Implementing SSL for RDP connection (RDP listener on the RD session host)


hi,

we have win2008 r2 server rd session host role. accessible rdp public internet under globally-visible dns name in .com domain. server member of active directory domain (dns suffix domain internal, non-public-visible, ending .local ).

now implement ssl certification rdp server, clients connecting outside not certificate warning on connect.

by mean of iis7, created certificate signing request external dns name of server, , signed @ alphassl free/trial certificate valid 45 days. completed certificate signing alphassl reply, , installed certificate iis7. can access external dns name https iis7 default page, , browsers site trusted. certification path starts globalsign, under alpha ca, under our cert domain.

next step, trying install same certificate in properties of rdp-tcp connection of rd session host, instead of auto-generated cert. there default. on clicking 'select', allows pick certificate list (its eku attributes 'server authentication (1.3.6.1.5.5.7.3.1) , client authentication (1.3.6.1.5.5.7.3.2)') , shows active. then, on connection attempt rdp client (usual mstsc included windows 7 prof.), warning "the certificate not valid usage".

then re-tried, having got free/trial certificate same dns name comodo/essentialssl (or instantssl). certification path bit longer : usertrust/comodoca/essentialssl ca/our one. eku contains : server authentication (1.3.6.1.5.5.7.3.1), client authentication (1.3.6.1.5.5.7.3.2), unknown key usage (1.3.6.1.4.1.311.10.3.3) , unknown key usage (2.16.840.1.113730.4.1). used same iis7 dialogs create/complete certificate request. , yes, cert. possible assign rdp-tcp connection, still not valid rdp-tcp usage.

now want ask experts, doing wrong, details overlook , have in different, correct way, obtain certificate usable rdp , signed known ssl trust vendor ?

is problem in eku ? in long certification path ? iis7 form restricted cert.sign.request ?

how should form cert.sign.request on side ? should bring certificate services in domain proper certificate request templates ?
should demand specific ssl vendor when buying certificate them (to make usabel rdp) ? should sign cert.serv. root @ ssl vendor simple purpose ? (i afraid going cost money afford)

thank in advance competent , useful replies .

hi,

the oids (1.3.6.1.4.1.311.10.3.3 & 2.16.840.1.113730.4.1) said in essentialssl trial indicate sgc cert.  possible 1 or more of certs in chain alphassl trial cert sgc cert well.  based on reading thread kristin referred explain problem seeing windows 7 clients.

i recommend obtain ssl certificate not sgc certificate , not have sgc certificates in chain.  example, can purchase standard non-sgc ssl certificate godaddy for $12.99/year.  godaddy certificate has 1 intermediate certificate in addition root.  $12.99 price google godaddy $12.99 ssl , click on link.

another alternative rapidssl certificate www.rapidsslonline.com.  low $10.99/year , issued directly root certificate (geotrust), in other words, no intermediate cert.  offer 30-day money guarantee.  not sgc certificate, , root not sgc certificate. 

there other providers are cheaper or free  (startssl), however, have not tested them.

if need secure multiple servers/rds roles should consider wildcard certificate (as low $99/year), or ucc/san certificate ($60/year).  if of rds servers/roles can under single domain wildcard convenient.  because can add new server names needed , still use same certificate all.  if have older rd client versions in environment ucc or wildcard may cause problems.

-tp



Windows Server  >  Remote Desktop Services (Terminal Services)



Comments

Popular posts from this blog

Error: 0x80073701 when trying to add Print Services Role in Windows 2012 Standard

Disconnecting from a Windows Server 2012 R2 file sharing session on a Windows 7,8,10 machine

Windows 2016 RDS event 1306 Connection Broker Client failed to redirect the user... Error: NULL