. The StoreComms manages the information about the Store configurations and connection settings.
Log files generated by Always-on Logging are stored in ~/Library/Logs/Citrix Receiver. Always-on Logging keeps 2 log files for the ReceiverHelper/Citrix Receiver/Citrix Receiver Launcher/NPAPI plugin component, and 10 files for Citrix Viewer.Log files for the Citrix Receiver Launcher and NPAPI plugin component contain logs related to session launch from a web browser. The NPAPI plugin is used while launching using Safari web browser and Citrix Receiver Launcher for launch using Chrome and Firefox. Citrix Receiver Updates logging is enabled by default with Citrix Receiver for Mac Version 12.6 and later. This is helpful when troubleshooting Receiver auto-update related issues.
Instructions
Select Connection Diagnostics or Full in the Session Logging.There are two settings within Session Logging- Connection Diagnostics and Full Logging. Connection Diagnostics logging is specific to identifying errors while connecting so all logging will be enabled up until the point when the session is deemed successful. Full Logging will log everything including the Connection Diagnostics and Session Logging.
Note: Full Logging can impact performance and must only be used while troubleshooting an issue because of the amount of data. It must not be left on during normal use. The user enabling this logging will get a warning that must be acknowledged to continue.
Once enabled, the Receiver will store up to 10 Session Logs after which they are deleted starting with the oldest to maintain 10 logs. Select Normal or
Citrix For Mac Os X
Verbose in the Store Logging.![Receiver Receiver](/uploads/1/3/4/3/134314038/813430628.png)
The two levels of the Store Logging are Normal and Verbose. With Verbose, the AuthManager will provide more detailed debugging information. Use Normal when only StoreComms logging is necessary. Select
Citrix For Mac 10.12.6
Disabled in the Session Logging and Disabled in the Store Logging.The Receiver log files are stored in the local Mac user’s home directory: ~/Library/Logs/.
Citrix For Mac 10.11
Type of logging | Log file location | |
Installer logging | ~/Library/Logs/ReceiverInstall.log | |
Session logging | ~/Library/Logs/Citrix Receiver/CitrixViewer_<time_stamp>.txt (*) | |
Store logging | Normal | ~/Library/Logs/CitrixServerCommunication.log |
Verbose | ~/Library/Logs/com.citrix.AuthManager.log, com.citrix.AuthManager_1.log andServiceRecord.log (along with CitrixServerCommunication.log) | |
Always-on logging | Web Browser Launch Logging (Citrix Receiver Launcher/NPAPI plugin component) | ~/Library/Logs/Citrix Receiver/com.apple.WebKit.Plugin.64_<time_stamp>.txt ~/Library/Logs/Citrix Receiver/Citrix Receiver Launcher_<time_stamp>.txt |
Receiver Helper Logging | ~/Library/Logs/Citrix Receiver/ReceiverHelper_<time_stamp>.txt | |
Citrix Receiver Logging | ~/Library/Logs/Citrix Receiver/Citrix Receiver_<time stamp>.txt | |
Citrix Viewer Logging | ~/Library/Logs/Citrix Receiver/CitrixViewer_<time_stamp>.txt (*) | |
Citrix Receiver Updater Logging | ~/Library/Logs/Citrix Receiver/Citrix Receiver Updater_<time_stamp>.txt |
Citrix For Mac Mojave
(*) The log files for Always-on logging (for Citrix Viewer) and Session logging are the same. Viewer log files generated by Always-on logging contains only the most important logs. However, if Session logging is enabled, other logging along with the Always-on logswill be written to the log file.
You can click “Email Log Files” available in the Logging screen to zip Session/Store/Always-on/Citrix Receiver Updater log files, and send it as an attached file via email using your default email client.