8 Client for Macintosh Administrator’s Guide
Accessing Product Documentation
This guide is part of the Presentation Server documentation set and contains
conceptual information and installation and configuration steps for the client.
Apple Help is provided for some tasks within the client and Citrix ICA Client
Editor. This is shipped with the client software and accessed from the client and
ICA Client Editor menu bars, and by using COMMAND+SHIFT+? in the ICA
Client Editor.
The documentation for Presentation Server includes online documentation,
known issues information, and application Help, as follows:
•Use Welcome to Citrix Presentation Server (Read_Me_First.html) to access
the complete set of online guides on the Web. Alternatively, to access the
documentation at any time, go to http://support.citrix.com. Online
documentation is provided as Adobe Portable Document Format (PDF)
files.
• Known issues information is included in the product readme, also available
on the Web. Use Welcome to Citrix Presentation Server
(Read_Me_First.html) to access the product readme.
• For information about terminology related to Presentation Server, see the
Citrix Presentation Server Glossary, available from the Knowledge Center
at http://support.citrix.com.
• More information about Citrix documentation, and details about how to
obtain further information and support, is included in Getting Started with
Configuring Connections to Servers and
Applications
Describes how to configure connection
properties and device mappings for the client
Running Applications, Accessing Desktops,
and Working in Sessions
Describes how to use connection files to
open files in published applications and
access remote server desktops
Configuring the User Interface Describes how to customize the appearance
and behavior of client sessions
Improving Performance Gives recommendations for methods to
speed client processing and improve
efficiency
Integrating the Client with Security
Solutions
Describes how to integrate the client with
security technologies such as proxy servers,
firewalls, and systems based on Secure
Sockets Layer/Transport Layer Security
(SSL/TLS)
Topic Contents