If what you are looking for is more security for your RDP Connections, you can implement the following solutions:Īs you can see, you have some substitutive security controls that can help you secure your RDP connection. ![]() Integrate your Remote Desktop Gateway infrastructure using the Network Policy Server (NPS) extension and Azure AD**.**- Remote Desktop Gateway and Azure Multi-Factor Authentication Server using RADIUS You should make some huge changes to your infrastructure to achieve that. There is no direct way to activate MFA for RDP Connection. Hi you for asking this question on the **Microsoft Q&A Platform. This will help us and others in the community as well. Please " Accept the answer" if the information helped you. So, you must choose Phone Call or Authenticator App notification (not Authenticator App with Code) and the SMS method won't work in this case. Note: The MFA method that you choose must not require users to input any type of code/OTP for 2nd factor of authentication as the Remote Desktop Connection doesn't provide you with an option to enter a code. Once the above prerequisites are checked, you can follow Integrate your Remote Desktop Gateway infrastructure using the Network Policy Server (NPS) extension and Azure AD for step-by-step instructions. Azure Active Directory synched with on-premises Active Directory.NPS Server with NPS Extension installed.The purpose of the NPS extension is to translate the NPS RADIUS calls to REST (HTTPS) calls that Azure AD supports and directly leverage the Azure AD MFA, without needing to have on-prem MFA server. ![]() Now you don't need to install the MFA Server software on any of your servers and can directly use the Azure MFA Service to trigger MFA when RDPing to your Windows machines, with the help of NPS Extension. You can achieve these requirements by using Azure AD MFA Service, which is different from Azure MFA Server.
0 Comments
Leave a Reply. |