Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The RD Gateway uses NPS to send the RADIUS request to Azure Multi-Factor AuthenticationDualShield RADIUS server. To configure NPS, first you change the timeout settings to prevent the RD Gateway from timing out before the two-step verification factor authentication has completed. Then, you update NPS to receive send RADIUS authentications from to your MFA DualShield RADIUS Server. Use the following procedure to configure NPS: 

Modify the timeout policy

  1. In NPS, open the RADIUS Clients and Server menu in the left column and select Remote RADIUS Server Groups.
  2. Select the TS GATEWAY SERVER GROUP.
  3. Go to the Load Balancing tab.
  4. Change both the Number of seconds without response before request is considered dropped and the Number of seconds between requests when server is identified as unavailable to between 30 and 60 seconds. (If you find that the server still times out during authentication, you can come back here and increase the number of seconds.)
  5. Go to the Authentication/Account tab and check that the RADIUS ports specified match the ports that the

...

  1. DualShield RADIUS server is listening on.

...

  1.  

Prepare NPS to

...

send authentications

...

to the DualShield RADIUS Server

This process is basically the same as below

Expand
titleNPS Configuration in the RRAS integration

Include Page
NPS Configuration [MS-NPS]
NPS Configuration [MS-NPS]

...