Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Remote desktop services with 3rd party ssl certificate

Posted on 2013-02-01
3
Medium Priority
?
612 Views
Last Modified: 2013-02-07
i would like to use a 3rd party ssl certificate with remote desktop services running on a 2008 server.  can i just use any ssl certificate or do i need a special type of certificate?

does anyone have a guide?
0
Comment
Question by:Kylo Ren
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 38846686
yes you can - you need to first install  that cert in your RD Host Server.

Overview of Remote Desktop Session Host Configuration
http://technet.microsoft.com/en-us/library/cc731940.aspx

Configure Server Authentication and Encryption Levels
http://technet.microsoft.com/en-us/library/cc770833.aspx

Note also  for a certificate to be used for RDP it must have Server Authentication ( 1.3.6.1.5.5.7.3.1 )
http://serverfault.com/questions/201451/install-certificate-in-rdp-tcp-properties


If you have RD Gateway or web access, you should check out this
http://blogs.msdn.com/b/rds/archive/2008/12/04/introduction-to-ts-gateway-certificates.aspx
http://terrytlslau.tls1.cc/2011/09/deploying-remote-desktop-gateway-in.html

This is the overall RD links
http://technet.microsoft.com/en-us/library/cc770412.aspx
0
 
LVL 5

Author Comment

by:Kylo Ren
ID: 38866429
thanks. do most certificates have server authentication?
0
 
LVL 65

Expert Comment

by:btan
ID: 38866912
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question