Error: “The licenses required by this edition of Citrix XenApp are not present on the license server”

Users are unable to access the applications, and the error “An error occurred while making the requested connection” is provided.

The event viewer displays the following error, which indicates a licensing issue:

Source: MetaFrame

EventID: 9014

Description: The licenses required by this edition of Citrix Presentation Server are not present on the license server LicenseServerName.

XenApp 6.5 introduces a new feature to server role called License Model, which is found in the XenApp Server Role Manager console under license configuration. You can choose from the following three types of models:

  • XenApp

  • XenDesktop concurrent system

  • XenDesktop user/device

Note: The setting to modify the License model is also possible by modifying the policies.

Related:

  • No Related Posts

Hypervisor Security Update

Hotfixes have been released to address these issues. Citrix recommends that affected customers install these hotfixes as their patching schedules allow. The hotfixes can be downloaded from the following locations:

Citrix Hypervisor 8.0:

CTX262555 – https://support.citrix.com/article/CTX262555

CTX258428 – https://support.citrix.com/article/CTX258428

Citrix XenServer 7.6:

CTX262554 – https://support.citrix.com/article/CTX262554

CTX258425 – https://support.citrix.com/article/CTX258425

Citrix XenServer 7.1 LTSR CU2:

CTX262553 – https://support.citrix.com/article/CTX262553

CTX258424 – https://support.citrix.com/article/CTX258424

Citrix XenServer 7.0:

CTX258417 – https://support.citrix.com/article/CTX258417

CTX258423 – https://support.citrix.com/article/CTX258423

Related:

  • No Related Posts

Errors testing new connector to CHv 8 – “Connection Error: A failure occurred connecting to Citrix Hypervisor. Error = write EPROTO 140247625111360:error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol”

In the XenCenter configuration for the host, uncheck the option to force only TLS 1.2 communication. See the section, “disabling older protocols”, in the below doc.

https://www.citrix.com/content/dam/citrix/en_us/documents/white-paper/security-recommendations-when-deploying-citrix-xenserver.pdf


To correct the cert errors, when unchecking the connector setting, “ignore certificate errors”, follow the below article.

https://support.citrix.com/article/CTX261855

Related:

  • No Related Posts

Session Recording Agent Install Fails with “Error 1920, Service 'Citrix Session Recording Agent' (CitrixSmAudAgent) failed to start. Verify that you have sufficient privileges to start services.”

When attempting to install the session recording agent, the installation fails with the following message:

Installer Information

Error 1920. Service ‘Citrix Session Recording Agent’ (CitrixSmAudAgent) failed to start. Verify that you have sufficient privileges to start services.

System Event Log shows that Session Recording Agent service failed to start because SessionRecordingDriver service is not installed.

Related:

  • No Related Posts

You receive an error: “No tenant identifying information found in either the request or implied by any provided credentials” when integrated with Intune and Secure Hub is in use.

When enrolling in to Citrix Endpoint Management for MDM, if the deployment is integrated with Intune for MAM, you may experience the following error and behaviour.

Without Secure Hub installed (using Intune MAM only), then no problems are seen.

When Secure Hub is installed and enrolled for MDM with CEM, then inbound connections from managed apps to the Gateway fail with the following error recorded: “No tenant identifying information found in either the request or implied by any provided credentials”

Related:

  • No Related Posts

On Cloudbridge 4000 we see the message as “EVENT_MSG”: “Memory 40 GB, expected 48 GB”

On SVM GUI > System tab, we see the following memory status error:


Log Snippet:

===========

As per the logs, 2 of the DIMM slots (of 4GB each) have gone bad and hence we see only 40GB left on the appliance.

In the below log snippet, we could see only 10 ( 4 GB slots ) out of 12 have got detected .

https://docs.citrix.com/en-us/citrix-sd-wan-platforms/wanop/4100-5100-wanop-appliance/sd-wan-4100.html

/upload/ftp/79097690/bug-report-20190806190639]$ cat dmidecode.out | grep 4096 | grep -v ROM

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

Size: 4096 MB

/upload/ftp/79097690/Management_Service_06Aug2019_19_05_55/var/mps/log]$ more mps_event.log


{ “errorcode”: 0, “message”: “Done”, “message_id”: -1, “resrc_driven”: true, “login_session_id”: “”, “username”: “***********”, “mps_ip_address”: “”, “client_ip_address”: “”, “client_protocol”: “http”, “client_port”: 0, “mpsSessionId”: “”, “source”: “”, “target”: “EVENT”, “version”: “v1”, “messageType”: “MESSAGE_TYPE_INTERNAL”, “resourceType”: “mps_internal_event”, “orignal_resourceType”: “mps_internal_event”, “resourceName”: “”, “operation”: “”, “params”: { “pageno”: 0, “pagesize”: 0, “detailview”: false, “compression”: false, “count”: false, “total_count”: 0, “action”: “”, “type”: “”, “onerror”: “EXIT”, “is_db_driven”: false, “order_by”: “”, “asc”: false, “duration”: “”, “duration_summary”: 0 }, “mps_internal_event”: [ { “EVENT_FORCE_SEND”: “false”, “EVENT_CATEGORY”: “HealthMonitoring”, “EVENT_THRESHOLD_VAL”: “”, “EVENT_FAILURE_OBJ”: “Memory”, “resource_name”: “mps_internal_event”, “EVENT_MSG”: “Memory 40 GB, expected 48 GB”, “EVENT_SEVERITY”: “Critical”, “EVENT_TRAP_ID”: “17”, “EVENT_SOURCE”: “169.254.0.1”, “EVENT_TRAP_VAL”: “” } ] }

Related:

  • No Related Posts

Cisco NX-OS Software NX-API Denial of Service Vulnerability

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart.

The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic.

Note: The NX-API feature is disabled by default.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos

Security Impact Rating: Medium

CVE: CVE-2019-1968

Related:

  • No Related Posts

Error: “Detailed license information unavailable”

Refer to the cause section before proceeding with solution.

Note: The second scenario requires no intervention.

To resolve the first scenario, complete the following steps:

  1. Establish two-way trusts between the domains.

  2. Add all existing Desktop Studio administrators to the license server so that Desktop Studio administrators also can view the license use information.

  3. Apply same resolution as described in CTX129718 – Desktop Studio Error: Can’t Get License Info.

Related:

  • No Related Posts

CVE-2017-6316 – Vulnerability in Citrix NetScaler SD-WAN Enterprise & Standard Edition and Citrix CloudBridge Virtual WAN Edition Could Result in Unauthenticated Remote Code Execution

A new version of the software has been released that addresses this issue in Citrix SD-WAN.

This software, version 9.2.1-1001, is available on the Citrix website at the following address:

https://www.citrix.com/downloads/netscaler-sd-wan/

Citrix strongly recommends that customers upgrade their software to this new version or later and, additionally, review their SD-WAN and CloudBridge deployments to ensure that the management interface is not exposed to untrusted network traffic.

Related:

  • No Related Posts