{"id":66042,"date":"2022-07-19T11:00:00","date_gmt":"2022-07-19T15:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/"},"modified":"2026-01-30T14:38:24","modified_gmt":"2026-01-30T19:38:24","slug":"110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/","title":{"rendered":"110: The Citrix Session: Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/670066\/episodes\/10985510-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>Every employee in your hybrid workforce is unique. They have their own devices and home networks, their own remote work preferences, and their own workflows in how they get their best work done. However, all hybrid employees need reliable and secure access to essential business apps and data from wherever they work \u2014 and while every employee wants this access process to be simple, each employee also has different access needs, capabilities, and endpoints.<\/p>\n<p>Because IT security policies are not \u201cone size fits all,\u201d <a href=\"https:\/\/www.citrix.com\/products\/citrix-secure-private-access\/\">Citrix Secure Private Access<\/a> offers adaptive access and authentication for hybrid employees. Adaptive policies enable your organization to determine the appropriate levels of access for all employees, then automatically enforce these IT security policies without disrupting the hybrid work experience.<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0917\u0947\u0930\u0947\u092e\u0940 \u092e\u0947\u092f\u0930\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.639 &#8211;&gt; 00:00:07.980<br \/>Andy Whiteside: hi everyone and welcome to episode 110 of the citrix session i&#8217;m your host Andy whiteside i&#8217;ve only got.<\/p>\n<p>2<br \/>00:00:08.610 &#8211;&gt; 00:00:18.000<br \/>Andy Whiteside: Only got one guests with me today but very important guests and honestly a good friend of integrals and the citrus Community JEREMY myers JEREMY what&#8217;s your official title these days.<\/p>\n<p>3<br \/>00:00:18.420 &#8211;&gt; 00:00:28.410<br \/>Geremy Meyers: My official title is senior sales engineering manager for the commercial team and the southeast and East central so if there&#8217;s an acronym it&#8217;s a mouthful but yeah that&#8217;s that&#8217;s what I do these days.<\/p>\n<p>4<br \/>00:00:29.550 &#8211;&gt; 00:00:32.160<br \/>Andy Whiteside: You know what sometimes it&#8217;s better just to say, and then to come up with.<\/p>\n<p>5<br \/>00:00:33.690 &#8211;&gt; 00:00:34.320<br \/>Geremy Meyers: That so.<\/p>\n<p>6<br \/>00:00:35.340 &#8211;&gt; 00:00:44.040<br \/>Andy Whiteside: You and I were just talking about things that citrix and how things are going, and I thought, what you said right it&#8217;s all about building culture and community and maintaining and maintaining cultural community that&#8217;s.<\/p>\n<p>7<br \/>00:00:44.130 &#8211;&gt; 00:00:54.930<br \/>Andy Whiteside: A lot of people are about good about building stuff and not maintaining stuff and I think it&#8217;s one of the things that looks like your team has done a good job of working on and keeping together over there.<\/p>\n<p>8<br \/>00:00:55.620 &#8211;&gt; 00:01:03.060<br \/>Geremy Meyers: I would agree some I like to call same page that&#8217;s right it&#8217;s we&#8217;re all on the same page we all like what we do and just maintaining that.<\/p>\n<p>9<br \/>00:01:04.110 &#8211;&gt; 00:01:04.440<br \/>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0939\u093e\u0901\u0964<\/p>\n<p>10<br \/>00:01:04.920 &#8211;&gt; 00:01:08.910<br \/>Andy Whiteside: yeah there&#8217;s parts of there&#8217;s parts of the IT world that I see that happening in parts, I don&#8217;t.<\/p>\n<p>11<br \/>00:01:10.470 &#8211;&gt; 00:01:11.310<br \/>Andy Whiteside: You guys for that.<\/p>\n<p>12<br \/>00:01:12.570 &#8211;&gt; 00:01:18.270<br \/>Andy Whiteside: Alright, so the blog that we are covering today as a yet another one, though by Steve bills bells.<\/p>\n<p>13<br \/>00:01:19.650 &#8211;&gt; 00:01:30.720<br \/>Andy Whiteside: This one is yet another one in the line of features explain so citrix features explain from a knife adaptive off and access in the citrix secure private access.<\/p>\n<p>14<br \/>00:01:31.350 &#8211;&gt; 00:01:42.390<br \/>Andy Whiteside: And access in citrix secure private access, so you want to give us just a intro into what adaptive why this blog exists and why we need to explain adaptive off.<\/p>\n<p>15<br \/>00:01:42.990 &#8211;&gt; 00:01:54.180<br \/>Geremy Meyers: yeah i&#8217;m actually pretty excited about this one so adaptive off is a few things from the on Prem world that we&#8217;ve had for a while, things that have been a part of like the on Prem ATC for a while.<\/p>\n<p>16<br \/>00:01:54.570 &#8211;&gt; 00:02:00.600<br \/>Geremy Meyers: That have made it into you know the cloud service so listen, we got a lot of options around authentication.<\/p>\n<p>17<br \/>00:02:01.170 &#8211;&gt; 00:02:06.480<br \/>Geremy Meyers: Inside of you know workspace today, so if any of you guys are very familiar with how that works, and you can go pick.<\/p>\n<p>18<br \/>00:02:07.080 &#8211;&gt; 00:02:15.330<br \/>Geremy Meyers: You know, a list of authentication options when you&#8217;re configuring In fact we just added one last week around Google as an IDP which is pretty slick but.<\/p>\n<p>19<br \/>00:02:15.660 &#8211;&gt; 00:02:23.910<br \/>Geremy Meyers: You know I think what a lot of folks have used in the past are things around device posturing and you know secure our smart access and.<\/p>\n<p>20<br \/>00:02:24.510 &#8211;&gt; 00:02:33.960<br \/>Geremy Meyers: Being able to provide some level of contextual access based on based on some of those policies and we have made that an integrated that into the cloud now so that&#8217;s a service that anyone with.<\/p>\n<p>21<br \/>00:02:34.530 &#8211;&gt; 00:02:44.100<br \/>Geremy Meyers: daz premium, which was seabed service premium in the past, so talking about some versions that you got access to so it&#8217;s something that if you&#8217;re a customer today, you can go turn on and start using.<\/p>\n<p>22<br \/>00:02:45.210 &#8211;&gt; 00:02:53.430<br \/>Geremy Meyers: But what&#8217;s new about, that is, it also works with SBA so secure private access we can front end secure private access with that same.<\/p>\n<p>23<br \/>00:02:53.970 &#8211;&gt; 00:03:07.140<br \/>Geremy Meyers: adaptive authentication service, which again completely hosted by citrix and it&#8217;s basically it opens up anything you can throw authentication wise at the solution adaptive authentication can handle and that&#8217;s pretty exciting.<\/p>\n<p>24<br \/>00:03:08.070 &#8211;&gt; 00:03:19.170<br \/>Andy Whiteside: So I guess i&#8217;m, I guess, maybe i&#8217;m starting to understand it, so that the author is author can understand variables real time and make determinations based on those variables.<\/p>\n<p>25<br \/>00:03:20.310 &#8211;&gt; 00:03:25.860<br \/>Geremy Meyers: um it can so it&#8217;s a combination of a couple of different things right, so it is.<\/p>\n<p>26<br \/>00:03:26.490 &#8211;&gt; 00:03:41.250<br \/>Geremy Meyers: it&#8217;s definitely for sure that front end login point but being able to you know consume things like security analytics to make some of those real time decisions is a part of it i&#8217;m not going to say that that is all the way there yet, but I think you know, especially from an initial.<\/p>\n<p>27<br \/>00:03:42.390 &#8211;&gt; 00:03:47.580<br \/>Geremy Meyers: You know initial solution it&#8217;s being able to turn on multi factor right out of the cloud be able to do the posture scanning.<\/p>\n<p>28<br \/>00:03:47.940 &#8211;&gt; 00:03:56.910<br \/>Geremy Meyers: You know what we used to call endpoint analysis, you know, out of the cloud doing some of that contextual policy driven off of the call so, for instance, being able to pass tags back into your.<\/p>\n<p>29<br \/>00:03:57.240 &#8211;&gt; 00:04:02.640<br \/>Geremy Meyers: Your dad&#8217;s platform to say hey because you didn&#8217;t pass your GPA you can&#8217;t see certain Apps you know things like that.<\/p>\n<p>30<br \/>00:04:04.440 &#8211;&gt; 00:04:09.420<br \/>Geremy Meyers: And then obviously just having a custom login page, which is pretty slick to so you&#8217;ve got.<\/p>\n<p>31<br \/>00:04:10.080 &#8211;&gt; 00:04:21.600<br \/>Geremy Meyers: A lot of the functionality we&#8217;ve had an htc is the depth of all, I mean just being very transparent, you know it&#8217;s Netscape color is front ending adaptive also a lot of what we can do on Prem does now in the cloud as a service.<\/p>\n<p>32<br \/>00:04:22.800 &#8211;&gt; 00:04:29.940<br \/>Andy Whiteside: And it&#8217;s not just limited you virtual APP and desktop and APP publishing it&#8217;s all a lot of the citrix services.<\/p>\n<p>33<br \/>00:04:30.600 &#8211;&gt; 00:04:34.410<br \/>Geremy Meyers: Correct right, so I mean so be specific, what do you, what do you thinking.<\/p>\n<p>34<br \/>00:04:37.260 &#8211;&gt; 00:04:48.780<br \/>Andy Whiteside: Well, that means private access the the all the zero trust related things that are typically more thought of it a network layer that citrix has gotten into and brought into the application world.<\/p>\n<p>35<br \/>00:04:49.890 &#8211;&gt; 00:04:58.860<br \/>Geremy Meyers: So I mean, I would say this is this is very much a big part of the zero trust solution so when we talk about adaptive authentication.<\/p>\n<p>36<br \/>00:04:59.610 &#8211;&gt; 00:05:10.110<br \/>Geremy Meyers: That is that contextual access, that is, the posturing that is feeding into the analytics engine, I mean that all makes up the zero trust approach, but it is front ending your virtual Apps it is front ending.<\/p>\n<p>37<br \/>00:05:10.560 &#8211;&gt; 00:05:14.880<br \/>Geremy Meyers: Those SAS Apps that are not being delivered through like as an ABS and desktop.<\/p>\n<p>38<br \/>00:05:15.420 &#8211;&gt; 00:05:30.240<br \/>Geremy Meyers: or DAS service, but everything else as well yeah so when you hit workspace So when I type in my workspace URL before i&#8217;m allowed to hit any of that application stuff I can take you through this authentication process which can be pretty pretty granular.<\/p>\n<p>39<br \/>00:05:31.200 &#8211;&gt; 00:05:36.750<br \/>Andy Whiteside: And then I can keep looking through you know security analytics and if something changes or seems.<\/p>\n<p>40<br \/>00:05:38.640 &#8211;&gt; 00:05:43.710<br \/>Andy Whiteside: You know, out of whack I can then inject some type of additional new policy on the fly.<\/p>\n<p>41<br \/>00:05:44.520 &#8211;&gt; 00:05:47.220<br \/>Geremy Meyers: I will security analytics will do that for you, so a lot of that.<\/p>\n<p>42<br \/>00:05:48.330 &#8211;&gt; 00:05:51.270<br \/>Geremy Meyers: You know in process or I guess in session.<\/p>\n<p>43<br \/>00:05:52.440 &#8211;&gt; 00:05:55.740<br \/>Geremy Meyers: You know that happens from security and alexa, for instance, you know once you&#8217;re in your session.<\/p>\n<p>44<br \/>00:05:57.120 &#8211;&gt; 00:06:03.030<br \/>Geremy Meyers: You know, we can do things like you, you doing something that requires that you&#8217;re doing from you know, for instance.<\/p>\n<p>45<br \/>00:06:04.500 &#8211;&gt; 00:06:05.250<br \/>Geremy Meyers: I just had a good one.<\/p>\n<p>46<br \/>00:06:06.540 &#8211;&gt; 00:06:13.920<br \/>Geremy Meyers: You know something that he maybe you&#8217;re downloading files too often you get a security analytics engine, I mean just figuring out like my kickoff like a session.<\/p>\n<p>47<br \/>00:06:14.730 &#8211;&gt; 00:06:22.590<br \/>Geremy Meyers: You know session recording session right so that&#8217;s not necessarily depth of off at that point you&#8217;re inside of security analytics which is taking some of those proactive actions but.<\/p>\n<p>48<br \/>00:06:23.130 &#8211;&gt; 00:06:33.330<br \/>Geremy Meyers: adaptive off is really sort of the front door into the solution, and then, once you&#8217;re in security analytics takes over a lot of the posturing in session and can take some proactive actions as well.<\/p>\n<p>49<br \/>00:06:34.830 &#8211;&gt; 00:06:39.630<br \/>Andy Whiteside: So is that would that be considered part of adaptive authors all about that entry into the system.<\/p>\n<p>50<br \/>00:06:40.770 &#8211;&gt; 00:06:44.400<br \/>Geremy Meyers: it&#8217;s really more about often into the entry into the system, you know, out of the game.<\/p>\n<p>51<br \/>00:06:45.720 &#8211;&gt; 00:06:54.180<br \/>Andy Whiteside: So in steve&#8217;s blog here, he talks about how adaptive all works to improve access security means that, basically, what we&#8217;ve been discussing.<\/p>\n<p>52<br \/>00:06:54.690 &#8211;&gt; 00:06:58.770<br \/>Geremy Meyers: As what we&#8217;ve been discussing right so i&#8217;m looking through this right now.<\/p>\n<p>53<br \/>00:06:59.940 &#8211;&gt; 00:07:08.760<br \/>Geremy Meyers: I mean just imagine in a hybrid scenario, you could be connecting from a corporate device you could be connecting from some sort of personal device to device.<\/p>\n<p>54<br \/>00:07:09.300 &#8211;&gt; 00:07:14.910<br \/>Geremy Meyers: And so you know, in the past with workspace, in particular, there really was no good way of.<\/p>\n<p>55<br \/>00:07:15.480 &#8211;&gt; 00:07:22.230<br \/>Geremy Meyers: You know deciphering between the two unless you use the certain you know you put an ABC in your data Center or in the cloud.<\/p>\n<p>56<br \/>00:07:22.620 &#8211;&gt; 00:07:32.040<br \/>Geremy Meyers: He said hey i&#8217;m going to use that for authentication now we&#8217;re sort of precluding that and say hey you know what we get the service that will do that, instead, so we can take different good posture that device differently and do everything out the cloud.<\/p>\n<p>57<br \/>00:07:33.090 &#8211;&gt; 00:07:36.930<br \/>Geremy Meyers: As opposed to having to stand up you&#8217;re on a PC with a lot of folks, to be perfectly honest, I don&#8217;t want to manage.<\/p>\n<p>58<br \/>00:07:37.920 &#8211;&gt; 00:07:40.140<br \/>Andy Whiteside: So JEREMY to put that in perspective.<\/p>\n<p>59<br \/>00:07:40.170 &#8211;&gt; 00:07:50.430<br \/>Andy Whiteside: If I looked around where i&#8217;m at right now i&#8217;ve got my windows machine which is windows enterprise 10 which is going to my azure ad.<\/p>\n<p>60<br \/>00:07:51.090 &#8211;&gt; 00:07:53.280<br \/>Andy Whiteside: got a Lenovo.<\/p>\n<p>61<br \/>00:07:54.060 &#8211;&gt; 00:07:57.720<br \/>Andy Whiteside: laptop running I gel os.<\/p>\n<p>62<br \/>00:07:58.800 &#8211;&gt; 00:08:06.900<br \/>Andy Whiteside: Computer in front of me is an all in one running idle os it all in one the one beside me, as a.<\/p>\n<p>63<br \/>00:08:08.160 &#8211;&gt; 00:08:14.970<br \/>Andy Whiteside: 10 plus year old laptop running chrome os for the nonprofit that I have and then one behind me, is a.<\/p>\n<p>64<br \/>00:08:16.080 &#8211;&gt; 00:08:16.650<br \/>Andy Whiteside: Is a.<\/p>\n<p>65<br \/>00:08:17.880 &#8211;&gt; 00:08:28.350<br \/>Andy Whiteside: Microsoft surface go running windows I literally have used all three of those to access my citrix environment today yeah crazy.<\/p>\n<p>66<br \/>00:08:28.920 &#8211;&gt; 00:08:29.580<br \/>Geremy Meyers: It is crazy.<\/p>\n<p>67<br \/>00:08:31.680 &#8211;&gt; 00:08:39.840<br \/>Geremy Meyers: If we&#8217;re comparing devices so i&#8217;ve got a surface laptop studio I think that&#8217;s what they call this anyways it&#8217;s the next iteration of the surface book.<\/p>\n<p>68<br \/>00:08:40.890 &#8211;&gt; 00:08:51.630<br \/>Geremy Meyers: That I primarily work from I also have a surface pro that i&#8217;ll travel with, and occasionally just so I can relate to folks i&#8217;ll pull up my macbook and connect using that but.<\/p>\n<p>69<br \/>00:08:52.080 &#8211;&gt; 00:09:01.770<br \/>Geremy Meyers: You know, being able to say you know posture each of those devices and provide different tiers of access, depending on what you&#8217;re connecting from and maybe the you know, maybe what from an EPA scan returns.<\/p>\n<p>70<br \/>00:09:02.970 &#8211;&gt; 00:09:13.920<br \/>Geremy Meyers: I mean listen it&#8217;s it&#8217;s pretty powerful, but you know, honestly, one of the simplest ones is just internal external access right, so the idea that maybe for some multifactor for external not internal.<\/p>\n<p>71<br \/>00:09:14.490 &#8211;&gt; 00:09:24.450<br \/>Geremy Meyers: is one of the simple use cases we get asked about all the time from a workplace workplace prospect workspace perspective know what to do with today was to stand up your own adc to do something like that yeah now they.<\/p>\n<p>72<br \/>00:09:24.840 &#8211;&gt; 00:09:27.150<br \/>Andy Whiteside: Say simple and doing that, with the look i&#8217;ve.<\/p>\n<p>73<br \/>00:09:27.180 &#8211;&gt; 00:09:33.090<br \/>Andy Whiteside: got lots of customers when that sailors at sees that they own that i&#8217;ve never made it to the.<\/p>\n<p>74<br \/>00:09:34.500 &#8211;&gt; 00:09:37.380<br \/>Andy Whiteside: The secure off world.<\/p>\n<p>75<br \/>00:09:38.940 &#8211;&gt; 00:09:43.260<br \/>Andy Whiteside: Now they can because it&#8217;s a much simpler service that they never have to learn how to set up on their own.<\/p>\n<p>76<br \/>00:09:44.670 &#8211;&gt; 00:09:49.260<br \/>Geremy Meyers: yep that&#8217;s that&#8217;s correct now what you what you get and i&#8217;m not sure if this.<\/p>\n<p>77<br \/>00:09:50.100 &#8211;&gt; 00:09:56.940<br \/>Geremy Meyers: i&#8217;m not sure if this article gets into it so let&#8217;s scroll down here a little bit, I think this is probably what I just hit on, so why adaptive access is important for security.<\/p>\n<p>78<br \/>00:09:57.480 &#8211;&gt; 00:10:07.710<br \/>Geremy Meyers: So part of the adaptive access story is is definitely what you see here right so we&#8217;re looking at policy that seemed to be probably more security analytics but.<\/p>\n<p>79<br \/>00:10:09.810 &#8211;&gt; 00:10:10.170<br \/>Geremy Meyers: yeah.<\/p>\n<p>80<br \/>00:10:18.210 &#8211;&gt; 00:10:34.110<br \/>Geremy Meyers: But anyways in this case, you know we&#8217;re logging in with adaptive access is the front end and once we&#8217;re in you know, being able to feed some of that data into security analytics and then being able to leverage security analytics for some of the in session posturing is is pretty powerful.<\/p>\n<p>81<br \/>00:10:36.240 &#8211;&gt; 00:10:47.490<br \/>Andy Whiteside: And as far as configuring that for the administrator you truly are going into your citrix portal turning that on and then saying what applications what workflows you&#8217;re going to protect.<\/p>\n<p>82<br \/>00:10:48.960 &#8211;&gt; 00:10:52.110<br \/>Geremy Meyers: or for what the adaptive access or we&#8217;re we&#8217;re looking at.<\/p>\n<p>83<br \/>00:10:54.180 &#8211;&gt; 00:11:02.790<br \/>Geremy Meyers: we&#8217;re talking specifically adaptive access so when you go turn on the service, first of all there&#8217;s a new option inside of a workspace authentication.<\/p>\n<p>84<br \/>00:11:03.630 &#8211;&gt; 00:11:11.340<br \/>Geremy Meyers: where you can enable adaptive authentication and what it does, the first time that it will walk you through a workflow just deploying the service itself and so.<\/p>\n<p>85<br \/>00:11:11.700 &#8211;&gt; 00:11:17.760<br \/>Geremy Meyers: I mean under the hood it&#8217;s nets gaylor and so that&#8217;s what that&#8217;s what&#8217;s being enabled and turned on once it&#8217;s deployed.<\/p>\n<p>86<br \/>00:11:18.390 &#8211;&gt; 00:11:29.910<br \/>Geremy Meyers: version one of this is very much a net scale or ui right, so you know once you&#8217;re once you&#8217;re in you&#8217;re given an IDP or a an IP address to practice your basic login to Netscape your first time out.<\/p>\n<p>87<br \/>00:11:30.390 &#8211;&gt; 00:11:38.760<br \/>Geremy Meyers: And you do have access to the to the interface, but in this case you&#8217;ve got a pair citrus because doing a lot of the uplift and keeping it patched.<\/p>\n<p>88<br \/>00:11:39.870 &#8211;&gt; 00:11:45.150<br \/>Geremy Meyers: version one of this is definitely an adc ui whatever time, I think that will change to be a little bit more streamline.<\/p>\n<p>89<br \/>00:11:47.340 &#8211;&gt; 00:11:52.290<br \/>Andy Whiteside: So, I guess, maybe i&#8217;m so okay so let&#8217;s walk through the sections real quick make sure i&#8217;m.<\/p>\n<p>90<br \/>00:11:52.290 &#8211;&gt; 00:11:53.010<br \/>Andy Whiteside: Understanding so.<\/p>\n<p>91<br \/>00:11:53.250 &#8211;&gt; 00:12:01.980<br \/>Andy Whiteside: How adaptive off works to improve access security, this is the user experience side is what Steve showing here right.<\/p>\n<p>92<br \/>00:12:02.340 &#8211;&gt; 00:12:07.110<br \/>Geremy Meyers: that&#8217;s what he&#8217;s showing you yep so the user has typed in the workspace URL.<\/p>\n<p>93<br \/>00:12:07.740 &#8211;&gt; 00:12:18.360<br \/>Geremy Meyers: And in this case we&#8217;ve got workspace configured to leverage adaptive all so just again going back into those configuration options and so it&#8217;ll send you to the service and.<\/p>\n<p>94<br \/>00:12:18.900 &#8211;&gt; 00:12:28.110<br \/>Geremy Meyers: walk through an authentication flow based on whatever you&#8217;ve got teed up, so it could be as simple as just add in two factor that&#8217;s it and that&#8217;s Okay, too.<\/p>\n<p>95<br \/>00:12:28.620 &#8211;&gt; 00:12:35.280<br \/>Geremy Meyers: But you can get pretty granular using if you&#8217;re familiar with some of the impact or flows, I mean you can make this as granular as you need it to be.<\/p>\n<p>96<br \/>00:12:36.210 &#8211;&gt; 00:12:44.100<br \/>Andy Whiteside: Now, if I don&#8217;t have the deploy agent on my end point, am I going to automatically fall into some less less trusted bucket.<\/p>\n<p>97<br \/>00:12:45.810 &#8211;&gt; 00:12:46.620<br \/>Geremy Meyers: or they can be.<\/p>\n<p>98<br \/>00:12:46.770 &#8211;&gt; 00:12:55.080<br \/>Geremy Meyers: If you&#8217;ve got a bucket for specifically that right, so if you are tearing your access and you&#8217;ve got a bucket for just that default you&#8217;re absolutely correct.<\/p>\n<p>99<br \/>00:12:56.400 &#8211;&gt; 00:12:56.730<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>100<br \/>00:12:57.750 &#8211;&gt; 00:13:02.130<br \/>Andy Whiteside: Okay, and then the next section is titled why adaptive access.<\/p>\n<p>101<br \/>00:13:03.510 &#8211;&gt; 00:13:09.000<br \/>Andy Whiteside: Well i&#8217;m interested in listening to adaptive access and depth that off is that just interchangeable words, there is a difference.<\/p>\n<p>102<br \/>00:13:09.390 &#8211;&gt; 00:13:18.360<br \/>Geremy Meyers: Now so adaptive authors that front door authentication piece and adaptive access is you know once you&#8217;ve connected that&#8217;s the piece that&#8217;s constantly sort of posturing you in session.<\/p>\n<p>103<br \/>00:13:20.190 &#8211;&gt; 00:13:22.980<br \/>Geremy Meyers: and potentially updating your your risk or as well.<\/p>\n<p>104<br \/>00:13:23.580 &#8211;&gt; 00:13:27.120<br \/>Andy Whiteside: Okay, so that&#8217;s where the security analytics would kick in and.<\/p>\n<p>105<br \/>00:13:28.890 &#8211;&gt; 00:13:31.620<br \/>Andy Whiteside: If things are where they should be all along the way.<\/p>\n<p>106<br \/>00:13:32.670 &#8211;&gt; 00:13:33.300<br \/>Geremy Meyers: Correct yep.<\/p>\n<p>107<br \/>00:13:34.020 &#8211;&gt; 00:13:34.350<br \/>\u0920\u0940\u0915 \u0939\u0948\u0964<\/p>\n<p>108<br \/>00:13:35.880 &#8211;&gt; 00:13:45.360<br \/>Andy Whiteside: And then the last section here, it says enable flexible access security with citrix secure private access is that just helping us understand how to go turn it on.<\/p>\n<p>109<br \/>00:13:46.320 &#8211;&gt; 00:14:00.120<br \/>Geremy Meyers: it&#8217;s really just more of a it&#8217;s really just more of a statement that says, you know, regardless of what your security posture is you know what what your requirements are this really does open it up, so we can support, whatever scenario that you&#8217;re talking about right so.<\/p>\n<p>110<br \/>00:14:01.500 &#8211;&gt; 00:14:08.190<br \/>Geremy Meyers: You know, for instance, if you&#8217;ve got a mix of X is based on user group you&#8217;ve got access based on you know device posture.<\/p>\n<p>111<br \/>00:14:08.970 &#8211;&gt; 00:14:13.410<br \/>Geremy Meyers: You know I think we were a little bit limited in the past in terms of what we can enable cloud native.<\/p>\n<p>112<br \/>00:14:13.920 &#8211;&gt; 00:14:28.830<br \/>Geremy Meyers: And this turns all that flexibility on right so like I said we don&#8217;t need necessarily need an adc on Prem to support this, you can do this in the cloud, and when if you&#8217;re a dash premium customer they already have this you just have to go turn it on and start leveraging.<\/p>\n<p>113<br \/>00:14:29.940 &#8211;&gt; 00:14:37.410<br \/>Andy Whiteside: This where we should give a SIS admins out there, the warning of you doing the test environment doing a sandbox first, or should we just go turn it on.<\/p>\n<p>114<br \/>00:14:37.950 &#8211;&gt; 00:14:39.060<br \/>Geremy Meyers: um so.<\/p>\n<p>115<br \/>00:14:40.230 &#8211;&gt; 00:14:52.290<br \/>Geremy Meyers: The nice thing about this, I would not disagree with you and we talked about this a lot I think every customer should have a test Dev environment, in fact, you can do that with your your environment, today, you could carve out some licenses to be test out.<\/p>\n<p>116<br \/>00:14:55.080 &#8211;&gt; 00:15:02.730<br \/>Geremy Meyers: But having said all that you can enable the service, you can actually go through the process of getting familiar with it without turning it on.<\/p>\n<p>117<br \/>00:15:03.360 &#8211;&gt; 00:15:14.760<br \/>Geremy Meyers: Is an authentication authentication mechanism so, for instance, you got a lot of options when you log into your workspace config and say hey what I want to use at at with token okta as radio.to dot the Google Google these days.<\/p>\n<p>118<br \/>00:15:15.150 &#8211;&gt; 00:15:25.080<br \/>Geremy Meyers: One of those is a adaptive authentication so you can turn that on and configure it, but until you actually go say hey I want to use this is not going to do anything right so you&#8217;re not gonna you&#8217;re not going to monkey with anything.<\/p>\n<p>119<br \/>00:15:26.640 &#8211;&gt; 00:15:34.020<br \/>Andy Whiteside: Okay, I think that&#8217;s covered it, I appreciate you jumping on you&#8217;re talking about your team was doing some laughing of this stuff up how&#8217;d that go.<\/p>\n<p>120<br \/>00:15:35.040 &#8211;&gt; 00:15:39.240<br \/>Geremy Meyers: we&#8217;re pretty good in fact this past week, we went through this with a customer and they have a.<\/p>\n<p>121<br \/>00:15:40.470 &#8211;&gt; 00:15:55.560<br \/>Geremy Meyers: Use case where they need to use duo radius on Prem and so we&#8217;ve gotten that configured with adaptive authentication so we got think a lot of folks would say radius is a little load and yet you know we get a lot of customers using it and it&#8217;s completely supported so we&#8217;ve got networking.<\/p>\n<p>122<br \/>00:15:56.310 &#8211;&gt; 00:15:58.800<br \/>Geremy Meyers: yeah it&#8217;s a it&#8217;s not bad pretty easy.<\/p>\n<p>123<br \/>00:16:00.450 &#8211;&gt; 00:16:08.550<br \/>Andy Whiteside: All right, Sir, I appreciate you jumping on and covering this with me and you spend a little bit of your Monday, sharing the sharing the knowledge.<\/p>\n<p>124<br \/>00:16:09.240 &#8211;&gt; 00:16:11.490<br \/>Geremy Meyers: Training anytime see you next Monday.<\/p>\n<p>125<br \/>00:16:12.240 &#8211;&gt; 00:16:12.720<br \/>Andy Whiteside: Thank you.<\/p>\n<p>126<br \/>00:16:12.990 &#8211;&gt; 00:16:13.320<br \/>yep.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Every employee in your hybrid workforce is unique. They have their own devices and home networks, their own remote work preferences, and their own workflows in how they get their &hellip;<\/p>","protected":false},"author":7,"featured_media":65995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-66042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>110: The Citrix Session: Adaptive authentication and access in Citrix<\/title>\n<meta name=\"description\" content=\"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"110: The Citrix Session: Adaptive authentication and access in Citrix\" \/>\n<meta property=\"og:description\" content=\"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-19T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-30T19:38:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"110: The Citrix Session: Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access\",\"datePublished\":\"2022-07-19T15:00:00+00:00\",\"dateModified\":\"2026-01-30T19:38:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/\"},\"wordCount\":3706,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/\",\"name\":\"110: The Citrix Session: Adaptive authentication and access in Citrix\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"datePublished\":\"2022-07-19T15:00:00+00:00\",\"dateModified\":\"2026-01-30T19:38:24+00:00\",\"description\":\"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Citrix-Session.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"110: The Citrix Session: Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"110: The Citrix Session: Adaptive authentication and access in Citrix","description":"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/","og_locale":"hi_IN","og_type":"article","og_title":"110: The Citrix Session: Adaptive authentication and access in Citrix","og_description":"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.","og_url":"https:\/\/xentegra.com\/hi\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-07-19T15:00:00+00:00","article_modified_time":"2026-01-30T19:38:24+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"17 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"110: The Citrix Session: Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access","datePublished":"2022-07-19T15:00:00+00:00","dateModified":"2026-01-30T19:38:24+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/"},"wordCount":3706,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/","url":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/","name":"110: The Citrix Session: Adaptive authentication and access in Citrix","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","datePublished":"2022-07-19T15:00:00+00:00","dateModified":"2026-01-30T19:38:24+00:00","description":"Listen to The Citrix Session as we talk about Adaptive authentication and access in Citrix Secure Private Access.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Citrix-Session.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/110-the-citrix-session-citrix-features-explained-adaptive-authentication-and-access-in-citrix-secure-private-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"110: The Citrix Session: Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=66042"}],"version-history":[{"count":1173,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66042\/revisions"}],"predecessor-version":[{"id":710078,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/66042\/revisions\/710078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65995"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=66042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=66042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=66042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}