Link Apps to Users
Once the application rationalization process is complete, use the results from the data capture process to identify which applications will be required by each user group. The following characteristics should be identified for each application so that the right application delivery model can be selected during the design phase of the project:
• Workload (T) – Collecting application workload requirements will allow the virtualization infrastructure to be sized and an appropriate application delivery model to be selected. For example, resource intensive applications will not be delivered via a Hosted Shared Desktop because there is limited control over how the resources are shared between users. There are two classifications available in the user assessment worksheet:
• Technically challenging (B) – An application should be classified as technically challenging if it is complex to set up, has extensive dependencies on other applications or requires a specialized configuration, for example an Electronic Medical Records (EMR) application. Technically challenging applications need to be identified during the application assessment because they are not generally appropriate for installation in to a base desktop image or delivery by application streaming. Delivering technically challenging applications as published applications will help to reduce the complexity of the base desktop image.
• Works offline (B) – Some user groups may require the ability to work offline. If so, it is important that the design can determine which applications will work without a network connection and which ones will not. Applications that require backend infrastructure such as web and database servers are not typically available offline.
• Peripheral connectivity (T) – If applications require connectivity with peripheral devices, identify the interface required so that it can be made available to the application when it is run from a virtual session.
Note: Generic USB redirection is now supported in Hosted Shared Desktops delivered through XenApp 7.6. XenApp and XenDesktop 7.6 are also USB 3.0 ready. A future release of Citrix
Receiver for Windows and Linux will include automatic device mapping and plug-and-play capabilities for USB 3.0 devices.
Note: USB redirection works for XenApp and XenDesktop 7.6 and above. For more information please refer to Citrix eDocs – USB and client drive considerations.
• Restricted access (B) – Application access may need to be restricted due to insufficient licenses / resources and to protect sensitive data / tools. For example, applications with a limited number of licenses should not be installed in to a base image that is shared with unlicensed users. There are three restricted access categories in the application assessment workbook:
No comments:
Post a Comment