SecSign ID Plugin: Windows Remote Desktop

2019-11-12 5 minutes to read
Tutorial Index

Two-Factor Authentication for Windows Remote Desktop

Secure Logins have never been so easy Introducing SecSign ID for Windows Remote Desktop logins. Protect access with our simple touch authentication and intuitive authentication rules, defined by you. Compliance can easily be enforced and attacks to your company logins are rendered impossible.

This article gives an overview of securing your Remote Desktop Login with two-factor authentication. For a detailed tutorial on how to integrate two-factor authentication with your Remote Desktop setup, have a look at the plugin tutorial.

Overview

Overview

The following video gives an overview on the authentication process. The complex process can easily be integrated in a few simple steps.

Integration in your setup

Integration of the plugin into your setup

SecSign ID Integration

Please configure your desired integration of the SecSign ID Two Factor Authentication

Choose a system, where you want to add the secure login

Do you need your own ID Server inside your protected network or prefer if we manage and maintain it for you

The location to save the assigned SecSign IDs to a user account or the IDM alltogether

System to protect
?
The System you want to protect - Choose a system, where you want to add the secure login
SecSign ID Server location
?
Do you need your own ID Server inside your protected network or prefer if we manage and maintain it for you
User account location
?
The system to save the assigned SecSign IDs to a user account or the IDM alltogether
edit the settings to change the integration
Authentication
2FA
2FA blind
2FA no AP
2SA
2SA no AP
2SA blind
OTP
Enrollment
Custom ID
Pattern
IDP Custom Website
Enrollment initiated by SP
Enrollment with IDM
Show Network
Hide Network
Fullscreen
Request Solution
x
The authentication was successful


Authentication

Authentication procedure

With the SecSign ID Two-Factor Authentication the user can log in to Remote Desktop in just one convenient and quick step – without inconvenient and complex codes.
To login the user simply needs to provide user credentials like he is used to, and select the displayed symbol in his mobile app – that’s it. Next level security with minimal complexity.

If required you can choose mobile or Email OTP (one-time passwords) as alternative authentication option.

Enrollment

Enrolling your users for 2FA

You have several options to enroll your users for 2FA with SecSign. Most commonly, the 2FA ID should be identical to the Windows user name (for example sAMAccountName or userPrincipalName), and only successfully authenticated (user name and password) users should be able to create a 2FA account.
With SecSign enrollment of your users is quick and convenient for both the user and the administrator.

To enroll your users for 2FA based off your Active Directory you have two options: With Schema Extension to add a 2FA attribute to the user in the Active Directory, or without Schema Extension and read-only access from the SecSign ID Server.

For both options the enrollment procedure can either proceed via the Custom ID App or a custom landing page for the users to enroll.

Enrolling your users for 2FA with a custom app
Enrolling your users for 2FA with a custom landing page

The Tutorial on how to enroll your Active Directory users is available here

Integration

Integration Tutorial for the 2FA plugin

Windows Login: Prerequisites

The SecSign ID Credential Provider looks up the SecSign ID user name of a Windows user in the Active Directory of the Windows domain. Therefore:

  • The PC on which the credential provider is install must be member of a Windows domain and
  • The SecSign ID Login following the password login is active for those users that have a SecSign ID user name added to their user attribute as well as for those users that are members of a pre-configured 2FA user group in the Windows Active Directory.
    All other users will only need the login with a Windows password and no 2FA. Section 1 describes the required Active Directory setup.

2FA for MS Remote Desktop Web Access

Microsoft’s Remote Desktop Web Access service allows to run published Windows applications from a browser. If the SecSign ID log-in has been added to the RD Web Access site then after the usual log-in with Windows user name and password a second page asks for confirmation of the log- in using SecSign ID:

MS Remote Desktop Web Access: Installation

Log-in using a domain administrator account an the Windows Server which has the RD Web Access role. Then run SecSign-RD-WebAccess-Setup.exe:

  • Run regedit.exe.
  • Open HKEY_LOCAL_MACHINE\SOFTWARE\SecSign\RDWebAccess.
  • Set SecSignIDServerHostName and SecSignIDServerPort to the host name and port of your SecSign ID Server. You will find the port number in the properties files of your SecSign ID Server in the line secsignidserver.port=… .
  • If you have a second SecSign ID Server enter its host name and address in FallbackSecSignIDServerHostName and FallbackSecSignIDServerPort. Otherwise, you may enter the values of the primary SecSign ID Server again.
  • The values configured in ServiceAddressForSecSignApp and ServiceNameForSecSignApp will be displayed in the user’s SecSign App during a log-in.
  • SharedSecretWithRDGateway shall contain any random bytes. Please type any arbitrary characters here but make sure that the length remains 64 bytes.
  • After installing the SecSign ID plug-in for Microsoft Remote Desktop Gateway the shared secret has to be copied there. The SecSign ID RD Web Access plug-in uses the secret to sign a gateway access token which it inserts into the RDP files of each published application. The SecSign ID RD Gateway plug-in will validate the signature using the same secret.

    Finally, open your RD Web Access URL in a browser, log-in using your Windows user name and password and test the SecSign ID log-in. If anything fails the Windows Event Log will contain more information in Windows Logs → Application with the source SecSign ID RD Web Access.

    2FA for Microsoft Remote Desktop Gateway

    The SecSign ID log-in integration into RD Web Access alone only protects the RD Web Access log-in in a browser. A user who knows the necessary details to create an RDP file could log-in directly at the RD Gateway using the Remote Desktop Client. Furthermore, users could download RDP files generated by RD Web Access and use them again later without logging in at the RD Web Access site again.

    The SecSign ID PAA (pluggable authentication and authorization) plug-in for Microsoft’s Remote Desktop Gateway prevents the aforementioned unwanted direct log-ins at the RD Gateway. To achieve this, the SecSign ID plug-in validates the signature of the gateway access token which has been inserted into the RDP file by the SecSign ID RD Web Access plug-in after a successful SecSign ID log-in at the RD Web Access site using a browser.

    • Log-in using a domain administrator account an the Windows Server which has the RD Gateway role.
    • Run SecSign-RD-Gateway-Setup.
    • Run regedit.exe.
    • Open HKEY_LOCAL_MACHINE\SOFTWARE\SecSign\RDGatewayAuthentication.
    • SharedSecretWithRDWebAccess has to contain exactly the same 64 bytes as the respective
      value SharedSecretWithRDGateway in the adjacent registry key RDWebAccess.
    • AccessTokenMaxAgeSeconds defines for how many seconds after a RD Web Access log-in the generated RDP files are allowed to run the published applications. The remote desktop client’s connection to the RD session host remains open for a certain time. During this time the opening of published applications is still possible even if AccessTokenMaxAgeSeconds has expired already. A user may always generate fresh RDP files by reloading the RD Web Access page in his browser. Only someone you downloads and copies an RDP file cannot use it after the RD Web Access log-out or on another computer when AccessTokenMaxAgeSeconds has expired.

    The Windows Event Log will contain information about SecSign ID log-ins in „Windows Logs → Application“ with the source „SecSign ID RD Gateway“.

    Secure Windows

    Securing all Windows access points with SecSign ID 2FA

    For more information about the individual Windows Plugins select your user case below.



    AD/LDAPView Tutorial


    Windows User Login View Tutorial


    Office 365 View Tutorial


    Remote Desktop View Tutorial


    RD Gateway View Tutorial


    VPN/Radius Proxy View Tutorial

    Your own ID-Server

    On premise installations of SecSign ID offer the flexibility to connect with your preferred servers, services, and devices. And you can customize the SecSign ID with your own organization’s branding.

    Learn More
    On Premise 2FA ID

    Latest Blog Posts, Updates & Features

    Options for secure SSO for Atlassian products

    Options for securing Atlassian SSO Your users and passwords and services are all over the place? You want to simplify your security and authentication setup but you don’t know where to start? Move beyond your authentication ...

    Mehr Lesen

    Multi-Factor Authentication powered IdM/IAM

    Multi-Factor Authentication powered IdM/IAM with SecSign ID Your users and passwords and services are all over the place? You want to simplify your security and authentication setup but you don’t know where to start? Move bey ...

    Mehr Lesen

    Atlassian JIRA and Confluence Two-Step Authentication and IP-SafeZone

    With SecSign ID you can protect all your logins with a secure Two-Factor Authentication based on a challenge response. The authentication offers the highest protection for the company data while being incredibly simple to us ...

    Mehr Lesen