Need Help? We are right here!
Remote Desktop Services (RDS) is the platform of choice for building virtualization solutions for every end customer need, including delivering individual virtualized applications, providing secure mobile and remote desktop access, and providing end users the ability to run their applications and desktops from the cloud. Remote Desktop Services (RDS) uses the Remote Desktop protocol. Microsoft's Remote Desktop Protocol (RDP) is a secure network communications protocol. It allows network administrators to troubleshoot problems that particular users are having remotely, as well as providing users with remote access to their actual workstation PCs.
As most people are working from home and required to access their workstations. It is very important to have second-factor authentication. miniOrange provides easy to setup solution for Your Virtual Desktop. miniOrange provides easy to setup solution for your Remote Desktop Services (RDS). After entering your username and password as the first factor for RDS MFA, you will have to enter the second factor which will authenticate you to use your machine virtually. MiniOrange provides 15+ MFA methods like OTP over SMS, Email, Google/Microsoft Authenticator, Hardware tokens and many more.
Make sure your Remote Desktop service (RDS) is configured properly in your environment. The standard authentication process for Remote Desktop Services (RDS) with an active directory should be working properly.
miniOrange also supports MFA for Windows Logon and RDP. You can configure MFA over domain-joined machines as well as standalone machines. Click the above link to know more details.
If you are having Linux systems and want to enable MFA for Linux login & SSH access, please visit miniOrange Linux MFA.
Remote Desktop Gateway (RD Gateway or RDG) is a secure encrypted connection for access and managing the remote access to servers and internal resources using RDP protocol. RD Gateway gives better control and management of resources and servers for end-users accessing outside the organization’s firewall. With miniOrange, you can enable 15+ MFA methods like OTP over SMS/email, push notifications, TOTP-based soft tokens, etc. for RD Gateway.
Click here to get more detailed information about miniOrange's RD Gateway MFA solution.
Microsoft Remote desktop Web Access (RD Web Access) is used in remote desktop services to get access to remote Windows machines and servers using a web browser or from the Start menu. Enable miniOrange MFA over RD web for your end-users for remote access. The first level of authentication will be done from the Active directory and then the user will be prompted for the second factor (2FA / MFA). miniOrange helps to improve the security of the servers and resources of your organization.
Click here to get more detailed information about miniOrange's RD Web Access MFA solution.
miniOrange supports the latest HTML5-based RD web client for enabling MFA for remote access of users. There will be no change in the primary authentication (username and password) using the on-premise active directory, and only an additional MFA will be asked of the user. Enable 15+ MFA methods for your end-users will be using the remote desktop services (RDS). User registration and setting up MFA can be managed using the miniOrange self-service console. Custom groups and policies can be set up for RDS MFA based on the organization's requirements.
VDI is a desktop-centric service that hosts user desktop environments on remote servers and storage systems, which are accessed over a network using a remote display protocol. Enterprises are converting physical desktops to Virtual Desktop Infrastructure (VDI) since it provides efficient hardware utilization and centralized management while reducing costs.
Due to the COVID-19, many companies need to find some ways to enable remote working. VDI solution is one of their choices. Remote Desktop Services (RDS) can provide a quick win VDI solution but it still need to spend efforts to setup for some authentications and security settings, e.g. MFA. For some SME companies, they may not have their own RADIUS (Remote Authentication Dial-In User Service) server and OTP (one-time password) server to enable Two Factor Authentication 2FA/MFA. miniOrange provides a ready to use Two-Factor Authentication - 2FA solution for RDS/RDP/RD Web/RD Gateway using RADIUS Server which enables an extra layer of authentication to RDS/RDP/RD Web/RD Gateway logins & ensures that you roll out secure access to your employees within minutes.
To use miniOrange Two-Factor Authentication (2FA/MFA) you can enable RADIUS authentication in Remote Desktop Services (RDS) and configure policies in miniOrange to enable or disable Two-Factor Authentication 2FA for users.
The 2-factor authentication can be of two types depending on the Application.
miniOrange provides user authentication from various external directories such as miniOrange Directory, Microsoft AD, Azure Active Directory/LDAP, AWS Cognito and many more.
Can't find your Directory? Contact us on email@example.com
|Client Name:||Any name for your reference.|
|Client IP:||IP address of VPN server which will send Radius authentication request.|
|Shared Secret:||Security key.
For Eg. "sharedsecret"
(Keep this with you, you will need to configure same on VPN Server).
|Do not Support Challenge:||Keep this Unchecked.|
|Group Name:||Group for which the policy will apply.|
|Policy Name:||Any Identifier that specifies policy name.|
|Login Method||Login Method for the users associated with this policy.|
|Enable 2-Factor Authentication||Enables Second Factor during Login for users associated with this policy.|
|Enable Adaptive Authentication||Enables Adaptive Authentication for Login of users associated with this policy.|
Only For On-Premise Version
Step 1: Open Firewall Ports.
|Label||The name of this configuration. Eg:miniOrange Radius|
|Hostname/Address||For on-premise version: IP of server where IDP(miniOrange) is installed
For cloud version: Contact us at firstname.lastname@example.org to get the IP
|Authentication Port||Enter 1812 (or whichever port configured on your miniOrange Authentication Proxy).|
|Authentication type||Must be PAP.|
|Shared secret code||Enter the Shared secret that we used to configure RADIUS app in miniOrange IDP.
In step 1 we configured the shared secret as "sharedsecret"
|Server timeout (in seconds)||Increase the timeout to 90 seconds.|
|Max attempts||Number of times to send authentication request. Must be 1.|
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Okta, Shibboleth, Ping, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more. You can configure your existing directory/user store or add users in miniOrange.
1. Create User in miniOrange
2. Bulk Upload Users in miniOrange via Uploading CSV File.
Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.
|Activate LDAP||All user authentications will be done with LDAP credentials if you Activate it|
|Sync users in miniOrange||Users will be created in miniOrange after authentication with LDAP|
|Fallback Authentication||If LDAP credentials fail then user will be authenticated through miniOrange|
|Allow users to change password||This allows your users to change their password. It updates the new credentials in your LDAP server|
|Enable administrator login||On enabling this, your miniOrange Administrator login authenticates using your LDAP server|
|Show IdP to users||If you enable this option, this IdP will be visible to users|
|Send Configured Attributes||If you enable this option, then only the attributes configured below will be sent in attributes at the time of login|
Refer our guide to setup LDAPS on windows server.
miniOrange integrates with various external user sources such as directories, identity providers, and etc.
Our Other Identity & Access Management Products