Attention A T users. To access the menus on this page please perform the following steps. 1. Please switch auto forms mode to off. 2. Hit enter to expand a main menu option (Health, Benefits, etc). 3. To enter and activate the submenu links, hit the down arrow. You will now be able to tab or arrow up or down through the submenu options to access/activate the submenu links.

VA Technical Reference Model v 24.4

Citrix Independent Computing Architecture (ICA) Client
Citrix Independent Computing Architecture (ICA) Client Technology

General InformationGeneral Information help

Technologies must be operated and maintained in accordance with Federal and Department security and privacy policies and guidelines. More information on the proper use of the TRM can be found on the TRM Proper Use Tab/Section.

Website: Go to site
Description: Citrix Independent Computing Architecture (ICA) Web Client is a virtualization server environment, also known as a `server based computing protocol that allows remote access to users`. The proprietary protocol lays down a specification for passing data between server and clients, but is not bound to any one platform.

Citrix ICA Web Client enables a corporate Information Technology (IT) department to house and maintain virtual, personal computers in a central location for users who are located in various geographic regions. The central location for the virtual computers, which are managed on centralized servers, is a corporation`s IT data center.

Note: According to the vendor, ICA is the extension of the configuration file that Citrix Receiver uses to connect to a Citrix-provided application or desktop. The ICA Client is an early version of Receiver. You use Receiver to centrally configure, manage, and update the technology, such as ICA, installed on the device.` Please see the entry for Citrix Receiver for more information on the client software that provides access to XenDesktop and XenApp installations.
Technology/Standard Usage Requirements: Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 6102 and 6500; VA Directives 6004, 6513, and 6517; and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). Users must ensure sensitive data is properly protected in compliance with all VA regulations. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation.
Section 508 Information: This technology has not been assessed by the Section 508 Office. The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. Section 508 compliance may be reviewed by the Section 508 Office and appropriate remedial action required if necessary. For additional information or assistance regarding Section 508, please contact the Section 508 Office at
Decision: View Decisions

Decision Source: TRM Mgmt Group
Decision Process: One-VA TRM v20.9
Decision Date: 09/17/2020 at 10:56:54 UTC
Introduced By: SCCM
Vendor Name: Citrix
- The information contained on this page is accurate as of the Decision Date (09/17/2020 at 10:56:54 UTC).