Pushing RD Gateway Authentication to a 3rd Party

5 pts.
Tags:
Active Directory
Authentication
Remote Desktop Gateways
Remote Desktop Services
SAML
Windows Server 2012 R2
I have a hosted platform where our thick client applications run on Windows Server 2012 R2 servers, so customers can access these by logging into the RDWeb portal. They open the application, and everything looks like it is running on their machine, when it is obviously running on the server. To access RDWeb they will authenticate using their credentials which are matched against the Active Directory. The AD is set up on the hosted side, and the customer has no control over this. It is also important to note that we utilise both Azure and AWS to build these environments per client request, so just Azure AD unfortunately doesn’t seem a plausible option. As each Active Directory is controlled by ourselves, customers must request additional users to be added or deleted from the system. We then carry this out on their behalf. To allow customers extra control over profiles who are authenticated to access the portal, we are looking to provide access to RDWeb by authenticating users from whatever authentication provider they use. Be this Okta or any of the other authenticators out there. From my research it appears that RDWeb will only support form-based authentication or windows authentication, rather than our preferred option which would be SAML 2.0 authentication. In short, is there a way of pushing RDS Gateway authentication to a 3rd party? If so, is there any recommendations of providers?
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: