Capacity Planning Whitepaper for RD Session Host
Video: How to Install RD Session Host Locking Down a RD Session Host Farm Configuring IP Virtualization Troubleshooting Remote Control (Session Shadowing) The goal of a Remote Desktop Session Host (RD Session Host) server is to host Windows-based programs or the full Windows desktop for Remote Desktop Services clients. Users can connect to an RD Session Host server to run programs, to save files, and to use resources on that server. This step-by-step guide walks you through the process of setting up a working Remote Desktop Services infrastructure in a test environment. Step 1: Setting Up the Infrastructure Step 2: Installing and Configuring Remote Desktop Session Host Step 3: Verifying Remote Desktop Session Host Functionality
When applied to Remote Desktop Services, Single Sign-On means using the credentials of the currently logged on user (also called default credentials) to log on to a remote computer. If you use the same user name and password logging on to your local computer and connecting to a Remote Desktop Session Host, enabling Single Sign-On will allow you to do it seamlessly, without having to type in your password again.
How to enable Single Sign-On?
Single sign-On can be enabled using domain or local group policy.
What are the limitations when using Single Sign-on?
For more detailed information on SSO using the Remote Desktop Client see this blogpost: http://blogs.msdn.com/b/rds/archive/2007/04/19/how-to-enable-single-sign-on-for-my-terminal-server-connections.aspx
If you are using a RDS farm and need to configure SSO to it be aware that the farmname by default doesn't have a kerberos identity so before you can successfully use it in a "Allow Delegating Default Credentials" policy you need to create a kerberos identity for the farmname. Important! The user account in the following procedure must have the Add workstations to domain user right and be a member of local Administrators security group on the Remote Desktop Connection Broker.
Important! Kerberos identity is not supported if the Connection Broker runs as a node in a Failover Cluster.
Important! RDS provider for Windows PowerShell does not enable automatic updates of the farm account’s password. To enable automatic password updates use WMI script as shown in Part II of this blog post series. Follow these steps to create the Kerberos Identity 1. On the RD Connection Broker, launch Windows PowerShell Modules. To launch Windows PowerShell Modules, click Start, point to Administrative Tools, and then click Windows PowerShell Modules.
2. Type cd RDS:\ to switch to RDS provider for Windows PowerShell. 3. Type cd RDSFarms and then press ENTER. If you type DIR, you can see all the RDS farms that the Connection Broker manages. 4. Type CD <farm name> where <farm name> is the name of the RDS farm on which you want to enable a Kerberos identity. Type DIR to see its properties. 5. Type CD KerbIdentity and then press ENTER. Type DIR to see the current configuration. 6. Type Set-Item EnableKerbIdentity 1 and then press ENTER. The result is shown in the screenshot below 7. Type the name of the user account that will be used as the Kerberos Identity and then press ENTER. For more detailed information see this blog post: http://blogs.msdn.com/b/rds/archive/2009/05/20/creating-kerberos-identity-for-rd-session-host-farms-part-i-using-the-remote-desktop-services-provider-for-windows-powershell.aspx
Configuring Network-Level Authentication
Danny van Dam edited Revision 18. Comment: added note about that this might not apply to RDS 2012 (R2)
Carsten Siemens edited Revision 17. Comment: Fixed misspelling and added tag: has comment
Christa Anderson edited Revision 13. Comment: added link to shadowing topic
Freek Berson edited Revision 7. Comment: Added a part about SSO on a RDS farm
Freek Berson edited Revision 5. Comment: Added a SSO paragraf
Christa Anderson edited Revision 1. Comment: Added NLA section and link
Rules Update for Remote Desktop Services Best Practice Analyzer for Windows Server 2008 R2 x64 Edition (KB979734) might be a good addition to this.