Access and authentication methods in a Citrix enviroment

So this blog post is based upon my presentation on VirtrualExpo earlier this week. Where I talked about different authentication and access methods in a Citrix enviroment…

Quelle: Access and authentication methods in a Citrix enviroment