Pricing  Get Quote
 
 

Features

How to set up MFA for Microsoft Remote Desktop Gateway using ADSelfService Plus

Microsoft Remote Desktop Gateway (RD Gateway) helps enterprise users connect to their organization's internal resources, like Windows desktops and enterprise applications, from an external network beyond the corporate firewall.

Because the RD Gateway grants access to organizational resources from an external network, logins originating from it should be protected with an extra layer of security using MFA. ADSelfService Plus leverages the RADIUS protocol to integrate with the RD Gateway, ensuring that users prove their identity using MFA before gaining entry.

This article gives you step-by-step instructions on securing RD Gateway connections using MFA via ADSelfService Plus.

Prerequisites

ADSelfService Plus:

  1. You must have the Professional Edition of ADSelfService Plus with Endpoint MFA. To purchase it, visit the store.
  2. HTTPS must be enabled in ADSelfService Plus. Learn how.
  3. Note:

    If you are using an untrusted certificate in ADSelfService Plus to enable HTTPS, you must disable the Restrict user access when there is an invalid SSL certificate option in Configuration > Administrative Tools > GINA/Mac/Linux (Ctrl+Alt+Del) > GINA/Mac/Linux Customization > Advanced.

  4. In ADSelfService Plus, the access URL you have configured at Admin > Product Settings > Connection > Configure Access URL will be used by the NPS extension to communicate with the ADSelfService Plus server. Make sure you have updated the access URL before installing the NPS extension.
  5. RD Gateway server:

  6. You must have a Windows server configured for Remote Gateway (Windows Server 2008 R2 and above). Learn more.
  7. This will be the RD Gateway server, which we'll call the RDG server in this document.

    Network policy server:

  8. You must have another Windows server configured for RADIUS authentication (Windows Server 2008 R2 and above) with the Network Policy and Access Services (NPS) role enabled. Learn more.
  9. You'll install the ADSelfService Plus NPS extension on this server, which we'll call the Central NPS server in this document.

Steps to enable MFA for Microsoft RD Gateway

RD Gateway connections to protected resources are secured through an encrypted SSL tunnel managed by IIS, which uses NPS to enforce authorization policies and authenticate users. To secure these logins with modern MFA methods, you can extend the authentication process from the RDG server to the Central NPS server, which will use ADSelfService Plus to perform the actual authentication.

Enabling MFA for RD Gateway involves three steps:

  1. Configuring ADSelfService Plus
  2. Configuring the Central NPS server
  3. Configuring the RDG server

Step 1: Configuring ADSelfService Plus

a. Enabling the required authenticators

You need to first configure the authenticators to be used for protecting RDP logins with MFA. The following authentication methods are supported:

You can learn how to enable these authentication methods by following the links above.

Note:

  • These authenticators require the ADSelfService Plus mobile app. When you enable Push Notification Authentication or Biometric Authentication, make sure that the ADSelfService Plus server is reachable through the internet from users' mobile devices.
  • The RADIUS authentication timeout should be set to at least 60 seconds in the RDG server's RADIUS authentication configuration settings.

b. Enabling MFA for RADIUS endpoints in ADSelfService Plus

Once you've enabled the required authenticators, you must configure them to protect login requests to the Central NPS server (from the RDG server), which is a RADIUS endpoint. Use the MFA for VPN Logins (which supports RADIUS endpoints) configuration settings to enable this.

  1. Log into ADSelfService Plus with administrator credentials.
  2. Navigate to Configuration > Self-Service > Multi-Factor Authentication > MFA for Endpoints.
  3. Select a policy from the Choose the Policy drop-down. MFA for RD Gateway logins will be enabled for users under the policy you choose. Learn more about creating an OU- or group-based policy.
  4. In the MFA for VPN Logins section, check Select the authenticators required, choose the number of authentication factors to be enforced, and select the authentication methods to be used. The authentication methods listed can also be rearranged by dragging and dropping them until they're in the desired order.
  5. Click Save Settings.

Enabling MFA for RADIUS endpoints in ADSelfService Plus

c. Configuring RD Gateway MFA session limits

You can configure the RD Gateway MFA session limits under Advanced Settings. Ensure that the session is set to at least 60 seconds using the Keep the VPN MFA session valid for __ minutes setting under the VPN Login MFA configuration section. Here, you will also find settings to bypass MFA if ADSelfService Plus is not reachable or if the user is not enrolled.

Step 2: Configuring the Central NPS server

Next, you need to install ADSelfService Plus' NPS extension on the Central NPS server. This extension receives the authentication request from the RDG server and forwards it to ADSelfService Plus.

a. Installing the NPS extension

  1. Next, navigate to Configuration > Self-Service > Multi-Factor Authentication > MFA for Endpoints.
  2. Installing the NPS extension

  3. Click the tooltip icon next to MFA for VPN Logins to display the architecture diagram and download the NPS extension using the link provided in the banner.
  4. Installing the NPS extension

  5. Copy the extension file (ADSSPNPSExtension.zip) to the Central NPS server. Ensure that this is not the RDG server.
  6. Extract the ZIP file and choose a location to save its contents.
  7. Open Windows PowerShell as an administrator and navigate to the folder where the ZIP file’s content is located.
  8. Execute the following command:
  9. PS C:\ > \setupNpsExtension.ps1 < operation >

    where <operation> can be install, uninstall, or update.

    Install: Installs the NPS extension plugin.

    Uninstall: Uninstalls the NPS extension plugin.

    Update: Updates the extension to newer versions and configuration data.

  10. After installation, you will be prompted to restart the NPS (IAS) Windows service. Proceed with the restart.

b. Enabling policy-based MFA on the Central NPS server

If you have set up connection request policiesor network policies while enabling your Central NPS server, you can enforce MFA for RD Gateway logins based on those policies. You can achieve this by editing the NPS Extension registry key on the Central NPS server to ensure that the requests forwarded to ADSelfService Plus by the NPS extension are based on the policy specified.

To enable MFA based on connection request or network policies:

  1. Open the Registry Editor (type regedit in the Run dialog box).
  2. Go to HKEY_LOCAL_MACHINE\SOFTWARE\ZOHO Corp\ADSelfService Plus NPS Extension.
  3. Note:

    • Make a backup of the registry key before editing it.
    • Only members of the local Administrator group will have the privileges to edit this key.
  4. Double-click CRPolicies or NetworkPolicies based on the policy you want to configure.
    • CRPolicies can be used to enforce MFA only for the users who fall under the selected connection request policies.
    • NetworkPolicies can be used to enforce MFA only for the users who fall under the selected network policies.
  5. Enter the name of the policy in the Value Data field. If there are multiple policies, use a semicolon to separate them.
  6. Note:

    When the Connection Request Policies and Network Policies are both configured, an authentication request will be considered for MFA only if both the Connection Request Policies and Network Policies of the RADIUS request match with the ones configured.

    If the policies are not configured, MFA will be enforced for all the successful RADIUS requests sent to the Central NPS server.

  7. Click OK.

c. Configuring the Central NPS server to receive authentication requests from the RDG server

You need to register the RDG server as a RAIDIUS client to the Central NPS server and ensure that the authentication requests forwarded by the RADIUS client are authenticated by the Central NPS server.

Registering the RDG server as a RADIUS client:
  1. Open Network Policy Server on the Central NPS server and navigate to RADIUS Clients > New.
  2. In the New RADIUS Client dialog box that opens, enter a Friendly name that makes the intended use clear and the IP address or DNS Name of the RDG server.
  3. Choose Manual or Generate for the Shared Secret.
  4. Click OK.
  5. Installing the NPS extension

Configuring authentication to be on the Central NPS server:
  1. Navigate to Policies > Connection Request Policy.
  2. Ensure that Authentication settings of the Connection Request Policy is set to Authenticate requests on this server. This will ensure that the authentication requests forwarded from the RDG server are authenticated on the Central NPS server. Since the ADSelfService Plus NPS extension is installed on the Central NPS server, the request will be forwarded to ADSelfService Plus, which will perform the actual authentication using the MFA methods configured in Step 1a.
  3. Installing the NPS extension

  4. Open Active Directory Users and Computers on the Central NPS server and set the Network Access Permission for users using RDP to Control access through NPS Network Policy in their Dial-in properties.

Step 3: Configuring the RDG server

Finally, you need to configure your RDG server to forward authentication requests to the Central NPS server.

  1. Open RD Gateway Manager on your RDG server.
  2. Right-click the RDG server in the left sidebar and click Properties.
  3. Configuring the RDG server

  4. In the pop-up window that appears, go to RD CAP Store.
  5. Select Central server running NPS.
  6. Enter the IP address of the server on which the ADSelfService Plus NPS extension has been installed (the Central NPS server) and click Add.
  7. Configuring the RDG server

  8. Enter the Shared Secret that was configured while adding the RDG server as a RADIUS client to the Central NPS server in Step 2e, select Apply and OK.
  9. Configuring the RDG server

  10. Open the Network Policy Server manager on the RDG server.
  11. Go to RADIUS Clients and Servers > Remote RADIUS Server.
  12. Right-click TS GATEWAY SERVER GROUP and select Properties.
  13. Configuring the RDG server

  14. In the window that appears, select the Central NPS server (i.e., the server where the ADSelfService Plus NPS extension has been installed) and click Edit.
  15. In the Edit RADIUS Server window that appears, go to Load Balancing.
  16. Set the timeout setting as less than or equal to the time set using the Keep the VPN MFA session valid for __ minutes option under Configuration > Self-Service > Multi-Factor Authentication > Advanced Settings in ADSelfService Plus. Ensure that the session time is at least 60 seconds.
  17. Configuring the RDG server

  18. Click Apply and OK.
  19. Go to Policies > Connection Request Policies.
  20. In the section that appears, right-click TS GATEWAY AUTHORIZATION POLICY and click Properties.
  21. Go to Settings.
  22. Select Authentication and ensure that it is set to forward requests to the Central NPS server by selecting Forward requests to the following remote RADIUS server group for authentication.
  23. Configuring the RDG server

  24. Click Apply and OK.

That's it! Now, the connection requests made to the RDG server will be forwarded to the Central NPS server for authentication, and from there to ADSelfService Plus via the NPS extension. Logins will be allowed after successful MFA verification via ADSelfService Plus.

Secure remote access through Microsoft Remote Desktop Gateway with MFA

Get Your Free Trial Fully functional 30-day trial
 

See this feature in action now!

By clicking 'Talk to an expert', you agree to processing of personal data according to the Privacy Policy.

ADSelfService Plus trusted by

Embark on a journey towards identity security and Zero Trust
Email Download Link