Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Can a Remote Desktop certificate be configured to issue a Subject Alternative Name in NetBIOS format in addition to the FQDN?

Posted on 2014-10-29
4
Medium Priority
?
472 Views
Last Modified: 2014-10-30
Folks -

Per the article linked to below, I have configured a certificate template on my internal PKI that is properly issuing certificates for use by the terminal services/remote desktop client in Windows 7.

http://blogs.msdn.com/b/rds/archive/2010/04/09/configuring-remote-desktop-certificates.aspx

However, I receive a certificate validation warning when I attempt to connect to the destination computer via its NetBIOS name rather than its FQDN.  The validation warning is complaining that the name the certificate was issued to does not match the name of the destination computer.  Well, that's because the template didn't place both "ComputerX" and "ComputerX.domain.lcl" on the cert.  It doesn't appear to issue the cert with a Subject Alternative Name that would allow connectivity with either name.

The template has some additional options for what to include in the certificate.  One of which are the Service Principal Names of the account.  I selected that but it made no difference to the behavior.  I would have assumed that since both HOST/ComputerX and HOST/ComputerX.domain.lcl are default SPNs on all computer accounts that both names would end up on the certificate - they don't.  Only the FQDN does, so I'm in the same boat.

Has anyone figured out a way around this?  Is it possible to get the template to issue a cert for the purposes of RDP with both the FQDN and NetBIOS names included?

This is purely for RDP console support purposes - general remote workstation administration by a help desk.  No RD gateways, brokers, VDI, etc. involved.  Simple P2P connectivity.

Thanks.
0
Comment
Question by:amendala
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 41

Accepted Solution

by:
footech earned 2000 total points
ID: 40411568
To the best of my knowledge, there is no automatic way to do this.  I think you could manually create a cert with this info though, using the certificate service webpage on a standalone CA (don't think it will work on an Enterprise CA).
0
 

Author Comment

by:amendala
ID: 40411579
Yeah, we are trying to accomplish this through auto-enrollment.  Given that we had thousands and thousands of workstations, obviously, manual issuance and renewal would be well - a headache to say the least.  :)

I'll keep the question open for a bit to see if anyone else knows.
0
 

Author Comment

by:amendala
ID: 40413795
It doesn't seem this can be done based on conversations I've had with Microsoft PFE's.  Going to close the question out.
0
 
LVL 41

Expert Comment

by:footech
ID: 40414585
I wish it was.  I looked into it some time ago as I figured it would be nice not to have the warning all the time when making RDP connections to various machines.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question