Solved

"The CA Root certification is not trusted" when trying to use remote application (RDT)

Posted on 2014-01-07
8
525 Views
Last Modified: 2014-01-08
I am trying to run a remote application outside the network via wireless internet connection; the mde file is stored locally on the terminal server. The problem is I get the following error when I try to connect.. Your Remote Desktop commotion failed because the remote computer cannot be trusted…………..The CA Root certification is not trusted; install this certificate in the trusted root certification authority’s store. Is there a way to bypass this
0
Comment
Question by:mickeyshelley1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
8 Comments
 
LVL 78

Expert Comment

by:arnold
ID: 39764242
The Certificate issued to the RDS server is likely locally issued (local CA), you need to add the remote CA certificate as trusted.

By pass the warning or bypass the need to add the certificate as suggested while being able to connect?
0
 

Author Comment

by:mickeyshelley1
ID: 39764304
I would like to bypass the need for the certificate completely
0
 
LVL 78

Expert Comment

by:arnold
ID: 39764313
Do you have control over the server?  You could change the mode.
Note that the certificate provides for the encryption of the connection which might otherwise be unencyrpted.

Why not add the Internal CA as trusted and be done with it?
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:mickeyshelley1
ID: 39764346
We are talking about 20 dell pads running windows 8 professional what is the most practical way to do it?
0
 

Author Comment

by:mickeyshelley1
ID: 39764348
And yes i have admin access to the terminal server
0
 

Author Comment

by:mickeyshelley1
ID: 39764366
I am in central time and its midnight, i will check back in the morning around 09:00 hrs
0
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 39765052
Are the tablets joined into the domain?
Publishing the CA root in the AD as trusted via a GPO is the simplest way.

When the tablets are being setup, the first thing to do is to add the CA.

On the server side, check the settings for terminal service and change it to the older version.
GPO to control terminal server functionality:
http://technet.microsoft.com/en-us/library/cc770884%28v=WS.10%29.aspx
ref security and require secure RPC might be what you are looking for.
0
 

Author Closing Comment

by:mickeyshelley1
ID: 39765584
Thank you for your time and effort
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

At the beginning of the year, the IT world was taken hostage by the shareholders of LogMeIn. Their free product, which had been free for ten years, all of the sudden became a "pay" product. Now, I am the first person who will say that software maker…
In Part II of this series, I will discuss how to identify all open instances of Excel and enumerate the workbooks, spreadsheets, and named ranges within each of those instances.
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question