Citrix Endpoint Management (XenMobile)
- 08 Mar 2022
- 1 Minute to read
- Print
- DarkLight
- PDF
Citrix Endpoint Management (XenMobile)
- Updated on 08 Mar 2022
- 1 Minute to read
- Print
- DarkLight
- PDF
Article Summary
Share feedback
Thanks for sharing your feedback!
Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities.
Parameters
- Citrix Endpoint Management Domain (required) - The hostname or IP address of the Citrix Endpoint Management server.
- User Name and Password (required) - The credentials for a user account that has the Required Permissions to fetch assets.
- Port (required, default: 4443) - The port used for the connection.
- Verify SSL (required, default: False) - Verify the SSL certificate offered by the value supplied in Citrix Endpoint Management Domain. For more details, see SSL Trust & CA Settings.
- If enabled, the SSL certificate offered by the value supplied in Citrix Endpoint Management Domain will be verified against the CA database inside of Axonius. If the SSL certificate can not be validated against the CA database inside of Axonius, the connection will fail with an error.
- If disabled, the SSL certificate offered by the value supplied in Citrix Endpoint Management Domain will not be verified against the CA database inside of Axonius.
- HTTPS Proxy (optional, default: empty) - A proxy to use when connecting to the value supplied in Citrix Endpoint Management Domain.
- If supplied, Axonius will utilize the proxy when connecting to the value supplied in Citrix Endpoint Management Domain.
- If not supplied, Axonius will connect directly to the value supplied in Citrix Endpoint Management Domain.
- For details on the common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Required Permissions
Access to the REST API requires one of the following permissions:
Citrix Cloud administrator
Super user permission
Public API access permission set as part of role-based access configuration. For information, see Configuring roles with RBAC.
- If using RBAC, the following permissions must be granted:
- Console > Devices > View software inventory
- If using RBAC, the following permissions must be granted: