Need Help? We are right here!
In this setup guide, we will configure Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) for Remote Desktop Services (RDS). This additional layer of security helps protect your RDS environment from unauthorized access by requiring users to provide two or more authentication factors.
By implementing 2FA/MFA for Remote Desktop Service (RDS), you enhance the overall security of your remote desktop access. It significantly reduces the risk of unauthorized access, as it becomes much harder for attackers to bypass the additional authentication layer. This helps protect sensitive data and mitigates the chances of successful brute-force attacks or compromised credentials.
It is very important to have second-factor authentication. miniOrange provides easy to setup Two-Factor Authentication (2FA) solution for your Virtual Desktop and easy to setup solution for your Remote Desktop Services (RDS). After entering your username and password as the first factor for Remote Desktop Services (RDS) MFA, you will have to enter the second factor which will authenticate you to use your machine virtually. MiniOrange provides 15+ MFA methods like OTP over SMS, Email, Google/Microsoft Authenticator, Hardware tokens and many more.
Be Cyber Insurance compliant with miniOrange MFA solution. Read More
miniOrange offers free help through a consultation call with our System Engineers to Install or Setup Remote Desktop Services (RDS) MFA / 2FA (Two-Factor Authentication) solution in your environment with 30 days Free trial.
For this, you need to just send us an email at email@example.com to book a slot and we'll help you setting it up in no time.
Remote Desktop Gateway (RD Gateway or RDG) is a secure encrypted connection for access and managing the remote access to servers and internal resources using RDP protocol. RD Gateway gives better control and management of resources and servers for end-users accessing outside the organization’s firewall. With miniOrange, you can enable 15+ MFA methods like OTP over SMS/email, push notifications, TOTP-based soft tokens, etc. for RD Gateway.
Get more detailed information about miniOrange's RD Gateway MFA solution.
Microsoft Remote desktop Web Access (RD Web Access) is used in remote desktop services to get access to remote Windows machines and servers using a web browser or from the Start menu. Enable miniOrange MFA over RD web for your end-users for remote access. The first level of authentication will be done from the Active directory and then the user will be prompted for the second factor (2FA / MFA). miniOrange helps to improve the security of the servers and resources of your organization.
Get more detailed information about miniOrange's RD Web Access MFA solution.
miniOrange supports the latest HTML5-based RD web client for enabling MFA for remote access of users. There will be no change in the primary authentication (username and password) using the on-premise active directory, and only an additional MFA will be asked of the user. Enable 15+ MFA methods for your end-users will be using the remote desktop services (RDS). User registration and setting up MFA can be managed using the miniOrange self-service console. Custom groups and policies can be set up for RDS MFA based on the organization's requirements.
VDI is a desktop-centric service that hosts user desktop environments on remote servers and storage systems, which are accessed over a network using a remote display protocol. Enterprises are converting physical desktops to Virtual Desktop Infrastructure (VDI) since it provides efficient hardware utilization and centralized management while reducing costs.
Due to the COVID-19, many companies need to find some ways to enable remote working. VDI solution is one of their choices. Remote Desktop Services (RDS) can provide a quick win VDI solution but it still need to spend efforts to setup for some authentications and security settings, e.g. MFA. For some SME companies, they may not have their own RADIUS (Remote Authentication Dial-In User Service) server and OTP (one-time password) server to enable Two Factor Authentication 2FA/MFA. miniOrange provides a ready to use Two-Factor Authentication - 2FA solution for RDS/RDP/RD Web/RD Gateway using RADIUS Server which enables an extra layer of authentication to RDS/RDP/RD Web/RD Gateway logins & ensures that you roll out secure access to your employees within minutes.
To use miniOrange Two-Factor Authentication (2FA/MFA) you can enable RADIUS authentication in Remote Desktop Services (RDS) and configure policies in miniOrange to enable or disable Two-Factor Authentication 2FA for users.
The 2-factor authentication can be of two types depending on the Application.
miniOrange provides user authentication from various external directories such as miniOrange Directory, Microsoft AD, Azure Active Directory/LDAP, AWS Cognito and many more.
Can't find your Directory? Contact us on firstname.lastname@example.org
|Client Name:||Any name for your reference.|
|Client IP:||IP address of VPN server which will send Radius authentication request.|
|Shared Secret:||Security key.
For Eg. "sharedsecret"
(Keep this with you, you will need to configure same on VPN Server).
|Do not Support Challenge:||Keep this Unchecked.|
|Group Name:||Group for which the policy will apply.|
|Policy Name:||Any Identifier that specifies policy name.|
|Login Method||Login Method for the users associated with this policy.|
|Enable 2-Factor Authentication||Enables Second Factor during Login for users associated with this policy.|
|Enable Adaptive Authentication||Enables Adaptive Authentication for Login of users associated with this policy.|
Only For On-Premise Version
Step 1: Open Firewall Ports.
|Label||The name of this configuration. Eg:miniOrange Radius|
|Hostname/Address||For on-premise version: IP of server where IDP(miniOrange) is installed
For cloud version: Contact us at email@example.com to get the IP
|Authentication Port||Enter 1812 (or whichever port configured on your miniOrange Authentication Proxy).|
|Authentication type||Must be PAP.|
|Shared secret code||Enter the Shared secret that we used to configure RADIUS app in miniOrange IDP.
In step 1 we configured the shared secret as "sharedsecret"
|Server timeout (in seconds)||Increase the timeout to 90 seconds.|
|Max attempts||Number of times to send authentication request. Must be 1.|
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Okta, Shibboleth, Ping, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more. You can configure your existing directory/user store or add users in miniOrange.
1. Create User in miniOrange
2. Bulk Upload Users in miniOrange via Uploading CSV File.
Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.
|Activate LDAP||All user authentications will be done with LDAP credentials if you Activate it|
|Sync users in miniOrange||Users will be created in miniOrange after authentication with LDAP|
|Fallback Authentication||If LDAP credentials fail then user will be authenticated through miniOrange|
|Allow users to change password||This allows your users to change their password. It updates the new credentials in your LDAP server|
|Enable administrator login||On enabling this, your miniOrange Administrator login authenticates using your LDAP server|
|Show IdP to users||If you enable this option, this IdP will be visible to users|
|Send Configured Attributes||If you enable this option, then only the attributes configured below will be sent in attributes at the time of login|
Refer our guide to setup LDAPS on windows server.
miniOrange integrates with various external user sources such as directories, identity providers, and etc.
Our Other Identity & Access Management Products