![]() I don't find any solution to force rdp client to modify default authentification and enable NTLM auth.īut apparently, with RDP client and when I try to connect to the Remote Desktop Gateway, it's not the process mstsc it's connect to RDG but it's LSASS with try to Kerberos authentification.įor example, this is a connexion from Windows 8. ![]() Now, rdp client force to used Kerberos authentification but RDG doesn't support it. It's work good with a lot of differents versions of Windows (7, 8, 8.1, 10 "1607") but not with the last version of Windows 10 (1703) named creators update.Īpparently, Microsoft decide to change authentification in rdp client (mstsc.exe or activex rdp). There are a wide range of RDP properties that can be set, such as for device redirection, display settings, session behavior, and more. We used BIG IP APM 11.6.1 HF2 and we configure APM with RDG to centralize rdp access. Device redirection Display settings RemoteApp Organizations can configure Remote Desktop Protocol (RDP) properties centrally in Remote Desktop Services (RDS) to determine how a connection should behave.
0 Comments
Leave a Reply. |