Configure Remote Desktop Gateway to use Multi-Factor Authentication

In this post I am configuring a test case for Multi-Factor Authentication. We are going to convert a existing remote desktop gateway deployment with username / password authentication and a central NPS running on ADC to use the MFA.

As I like to use oneNote with pen on my Surface more then I do Visio I have quickly put a diagram of the situation I have now:

image

And below the situation what I have in mind for use of Multi Factor Authentication:

image

So here we go…

First I am going to configure the MFA to act as a proxy Radius in between the RDG and ADC (NPS in my situation).

image

I am going to add the RDG as an Client for the MFA proxy

image

As Radius proxy I am going to send my request to the Radius Server (Target):

image

On the Remote Desktop Gateway I am removing the ADC Server as central policy server and add the MFA server (proxy radius):

image

After changing the setting open the NPS Console on the RDG server. We need to change the timeout settings for the request to the radius server as we need time to authenticate to the Azure MFA, answer the call or click the app and then send the authentication back to the radius.

Under Remote Radius Server open the TS Gateway Server Group. Then choose edit.

image

At the Load Balancing tab set the Number of seconds without response before request is considered dropped to 60 seconds.

image

On the NPS server (my case the ADC) I need to add MFA server as radius client. So I open the NPS Console on the ADC and add new radius client :

image

Here I have created the MFA Radius client on the ADC:

image

Now on the Connection Request Policies I added the just created Client Friendly name (MFA) as condition so only the MFA Proxy can authenticate to the NPS for connecting and authenticating the RDG requests:

image

If I have deployed and configure a user for the Remote Desktop gateway and MFA (phone number or App) I should be able to login the Remote Desktop servers. In my case I did Smile

I hope these series gave you a quick understanding of how On Premise Multi-Factor Authentication works and how you can use it in your environment.