The starting point for the mobile productivity apps is Citrix Secure Hub. To access the app store, users must enroll their devices in citrix Secure Hub. They can add both third-party and Citrix-developed mobile productivity apps from the app store.

People may communicate data quickly, securely, and professionally with the aid of Citrix Files.

Citrix Secure Hub Files is a file manager that was created for business use. It provides secure data sharing and storage, adjustable usage and settings, award-winning customer care, and technologies that make it easier to collaborate and complete work from any device, at any time, anywhere.

You can: Using your Apkpure Citrix Secure Hub Files account and app


  • Available through your Citrix Secure Hub Files account, files and folders.
  • Edit documents that are stored in your Citrix Files account (not available on all plans).
  • Uploading and downloading files between your mobile device and Citrix Files account.
  • Sync files across all of your devices to your Citrix Files account.


  • Sync or distribute multiple files to a number of users simultaneously.
  • Send files via email using the mail, Gmail, or Citrix Secure Hub  Files apps on your phone.
  • Ask for files and give them secure URLs so they can submit them to your Citrix Secure Hub  Files account.


  •           Individual user access rights can be set for files and folders.
  •           Enter a passcode to add an extra layer of security to your Citrix Files account.
  •           Adjust users’ access rights to existing Citrix Files account folders.
  •           Use the Citrix Secure Hub  Files account you have to access a secure file manager.

In the event that a mobile device is lost or stolen, you can remotely erase or lock your CitrixSecure Hub Files account.

How Can I Set Up Apkpure Citrix Secure Hub on an Ios Device?

You must configure an Apple Push Notification service (APNs) certificate from Apple in order to handle iOS devices in Endpoint Management. See APNs certification for further details.

iOS device enrollment in MDM+MAM is determined by enrollment profiles, and users have the option to decline mobile device management (MDM). The following forms of authentication are supported by Endpoint Management for iOS devices in MDM+MAM.

The following is a general method for initiating iOS device management:

  1. finish the onboarding procedure. see Resource Setup and Onboarding Prepare to deliver resources and enroll devices.
  1. Select and set up an enrollment strategy. View the supported methods of enrolment.
  1. Create policies for iOS devices.
  1. Activate iOS devices.
  1. Configure the device and app security settings. Security measures.

Compatible with iOS 14

Although iOS 14 is compatible with Endpoint Management and Apkpure Citrix Secure Hub mobile apps, the latter do not yet support the latter’s new features.

You can put off software updates for monitored iOS devices for up to 90 days. Use these settings in iOS’s limitations device policy:

  • forced updates to software
  • enforce a delay in software updates

View the iOS settings. For devices in user enrollment mode or unsupervised (full MDM) mode, those options aren’t accessible.

Apple Host Names That Need to Be Accessible

For iOS, macOS, and the Apple App Store to function properly, some Apple host names must stay accessible. The installation, updating, and proper operation of iOS, iOS apps, MDM functionality, and device and app enrollment may all be impacted by blocking those host names.

Supported Procedures for Enrolment

In enrollment profiles, you decide how iOS devices should be managed. Following enrollment parameters are available for your selection:

  • Apple User Enrollment: For BYOD devices, provides a balance between personal data privacy and corporate data security. The public may preview this enrolling mode. Make touch with your support staff to turn on this function.
  • Apple Device Enrollment: For iOS devices that are under supervision and have separate personal and professional profiles.
  • Avoid managing devices: If you simply want to manage apps on specific devices, exclude them from MDM.

See Enrollment profiles for further details on developing enrollment profiles.

For iOS devices, Endpoint Management supports the following enrolment techniques:

Apple School Manager (ASM) and Apple Business Manager (ABM) are two of the Apple Deployment Programs available to businesses and educational institutions, respectively.

An example of an Education Apple Deployment Program is Apple School Manager. See Apple Education features integration.

To enroll a large number of iOS, iPadOS, macOS, and tvOS devices, use the Apple Deployment Programs. These gadgets are available for purchase directly from Apple, through an affiliated Apple Authorized Reseller, or via a carrier. You can enroll iOS devices via the Apple Configurator, regardless of whether you buy them directly from Apple.

Admin Apple IDs

Managed Apple IDs are seamlessly integrated with user enrolment. A Managed Apple ID can be created manually with ABM/ASM or automatically with Azure Active Directory (AAD).

Create Managed Apple IDs using ABM/ASM to add an account for non-federated authentication. Consult the Apple documentation for ASM at and ABM at for details on establishing an account. To cut down on extra steps when users enroll, we advise the following:

  • When creating a Managed Apple ID, use an email that is the same as the company’s email address.
  • User role should be set to Staff.
  • Before registering, require users to manually update their passwords. Inform users that we advise using the same password for their personal accounts as the company’s.

Configure Citrix Cloud to use AAD as its identity provider in order to generate Managed Apple IDs on demand. See Authentication with Azure Active Directory through Apkpure Citrix Secure Hub Cloud for additional details on setting up Citrix Cloud to use AAD. Federated authentication should also be set up in ABM/ASM. The Apple Business Manager User Guide and the Apple School Manager User Guide contain more information on enabling federated authentication in ABM or ASM, respectively.

You can set up a custom domain to use instead of the default domain when manually creating Managed Apple IDs. The old domain is replaced by the custom domain you configure. Your company’s email addresses, for instance, start with the format. [email protected] is the preferred domain, but you should use for the Managed Apple ID. The email address that is used to create the Managed Apple ID on ABM/ASM is [email protected]

Leave a Reply

Your email address will not be published. Required fields are marked *