Workspace is the evolution of Citrix and Hosted Apps and Desktops Services within Atria.
Workspace is created to help manage and allocate resources at scale to your Clients, via Group Management and executing scripts to manage external systems to Atria.
By using Workspace, you can quickly select and deliver these services, including standing up groups and automations at scale with the click of a button.
In this KB article we will go over the core features, as well as link to more complex features of the service.
Workspace is managed by a few core functions, Lists, Items, ItemTypes, and roles.
List's are the method of providing the Items to clients, ItemTypes are the type of item, Item's are individual resources, and roles are another way to aggregate items together for delivery to clients and resellers.
Below is more information about each of the core functions.
Group Type | Definition |
Private (Direct) | An Item which is created which can only be allocated to a singular customer |
Shared (Indirect) | An Item which is available to all lists which creates a indirect group assignment |
Groupless | An Item which does not create a group, and stores the membership of the item logically |
Groupless
Group Name
|
Description
|
Intended Use
|
Domain Global Scoped Security Group | - Members can be users, computers, or other groups from the same domain. | - Typically used for granting permissions and access within a single domain. |
Universal Scoped Security Group | - Members can be users, computers, or other groups from any domain in the forest. | - Useful for granting permissions that need to span multiple domains within the same forest. |
Domain Local Scoped Security Group | - Members can be users, computers, or other groups from any domain in the same forest. | - Primarily used for assigning permissions within a single domain or for resources in that domain. |
Azure AD Security Group | - Similar to traditional security groups in Active Directory, used for granting access and permissions. | - Provides security principals access to resources in Azure and other integrated cloud services. |
Azure AD Distribution Group | - Used for sending emails to a group of recipients without requiring permissions. | - Typically used for distribution lists, mailing lists, or sending notifications. |
Azure AD Mail-Enabled Security Group | - Combination of a security group and a distribution group. | - Can be used to assign permissions like a security group and receive emails like a distribution group. |
Profile Settings are currently configured under the Customer Plan.
Legacy Services that were similar to the WorkSpace Service (Citrix and HostedAppsAndDesktops) both had these settings in different places. Moving them to the Customer Plan configuration means that different plans can be created to target different servers or profile configuration on a customer by customer basis. You'd typically want all users within a Customer to have their Users profiles to be created in the same place, but different customers may be placed on different servers.
You always want to start with "Where do you want the Users Profile and Home folders to be created"?
There are 2 properties that control this, and are referred to as Path Templates:
These will typically look something like:
E:\ProfileFolders\{CustomersName}\Home\{UserName} or E:\ProfileFolders\{CustomersName}\Profile\{UserName}
or something similar.
Now, these are physical paths on a specific server, and are no good for Terminal Services, therefore a UNC path should really be used that map to these physical paths. So a UNC Path may look like this:
\\ALP-FS01\E$\ProfileFolders\ABC\Home\HarryJ_abc
But this path, even though it points to the correct folder, is not how you will want users to access the path. Users are not Administrators, and cannot access the default Admin shares, nor do you want users to be able to access other customers or even other users' data.
A typical Users Profile or Home share will likely look more like:
\\ALP-FS01\ABC$\Home\HarryJ_abc or \\ALP-FS01\ABC$\Profile\HarryJ_abc
When configuring these values within the WorkSpace Service, some of these properties are actually configured together as a single value. So from a WorkSpace configuration perspective, the values will be:
Note that the Name of the Home drive share and the Name of the profile share are simply the naming convention to use when creating the Share that the users will use to access their data. The dollar($) sign is optional and designates whether the share is hidden or not. Hidden is recommended as it will hide shares belonging to other customers. In a dedicated environment, you might want the share to be visible.
Also, the Path to the Home or Profile shares are physical paths from the perspective of the server they reside on.
The rest of the settings, like Logon Script or whether to connect client drives at logon should be self-explanatory.
The Profile Settings are similar to the Terminal Service Profile Settings
In addition to configuring the appropriate values for creating the correct folders, there are a few settings that control whether these values are set or not. They are
As of writing, the Group OU is defined by a specific configuration in the Config Service.
Please make sure you have read/write access of the Config Service. If you need assistance of this, please contact our support team.
First, check the current configuration with the below PowerShell command on the Provisioning Server
{
"ActiveDirectory": "WorkSpace Groups",
"ActiveDirectory:Common": "Shared Resources,WorkSpace,Services,CortexSystem"
}
Here we see two specific keys - A 'ActiveDirectory' and 'ActiveDirectory:Common' Key.
These specifically relate to if an item is Private or Shared. The first key without the common is a 'Private' item resource container, the 'Shared' key is for the overall path where resources are stored.
To change this, here are two examples.
Term
|
Definition
|
iDP Type |
Identity Provider Type, out of the box this is EntraID and Active Directory
|
Indirect Group | An Indirect Group is created by the Workspace service. For Shared items, we will not put users directly in the root group. Within Active Directory, we will create a group then create a new group as a Member Of per customer. This means that users in different customers are still segregated, but can inherit resources allocated to the group. |
Direct Group
|
A Direct Group is a group that is created specifically for one client. This will create a group within Active Directory which Workspace will put users directly into.
|
|
|