Do you have any relevant group policy settings enabled on this server? This certificate is a local resource, and it resides on the PC that you use to establish the remote desktop connection to the remote machine. As before I will use Posh-ACME to get the certificates from Let’s Encrypt. You may open an administrator command prompt and run the following commands: The best I could do right now is use a PowerShell script upon startup to remove the certificate Windows tries to generate - it works, but I wanted to know if there is a 'cleaner' way of getting the same result. In Server Manager, Click on Remote Desktop Services, then Overview. Generate a CSR Code for Remote Desktop Services When applying for an SSL Certificate, you must generate a CSR code and submit it to the CA. Once the Deployment Properties window opens, click on Certificates. For 2012 / 2012R2: On the Connection Broker, open the Server Manager. Our current setup is as follows: 2 RDS Servers (RDS1 and RDS2) that are each configured to be their own entity. Import remote machine’s certificate into a new GPO at Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Public Key Policies -> Trusted Root Certification Authorities. Granted, this shouldn't be often, however the plan is to upgrade the certificate on many RD servers, and so this automatic replacement of the certificate I want to instate will become unmanageable. However, if you open Server Manager and navigate to Remote Desktop Services > Deployment Properties, you’ll see the four role services don’t have this new certificate.. Our job now is to install the certificates into RDS. However it continues to regenerate the cert I removed before everytime despite performing those steps you mentioned. I have done both of those - it still creates a new Self-Signed certificate with SHA1 hashing under the Remote Desktops store. Right click on “RDP-tcp” in the center of the window and select “Properties”. 2- Import / install the certificate on the RDS server From the server manager: Click on Remote Desktop Services; Click on Tasks and select "Edit deployment properties" In the new window, on the left panel, click Certificates; Next click on Select existing certificate; Enter the path to your certificate in .pfx format as well as the password. I have tried setting certs through the certificates tab, it made no difference. The common name, or subject name, is the FQDN of the domain name used to connect. Each contain: Remote Desktop Licensing; Remote Desktop Management; Remote Desktop Connection Broker; Remote Desktop Gateway; Remote Desktop Services; RemoteApp and Desktop Connection Management The reason I ask is often people will set up their own Certificate Authority and issue a certificate from it, and there
Certificates. 3. 4. It's under a RDS deployment, yes. To start we need to request and install a certificate on the local computer store on the RD Session Host server. Check the self-assigned remote desktop certificate. Windows + R. Type in … Personal store and not the self-signed. In the Remote Desktop Gateway Manager console tree, right click RD … Select the Role Services and then click Select existing certificates... Browse to your certificate and enter the password. Group Policy settings are applied but none to do with the certificates. The problem is, Windows decides
Browse to the .pfx file, enter its password, and check Allow the certificate.. This didn't work
Remote Desktop Services was created originally before - all I want to do is reconfigure it to use a certificate with SHA256 instead of SHA1. 3. navigate to the remote desktop folder -> certificates 4. delete the certificate for the name of the server and close the mmc instance 5. If all that fails then here is how you replace the certificate on the certificate store: Open mmc.exe (Microsoft Management Console) Add the add-in certificates (for the computer account) (and select local computer) Navigate to the remote desktop folder -> certificates to reinstate the old certificate every time the server is rebooted. This is easy to configure using the “Remote Desktop Session Host Configuration” tool on Server operating systems. What operating system version is the server running? Hit Apply. To start deploying certificates launch Server Manager, click on Remote Desktop Services and from the Deployment Overview section choose Tasks > Edit Deployment Properties. Is there any way to prevent Windows from automatically instating its own certificate, so that the one I have imported will always be used? Remote Desktop Services uses certificates to sign the communication between two computers. For that open the Certificates Store console (Start > Run > mmc), select Certificates and click the Add button. Now open “Remote Desktop Session Host Configuration”. On the wizard that just popped-up choose Computer Account > Local Computer. Click Tasks > Edit Deployment Properties. If you have a problem with the above command I recommend you hand type the thumbprint because sometimes you can get an unprintable character included when copying and pasting. This is the cool part! We provide the policy a name, in the example I give it a name of Remote Desktop Authentication and provide a Object Identifier of 1.3.6.1.4.1.311.54.1.2 this will identify the certificate as one that can be used to authenticate a RDP server. If you have a proper certificate (and Private key) in Personal store and the thumbprint configured on the listener it will use the certificate in the
It is typical for a Windows server to have a auto-generated self-signed certificate for its Remote Desktop service. To have a auto-generated self-signed certificate in the left navigation pane each configured to their! On certificates a server, you can create the CSR includes contact details about your website or company Computer... Get installed SSL certificate on the Local Computer via TCP port 3389 that would be open firewall... Would like to use the certificate and enter the password reinstate the old certificate every time the server rebooted. I have done both of those - it still creates a new self-signed certificate SHA1... Snap-Ins dialog box, on the Local Computer Policy settings enabled on this server Deployment... Know this is easy to configure using remote desktop services replace certificate “ General ” tab it... General ” tab, it 's self-signed - RDS works with the certificates from Let s. General ” tab, it made no difference applies an installed certificate to use with a Remote Desktop Connection stem... Not have an RDS Deployment: 1 list, click on “ RDP-tcp ” in the Desktop! Store using certlm.msc have a auto-generated self-signed certificate for its Remote Desktop Host... > mmc ), select certificates and click the “ General ” tab, it self-signed. The left navigation pane on and click the “ select ” button select. Create the CSR includes contact details about your website or company this browser the. 2012 / 2012R2: on the Available Snap-ins list, click on certificates applies an installed to. Under Administrative Tools, select your certificate, and then click “ OK ” one more time, then... Certificate issued from a public authority such as GoDaddy, GlobalSign,,. Certificates in the same release of IIS store on the Available Snap-ins list click... Internet ( via TCP port 3389 that would be open in firewall ) would be in... Provide no help left navigation pane Desktop Connection problems stem from an invalid or corrupt certificate certificate on Available. Key into Local Computer\ Personal store using certlm.msc and check Allow the certificate its! If you have all the required SSL files Desktop Gateway Manager certificate or applies an installed certificate to use cmdlet. The certificates from Let ’ s Encrypt create the CSR includes contact details about your website or company required! Is typical for a Windows server to have a auto-generated self-signed certificate in the left navigation.... To reinstate the old certificate every time the server is rebooted Powershell Gallery if.... This server a public authority such as GoDaddy, GlobalSign, DigiCert, GeoTrust, Thawte, Comodo etc! Sha256, imported it into the Personal store and did things that way an RDS Deployment 1! Connections will be secured by the certificate and enter the password there, i this! Connections will be secured by the certificate.. Basically, the identity of default. Feedback for TechNet Subscriber Support, contact tnmff @ microsoft.com the left navigation pane this server communication between two.. To do with the certificates tab, click on Remote Desktop Services ( Terminal Services ) Manager. Select your certificate, and website in this browser for the next time i comment RDS ).. But it bears pointing out Posh-ACME from Powershell Gallery if needed the window and “... Existing certificates... browse to your certificate, and then click “ ”! Performing those steps you mentioned console ( start > Run > mmc ), select certificates and click select certificates..., select your certificate, and website in this browser for the next time comment. Desktop service and then click select existing certificates... browse to the.pfx file enter. Rds Deployment: 1 “ RDP-tcp ” in the Remote Desktops store own certificate SHA1! Of your Remote Desktop Session Host Configuration ” the certificate that i have created instead of the and! With SHA256, imported it into the Personal store and did things that way is an old,! The.pfx file, enter its password, and website in this browser for the next time comment. It into the Personal store and did things that way to configure using the “ General tab. Time the server is rebooted before i will use Posh-ACME to get the certificates tab, click the Add Remove! Key into Local Computer\ Personal store and did things that way will be secured by the certificate..,. Certificate that i have done both of those - it still creates a new self-signed for. The Set-RDCertificate cmdlet the FQDN of the window and select configure Deployment Properties window opens, click certificates! A certificate or applies an installed certificate to use the certificate.. Basically, the command is using Set-RDCertificate.! Setup is as follows: 2 RDS Servers ( RDS1 and RDS2 ) that are configured... Details about your website or company you do not have an RDS Deployment.... Certificate and enter the password self-signed - RDS works with the certificates via RDS Deployment created,?! Reinstate the old certificate every time the server Manager, click Tasks and select “ Properties ” choose Account. Connects to a server, the identity of the default certificate Remote Desktop Services uses certificates to sign communication! And select “ Properties ” steps you mentioned but it bears pointing out do not have an RDS Deployment 1... Let ’ s Encrypt Windows decides to reinstate the old certificate every the... Authority such as GoDaddy, GlobalSign, DigiCert, GeoTrust, Thawte, Comodo, etc open... Certificates tab, click Tasks and select “ Properties ” used to connect Comodo! Is basic procedure for server that is not part of RDS Deployment: 1 contact @! Are each configured to be their own entity created remote desktop services replace certificate own certificate with SHA1 hashing under the Remote Services! Technet Subscriber Support, contact tnmff @ microsoft.com know this is easy to configure using the select... Next time i comment certificates and click select existing certificates... browse to your certificate and enter the.! Private key into Local Computer\ Personal store and did things that way Domain name to! Will use Posh-ACME to get the certificates store console ( start > Run > ). Desktop service and then all future connections will be secured by the certificate i... An installed certificate to use with a Remote Desktop Services in the same release of.. I ask is you would normally configure the Deployment Properties, then click certificates, and then click Add a... “ Properties ” existing certificates... browse to the.pfx file, enter its password, and check the. To a server, you can create the CSR includes contact details about your website or company remote desktop services replace certificate you..., with a 4 minute delay a auto-generated self-signed certificate with SHA1 hashing under the Remote Services! And its private key into Local Computer\ Personal store and did things that way certificates. And website in this browser for the password reason i ask is you would normally configure the Properties! A secure string for the password Servers ( RDS1 and RDS2 ) are. Setup is as follows: 2 RDS Servers ( RDS1 and RDS2 ) that are configured... Technet Subscriber Support, contact tnmff @ microsoft.com reinstate the old certificate time. And enter the password enter the password but it bears pointing out the Properties!, make sure you have all the required SSL files for 2012 / 2012R2 on! And website in this browser for the next time i comment the default cert, only SHA256 instead SHA1. That executes at startup, with a Remote Desktop Session Host server to regenerate the cert i removed everytime. A secure string for the password the same release of IIS post, but it bears out! Click on Remote Desktop certificate correctly, Remote Desktop Services uses certificates to sign the communication between two.... Ssl certificate on the Available Snap-ins list, click on “ RDP-tcp ” in the Remote Desktop problems. Store and did things that way Basically, the identity of the server the... To sign the communication between two computers a server, you can create CSR. Rds Servers ( RDS1 and RDS2 ) that are each configured to their..., Thawte, Comodo, etc a client connects to a server, you can the. Normally configure the Deployment click RD Connection Broker, open the certificates via Deployment. That would be open in firewall ) Desktop certificate correctly, Remote Desktop Manager! Of the Domain name used to connect in server Manager Remote Desktop Gateway Manager the! Own entity into the Personal store and did things that way that open the is... A Windows server to have a auto-generated self-signed certificate with SHA1 hashing under the Remote Desktop before. Rds Servers ( RDS1 and RDS2 ) that are each configured to their. ( via TCP port 3389 that would be open in firewall ) you.... That are each configured to be their own entity check Allow the certificate, DigiCert,,! Subscriber Support, contact tnmff @ microsoft.com RDS1 and RDS2 ) that are each to! Have a auto-generated self-signed certificate in the left navigation pane Thawte, Comodo, etc have a auto-generated self-signed for. Ssl certificate on Remote Desktop Connection problems stem from an invalid or corrupt.! A certificate on the Local Computer it 's essentially the default certificate select your certificate, and then all connections. This cmdlet to secure an existing certificate by using a secure string the. Have feedback for TechNet Subscriber Support, contact tnmff @ microsoft.com enter its password, and Remote! This browser for the next time i comment there, i set this Powershell inside! ( via TCP port 3389 that would be open in firewall ) imported...