How to disable Workspace Control Session Roaming on Citrix Virtual Apps and Desktops

Use following Powershell commands on one of the Delivery Controller

For desktop sessions:

Set-BrokerEntitlementPolicyRule <Delivery-Group-name> -SessionReconnection <value> -LeasingBehavior Allowed|Disallowed

For application sessions:

Set-BrokerAppEntitlementPolicyRule <Delivery-Group-name> -SessionReconnection <value> -LeasingBehavior Allowed|Disallowed

Where <value> can be one of the following:

  • Always: Sessions always roam, regardless of the client device and whether the session is connected or disconnected. This is the default value.
  • DisconnectedOnly: Reconnect only to sessions that are already disconnected; otherwise, launch a new session. (Sessions can roam between client devices by first disconnecting them, or using Workspace Control to explicitly roam them.) An active connected session from another client device is never used; instead, a new session is launched.
  • SameEndpointOnly: A user gets a unique session for each client device they use. This completely disables roaming. Users can reconnect only to the same device that was previously used in the session.


Maslow’s Hierarchy of Needs, Applied to 5G

From architecture to operations, 5G networks have the potential to drive industries towards digital transformation in ways that we’ve not seen with prior generations of mobile technologies. Whether it be the architectural flexibility to add new capabilities incrementally (prior G’s required end-to-end generational updates), or the industry-centric perspective of 5G use-cases (prior G’s focused on singular consumer experience), I often find that my team and I focus extensively on Four Pillars of 5G Transformation: Network Modernization, towards a virtualized and software-defined network IT and OSS/BSS Transformation towards data-driven decisions Digital Transformation, delivering joint enterprise solutions in … READ MORE


  • No Related Posts

5G and Me: And Manufacturing

How can 5G accelerate manufacturing? With its increased speed, higher bandwidth and lower latency, fifth-generation wireless cellular technology, or 5G, has the potential to be a key enabler and accelerator of the next generation of smart manufacturing. Some advantages of this communications technology for industrial applications include: Higher Bandwidth – modern IIoT gateways and distributed edge compute architectures are creating an explosion of valuable plant data and 5G networks are ideally suited to keep up with this data deluge Lower Latency – allowing devices to communicate more quickly and reliably is especially important for machine-to-machine communications … READ MORE


  • No Related Posts

Not Just Another G: The Next Generation

This is the second installment in our series Not Just Another G, which provides insight into 5G and what it means to the service provider industry. Missed the first post? Catch up here. The next-generation 5G architecture is built around the realization that different services are consumed differently, and by different types of users. Thus, next-generation mobile access technology must have: A way to define those differences, A way to determine and place constraints so as to meet those differences, and A way to architect access methods that meet the goals of the different services that … READ MORE


  • No Related Posts

Unified Agent – No Access to Internet in WiFi with Captive Portals

I need a solution


we have the Main Problem that our Users cannot use free WiFi in Hotels or Airport Lounges when they have a Captive Portal.

The Unified Agents detect this but the User didn’t have any possibility to access the Cative Portal to get access to the Internet.

The Only two Poissibilities are

1. Disable the Unified Agent

2. User there own WiFi with Tethering

Did anybody hav a solution for that?

Thanks for help and answering.

Kind Regards




Unified agent without captive portal

I need a solution


Let’s say that I am working from home, If my unified agent connects and provides my credentials that I used to logon to my BYOD device “without the use of captive portal”. Can I still undergo policy evaluation based on groups providing that I have auth connector. 

Or I must use captive portal in this case to provide the domain name?