Hello there!

Need Help? We are right here!

miniOrange Email Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Search Results:

×

How to setup Two-Factor Authentication (2FA/MFA) for Windows Logon & RDP



With the pace of password-based security breaches, simply using usernames and passwords to secure a Windows login is no longer an option.That’s why it has become necessary to add an additional layer of two-factor authentication security to filter out unauthorised users.
miniOrange's Windows Two-Factor Authentication solution for windows logon prevents these sorts of Password-Based breaches and adds an additional layer of security to your Microsoft Windows account login.

Enabling Windows 2FA / MFA always verifies identities before allowing access, making it more difficult for unauthorized users to gain access to your Microsoft Windows account. miniOrange Credential Provider can be installed on Microsoft Windows Client and Server operating systems to enable the Two-Factor Authentication to Remote Desktop (RDP) and local Windows Login.
Windows 2FA solution is also responsible for your User Management with a Microsoft Active Directory or an LDAP directory. With this 2FA / MFA solution, users will get easy access to the endpoints they need to access by increasing identity assurance and reducing the risk and exposure. You can also enable offline access accordingly for secure authentication. miniOrange's advanced MFA solution organizations are able to get secure access to all work applications, for all their users, from anywhere, with any device they choose.





miniOrange 2FA Credential Provider for Windows Logon and Remote Desktop (RDP) access supports following Multi-Factor Authentication (MFA) Methods:-

Authentication TypeMethodSupported
miniOrange Authenticator Soft Token
miniOrange Push Notification
Mobile Token Google Authenticator
Microsoft Authenticator
Authy Authenticator
SMSOTP Over SMS
SMS with Link
EmailOTP Over Email
Email with Link
Call VerificationOTP Over Call
Hardware Token Yubikey Hardware Token
Display Hardware Token
System Requirements for miniOrange Two-Factor Authentication (2FA / MFA) Credential Provider

miniOrange Credential Provider for Windows Logon and RDP Access supports both client and server operating systems.

    Supported Microsoft Windows Client versions:

  • Windows 7 SP1
  • Windows 8.1
  • Windows 10
  • Windows 11

  • Supported Windows Server versions(GUI and core installs):

  • Windows Server 2008 R2 SP1
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022

Get Free Installation Help - Book a Slot


miniOrange offers free help through a consultation call with our System Engineers to Install or Setup Two-Factor Authentication (2FA) for Windows Logon and RDP solution in your environment with 30 days trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you setting it up in no time.



How Windows Logon 2FA Works


Windows 2FA/MFA Login 
          architecture flow


Prerequisites for Windows MFA

  • .NET Framework 4.8
  • miniOrange Cloud Account or Onpremise Setup.
  • Enroll Users in miniOrange before Configuration:
    1. The username of the user in miniOrange should be the same as in Windows Username.
    2. This is required so that the service can prompt the appropriate 2FA for the customer based on the defined policy and provide secure access to machine/RDP.
    3. There are multiple methods to add users in miniOrange.
      1. Admin can add end users
      2. Setup user provisioning from your existing identity source or Active directory.

Step by step guide to setup Two-Factor Authentication (2FA/MFA) for Windows Logon

1. Download 2FA Module

2. Setup your miniOrange dashboard for Windows 2FA

In this step, we are going to setup your 2FA preferences, such as:

  • Which users should be asked for 2FA during windows logon.
  • What 2FA methods can they use.

2.1 Adding app and policy for 2FA

  • Login into miniOrange Admin Console.
  • Go to Apps and click on Add Applicaton button.
  • Windows login 2FA /MFA add app

  • In Choose Application Type click on Create App button in Desktop application type.
  • Windows login 2FA /MFA select Desktop as application type

  • Add Windows app on miniOrange.
  • RDP 2FA/MFA add Windows App

  • Add App Name.
  • Windows and RDP Two-Factor Authentication (2FA/MFA) mention app name

  • Select Login Method as Password and Enable 2-Factor Authentication (2FA).
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Click on Save.

2.2 Choose which 2FA options the users can use

3. Setup miniOrange Two-Factor Authentication (2FA/MFA) Credential Provider for Windows Logon

  • Open miniOrange 2FA Configuration in Start Menu

  • Windows 2FA/MFA configure credential provider

  • Make sure "miniOrange service" status is running and in the "Credential Provider/GINA status" section the "Registered" and "Enabled" are "Yes". If any of these are not as intended, see this FAQ to fix it
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

    3a : Integrate the module to miniOrange account.

  • Click on Plugin Selection, Double Click on miniOrangeunder plugin Name.
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • A 2FA Configuration form will open up
  • Note:

    If you’re using Onpremise IDP application, please replace the IDP Server URL with base URL of your Onpremise IDP application and make sure that URL is accessible from this machine. You can also use the IP of the server where the IDP application is hosted.


    Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • To fill in these details, login to your miniOrange admin account on Cloud orOnpremise.
  • Click on the Settings cog on top right and select Product Settings
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Copy the Customer Key and API key
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Now, Go to Apps and copy the name of the Windows application created in step 2.
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Paste all these details in the form and click on Save. Leave the checkboxes as it is. More about them later.
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

    3b. Test MFA

    Note:

    Please make sure that at this point the user with same username as windows exists in miniOrange and has 2FA set up.
    For instructions on setting up 2FA from Self Service Console, see this link .


  • Click on Test MFA button
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Enter your machine username which is also present in miniOrange and click on Test MFA
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • You will be prompted to select one of the 2FA methods you’ve configured. Select one method and click on Next
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Provide validation,
    1. If asked for OTP, enter OTP and click on Login.
    2. Windows Remote Desktop Protocol (RDP) 2FA/MFA

      OR

    3. If asked for approval through Push notification, Accept the Push notification on your phone
    4. Windows Remote Desktop Protocol (RDP) 2FA/MFA

    5. After Successful Validation, you’ll see a Test Successful message
  • 3c. Configure Domain

    Note:

    Skip this step if you’re not configuring this on a domain joined machine


  • In Plugin Selection tab, Double click on Domain User Login
  • Replace the domain name with your AD domain used before the username.
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • To check your domain name, you can also use the command: SET USERDOMAIN
  • Click on Save.

4. Use miniOrange MFA during login

  • You should see the miniOrange login page after locking the computer or signing Enter your username and password.
  • Note: The logo and Message on login page can be customized from the General tab in miniOrange configuration

    Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • If you’re using RDP, make an RDP connection using username and password
  • You’ll see the 2FA prompt. Proceed with selecting a 2FA option and validating it.
  • You will be logged into your account.
  • a. Disable other login methods (Optional):

  • Go to Credential Provider Options tab.
  • Check the box “Force miniOrange 2FA on Logon”
  • Windows Remote Desktop Protocol (RDP) 2FA/MFA

  • Click on Apply

5. Deployment using Group Policy

For Deployment and Configuration using Group Policy, please see our miniOrange 2FA for Windows Logon Group Policy Documentation.

Further References

miniOrange Credential Provider for Remote Desktop (RDP) and Windows Logon

The user initiates the login to Windows or Remote Desktop Service either through a Remote Desktop Client or via the RD Web login page from his browser, after which the RADIUS request is sent from the miniOrange RD Web component installed on the target machine to the miniOrange RADIUS server, which authenticates the user via Local AD, and after successful authentication, 2-factor authentication of the user is invoked. After the user validates himself, he is granted access to the Remote Desktop Service (RDP).


A user can try to connect to RDS (Remote Desktop Protocol (RDP)) via 2 ways :

  • RDC - Remote Desktop Client: If the RemoteApp is launched through a Remote Desktop client application, the users validate their 2-factor authentication while they enter the Username and Password to get access to the resources. (as this method doesn't support access-challenge response, only out of band authentication methods are supported ).
  • RD Web Access - RD login page via browser: If the desktop or RemoteApp is launched through a RD Web Login page, the initial user authentication is done from the machine's AD, after which miniOrange challenges the user for 2-factor authentication via a RADIUS challenge request. After the users correctly authenticate themselves, they get connected to their resources.
  • RD Gateway: If the organizations resources or server are protected by a Remote Desktop Gateway, you can setup MFA on top of that as well. First level authentication witll be done using the AD credentials and then miniOrange will prompt for the configured MFA.
    Check the guide to setup Remote desktop Gateway MFA (RD Gateway MFA/2FA)

Two-Factor Authentication (2FA/MFA) for RDS via RD Web

How it works

  • In this case, the user goes to RD Web login page from his browser to connect to the Remote Desktop Service. He enters his Username and Password, and on submission, the RADIUS request from RD Web component installed on target machine is sent to the miniOrange RADIUS server which authenticates the user via local AD in the target machine.
  • Once authenticated, it sends a RADIUS challenge to RD Web, and the RD Web shows OTP screen on browser now. Once the user enters the One Time Passcode, the miniorange IdP verifies it and grants/denies access to the RDS.
  • With this, after the user is connected to the Remote Desktop Service, the user can also gain access to published remote app icons on his browser screen, since the session has already been created for the user. Know more about Remote Desktop (RD) Web MFA

RDS via RD Web demonstration user flow

Additional Resources :

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products