One of the key security features of Chromium is that all blink rendering/JavaScript code is executed within a sandbox. This sandbox uses operating specific functionality to ensure that errors and misconfiguration are contained within the sandbox itself, therefore preventing permanent and potentially damaging changes from being made to the main system.
The sandbox functionality has been enabled by default since Symphony Desktop Application (SDA) 3.8.x, however, it has been discovered that Chromium based applications with a sandbox switch installed on a network drive or virtual space can cause a crash for the SDA.
To resolve this, amend the path of the Target in the Symphony Properties :
- Right click the Symphony application and select Properties.
- Select the Shortcut tab.
- In the Target field, enter --no-sandbox at the end of the file path.
- Select Apply, and then OK.
- Open a new SDA session and see if the crash reoccurs.
If you are still experiencing issues with the SDA crashing using Citrix, please contact the Symphony Support team at support@symphony.com for further assistance.