2

Introducing the Citrix Presentation Server Client for Macintosh

15

Note: The client does not support cursor feedback. This means, for example, that if an administrator is controlling what is happening in the session window, the user might see a menu open, but the cursor on that user’s computer would not move to track the administrator’s mouse movement.

Printing. Printing uses the Citrix Universal Printer Driver technology so that applications running remotely on the server can print to local printers. For more information, see “Printing” on page 39.

PC key mapping. Users can use special key combinations to mimic PC keys not available on standard Macintosh keyboards and to replicate mouse actions. See “Configuring Hotkeys” on page 47.

Time zone support. Sessions on servers in a different time zone reflect the time zone of the client device, as set in the computer’s System Preferences dialog box.

For example, a user in London logs on to a server in the USA and launches Microsoft Outlook as a published application. Microsoft Outlook stamps emails sent during this session with the user’s London time zone information.

The time zone displayed may be different from the user’s actual location because the server uses the first country in the alphabetically ordered list for that time zone. Users in Helsinki will see their time zone reported as Athens because both are GMT +2:00.

Seamless windows. As well as configuring sessions to run in windows of a fixed size, you can choose the seamless mode to display applications and desktops in a fully resizeable window.

Security Features

Support for smart cards. You can use smart cards to provide authenticating credentials when logging on to a server. See “Creating a Basic Connection File” on page 23 for more information about using smart cards with the client.

You may also need to install proprietary software to use smart card readers.

Secure proxy server support. As an alternative to using a SOCKS proxy, the client also supports using a Secure Proxy Server. For more information, see “Configuring the Client to Work with a Proxy Server” on page 57.

Page 15
Image 15
Citrix Systems 10 manual Security Features