Solved

Remote Desktop SSL Certificate - Server 2008 R2

Posted on 2014-04-15
3
1,109 Views
Last Modified: 2014-04-30
Hello, I am providing Remote Desktop access to users via a 2008 R2 server for external use. I am not using web access, Access is restricted via the Remote Desktop application on external clients . The users can connect and use the service as intended. At present I am using a self signed certificate, How do I go about installing a signed certificate from a provider? I have not installed IIS, I can launch the Certificates snap in and attempt to request a new certificate in the Personal section but I stall at that point.

I could install IIS and do it that way but not sure if it will work with Remote desktop not being web accessible.

Any ideas on how I should proceed?

Regards, Aelara
0
Comment
Question by:Aelara
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40001443
We purchased one last year for the same purpose from GoDaddy and it worked out very well.

www.godaddy.com
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40001444
0
 
LVL 29

Accepted Solution

by:
becraig earned 250 total points
ID: 40001897
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

At the beginning of the year, the IT world was taken hostage by the shareholders of LogMeIn. Their free product, which had been free for ten years, all of the sudden became a "pay" product. Now, I am the first person who will say that software maker…
Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question