Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Why is a user getting "Your remoted desktop connection failed because the remote computer cannot be authenticated."

Posted on 2011-03-22
4
Medium Priority
?
653 Views
Last Modified: 2012-05-11
A while ago I set up MS Access as a Remote App using RD Gateway. All users can connect to the remote app and all users can
connect to remote desktop. Starting today, one of the users could no longer make an RDP connection to the server and was getting the
attached message. What would cause this. It is a mystery to me.  In fact, since he is not using RD Gateway to connect to the server
the certificate should not even come into play. Any ideas?
Picture-3.png
0
Comment
Question by:PDSWSS
  • 3
4 Comments
 
LVL 10

Expert Comment

by:Hutch_77
ID: 35195510
0
 

Author Comment

by:PDSWSS
ID: 35222948
Haven't had a chance to test any of these solutions. Will do soon.
0
 

Accepted Solution

by:
PDSWSS earned 0 total points
ID: 35245539
As it turns out the certificate issuing company had revoked some of our licenses by mistake. When they reversed the error the problem went away.
0
 

Author Closing Comment

by:PDSWSS
ID: 35308489
This is the solution. The expert provided feedback that may have solved a similar issue under different circumstances.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question