Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The RD Gateway uses NPS to send the RADIUS request to Azure Multi-Factor Authentication. To configure NPS, first you change the timeout settings to prevent the RD Gateway from timing out before the two-step verification has completed. Then, you update NPS to receive RADIUS authentications from your MFA Server. Use the following procedure to configure NPS: 

Modify the timeout policy

  1. In NPS, open

...

  1. the RADIUS

...

  1. Client and

...

  1. Servers menu in the left

...

  1. panel, and

...

  1. select "Remote RADIUS Server Groups".
  2. Select

...

  1. "TS GATEWAY SERVER GROUP" in the middle panel. 

    Image Added

  2. Right click the "Properties" in "TS GATEWAY SERVER GROUP", and click "Add".

...

  1.  

    Image Added

  2. In "Address"  tab, add the DualShield RADIUS Server's address.

    Image Added

  3. In "Authentication/Accounting" tab, create a shared secret key. 

    Image Added

  4. Change both the Number

...

  1. of seconds without response before request is considered

...

  1. dropped and the Number of seconds between requests when server is identified as

...

  1. unavailable to between 30 and 60 seconds. 
    (If you find that the server still times out during authentication, you can come back here and increase the number of seconds.)

...

 

Prepare NPS to receive authentications from the MFA Server

...


  1. Image Added