Deploy an RDS Farm Windows 2012R2/2016/2019

Windows Server 2012R2Windows Server 2016Windows Server 2019Windows Server 2022

In this tutorial, we will see how to set up a RDS farm in Windows 2012R2 / 2016 / 2019 with the following features:

  • Remote Desktop Session Host (x2)
  • Service broker for the distribution of connections
  • Setting up a collection
  • Publishing RemoteApp on a web portal
  • Remote Desktop Gateway
  • User Profile Disk (UPD)

To set up a complete rds farm, you need a minimum of 4 servers, not including the domain controller and file and print server. All farm servers must be members of the same Active Directory domain.

Composition :

NameIPRoles
LAB-RDS1.rdr-it.intra 172.16.0.184Remote Desktop Session Host
LAB-RDS2.rdr-it.intra 172.16.0.185Remote Desktop Session Host
LAB-RDS-BRK.rdr-it.intra 172.16.0.186Service Broker / License Manager
LAB-RDS-GW-WEB.rdr-it.intra 172.16.0.187Gateway Remote Desktop / Web Access  
RDS Farm

For the realization of the tutorial, I used an AD server, LAB-AD1.rdr.it.intra with the IP address 172.16.0.100. DC is used for storing UPDs.

Server role definitions that are part of an RDS farm.

Remote Desktop Session Host : On these servers, the user sessions are open and allow them to work.

Service broker : This is the circulation agent for sessions in an environment with multiple remote desktop session hosts.

Remote Desktop Gateway : Its primary role is to enable secure access to the RDS infrastructure from the Internet. It connects to the farm using HTTPS and filters connections using access policy.

Web Access : publishes a web portal that allows access to applications via RemoteApp via an Internet browser. This role is also used for RemoteApp access for Windows clients. Through this portal, it is also possible to put the password change of the users.

License Manager : This service is used for license distribution (CAL RDS).

The tutorial was made under Windows 2012R2. The deployment of an RDS farm under Windows 2016 and 2019 is almost identical.

Simple RDS installation

In a “small” environment, it is possible to deploy a remote desktop environment (RDS) on a single server. The tutorial: Deploying an RDS server – Remote Desktop Service explains how to do it.


Preparation of the environment

Before you begin deploying the different roles on the servers, you must prepare the environment.

Move the Remote Desktop Session Host Servers to an OU

This operation will allow subsequently apply specific GPO at the RDS environment using a loopback policy for users parameters.

Open the Active Directory Users and Computers console, create a specific OU for the Remote Desktop Session Host servers, and move them in.

Folder for User Profile Disks – UPD

1. On a file server, create a folder for storing UPDs.

Création d'un dossier pour le stockage des UPD

2. Share the folder, the accounts of the computers having the remote desktop session host role (LAB-RDS1 $ and LAB-RDS2 $) must have full control.

Droits pour le partage

DNS records

Create a type A record with the same name that will point to the IPs of your remote desktop session host, as shown below.

Enregistrement DNS

The above DNS records are to be created only if you want to access the remote desktop by manually configuring the RDP client or if you are using a thin client that does not support configuring collections.

This solution is not recommended.

As part of the LAB, I added a record of type A rdsgw pointing to the IP of the server LAB-RDS-GW-WEB to be able to use the gateway internally.

In production, it will be necessary to provide a recording on a domain accessible from Internet of type A on a public IP and to set up a rule on router / firewall to authorize the traffic on the port 443.

It is also possible to access the RDS farm directly configuring the connection by the broker server. This solution involves modifying the .rdp file.

Server Manager: Add Servers in One Console

To use the Windows Deployment Tool, you must add the servers that make up the RDS environment in one console.

The following operations are to be done on the server brker (LAB-RDS-BRK.rdr-it.intra).

1. From the server manager, click Add more servers to manage 1 .

Ajout des serveurs dans la gestionnaire

2. Launch a search 1 in the Active Directory to view the available computers. Select the computers that make up the RDS 2 infrastructure and click on the 3 arrow to add them.

Select the servers of the RDS farm

3. The servers are selected 1 , click OK 2 .

Validate adding servers

4. On the server manager go to All Servers 1 to view them.

Servers added

Server Manager: Create a server group (optional)

1. From the Server Manager Dashboard, click Create Server Group 1 .

Add a group

2. Name the group 1 , select the servers 2 and click on the arrow 3 to add them.

Configure group

3. Confirm the creation of the group by clicking OK 1 .

Validate the creation of the group

4. On the server manager, the group is available in the left menu 1 . The group is found in the Roles and Server Groups section in a 2 box.

Group available on the server manager

5. Click on the Firm group RDS 1 , one finds the same thing as in All the waiters limiting to the waiters which belong to the group.

Group detail

Deploying roles

The deployment of an RDS infrastructure is facilitated by the tool built into the server managers, in a single manipulation the following roles will be installed:

  • Remote Desktop Session Host
  • Broker
  • Remote Desktop Access via the Web

1. From the Server Manager, click Manage 1 / Add Roles and Features 2 .

Add roles

2. When launching the wizard, click Next 1 .

Add Role Wizard

3. Installation Type: Select Remote Desktop Services Installation 1 and click Next 2 .

Installation type

4. Deployment Type: select Standard Deployment 1 and click Next 2 .

Type of deployment

5. Deployment Scenario: Select Office Deployment Based on Session 1 and click Next 2 .

Choice of desk-to-session scenario

6. The wizard summarizes the roles that will be deployed. Click Next 1 .

Summarize roles that will be installed

7. Service broker: select the server that will have the role 1 , click on the arrow 2 to add it to the selection and click Next 3 .

Choice of broker server

8. Remote Desktop Web Access: Select the server that will have role 1 , click the arrow 2 to add it to the selection and click Next 3 .

Choice of web access server

9. Remote Desktop Session Hosts: Select the servers that will have role 1 , click on the arrow 2 to add them to the selection and click Next 3 .

Choosing Remote Desktop Session Hosts

10. Check the box Automatically restart the destination server if necessary 1 then click on the button Deploy 2 .

Start deployment

11. Wait during deployment, this step takes more or less time depending on the number of servers and the hardware infrastructure.

12. The installation is complete, click Close 1.

Installation complete

13. From the server manager, go to Remote Desktop Services 1 . From this view, an overview of the deployment is visible. The administration of the RDS infrastructure is also done from here.

Overview of the RDS farm

14. On Servers 1 , we find the same information as the All Servers side by limiting the result to the machines that make up the RDS environment.

Servers that make up the RDS farm

15. The Collections tab 1 allows the administration of this one and also to see the connected users. This part is for the moment empty.

Collection overview

Setting up a collection

A collection allows remote desktop configuration by specifying the hosts that make up the collection and who can access it.

It is at the collection level that the use of User Profile Disks (UPDs) and applications published in RemoteApp via Web Access is configured.

Create a collection

1. From the Server Manager on the collections management page, click on TASKS 1 and Create a collection of 2 sessions.

Create a collection

2. When starting the RDS Collection Creation wizard, click Next 1 .

Collection creation assistant

3. Enter the name of the collection 1 and click Next 2 .

Collection name

4. Add the Remote Desktop Session Host servers from the 1 collection and click Next 2 .

Choice of host servers from the collection

5. Specify the allowed user group (s) 1 to connect to the collection and click Next 2 .

User Profile Disk Configuration - UDP

6. Check the Enable user profile disks 1 box, specify the share for storing UPD 2 , enter the maximum size of a disk 3 and click Next 4.

Activation des UDP

By default, user disks store the entire profile (appdata / desktop / documents / …).
It is important to evaluate the size to configure.
Once the disk is created (log on to the collection), resizing the vhd is “complicated”.
Changing the size will only affect new disks created after applying the setting.
I invite you to read this article on my feedback from the UPD.

7. Click Create 1 .

Confirm creation

8. Wait while creating the collection …

Creation of the collection in progress ...

9. The collection is ready, click on Close 1 .

Collection creation completed

10. On the Server Manager, the collection is visible 1 .

Server management collections

11. Click on the name of the 1 collection to access the details.

Collection details

12. Open the parameter folder for storing upd, a disk named UVHD-template.vhdx 1 is created. It corresponds to the Default Profile folder on a computer.

Creation of a reference UPD

Edit a collection

1. From the page of the collection, on the page PROPRIETES insert click on TASKS 1 / Modify the properties 2 .

Edit a collection

2. It is possible to change the name, the user groups allowed to connect.

3. Session Section 1 : Setting the Expiration and Reconnection Time on Collection Hosts, Setting Temporary Folder Behavior.

Session settings

4. Security Section 1 : Configuration of security layers between the RDP client and the servers.

Security

5. Load Balancing Section 1 : In case of different power server usage, it is possible to prioritize a server and set a session limit.

Load balancing

6. Client Setting Section 1 : Configuring Device and Printer Redirection.

Client settings and redirection

7. User Profile Discs Section 1 : Configuring UPDs (Size, Folder Exclusions, Location …).

User profile disks

The collections have no secrets. The RDS farm is now usable.

It is possible to deploy several collections on the same RDS deployment, which allows pooling broker services, web access. The remote desktop session hosts are dedicated to a collection.

Now we’ll see how to publish RemoteApp applications accessible through the RDS farm web access.

Publish RemoteApps

The programs published in RemoteApp allow you to launch programs from Remote Desktop Session Host servers by giving the user the impression that it is running from his or her computer. Only the program window is displayed.

This solution has the advantage of using the power of the servers and facilitates the administration by needing to update only the servers. In the context of deployment of new post, this solution avoids having to install all the software.

Using RemoteApps can confuse users if they are not well informed about the operation. If the redirection of user documents is not in place, the files saved by the application will not be available on the computer.

Before publishing a program, it must be installed on all hosts in the collection.

Program Publication

1. From the collection management page, click Publish RemoteApp Programs 1 .

Publier des programmes

2. Waiting during the wizard collects programs available on a host.

Récupération des programmes disponibles

3. Select programs to publish 1 and click Next 2 .

Sélectionner les programmes à publier

If a program is not available in the list, it can be declared manually by clicking Add ….

4. Click Publish 1 .

Confirmer le choix

5. Wait during publication …

Patienter

6. Programs are published, Close 1 the wizard.

Publication terminée

7. Applications are visible 1 from the collection administration page.

Programme visible dans la liste

Customize a program

1. Right-click on program 1 and click on Edit properties 2 .

Modifier un un programme RemoteApp

2. General section 1 : change the name of the application / hide the program on the web portal / organize in a folder.

Onglet Général

3. Parameters section 1 : allows you to define parameters on the command line.

Paramètres

4. User Assignment Section 1 : It is possible to restrict access to the program to specific groups.

Onglet Affectation d'utilisateur

5. File Type Association Section 1 : Allows you to associate an extension with the program (Works for files accessed from a session on the collection).

Onglet Association de fichier

Remove a program

1. On the REMOTEAPP PROGRAMS section, click on TASKS 1 and then Cancel the publication of RemoteApp 2 programs.

Retirer un programme

2. Check the box of program (s) 1 to remove and click Next 2 .

Sélectionner le programme a retiré

3. Click Cancel Publication 1 .

Confirmer l'annulation de la publication

4. Waiting …

Patienter pendant le processus

5. Click on Close 1 . The application is no longer available in RemoteApp.

Fermer l'assistant

Remote Desktop Gateway – Gateway RDS

To summarize, the Remote Desktop Gateway allows access to resources (servers / computers) accessible from outside the enterprise on port 443 (https) without the need to establish a VPN connection and applying security strategies.

Remote Desktop Services Gateway Installation

1. Go to Overview 1 of Remote Desktop Services and click on Service Gateway … 2 . This will open the role installation wizard for the RDS farm.

Vue ensemble de la ferme RDS

2. Select server 1 where the role is to be installed and click Next 2 .

Sélectionner le serveur qui va avoir le rôle

3. Enter the name of the SSL certificate 1 (usually the publication name on the internet) and click Next 2 .

Création du certificat

4. Click Add 1 to start the installation.

Confirmer le rôle

5. Wait during the installation …

Installation en cours...

6. Installation completed, click Close 1 .

Installation terminée

Installing RD Gateway Manager on the Broker Server

Reminder : all the manipulations are carried out from the broker server. When installing the RDS Gateway the management console was installed on the target server.

1. Open a PowerShell command prompt as an administrator.

2. Enter the following line to install the console:

Install-WindowsFeature RSAT-RDS-GATEWAY

Remote Desktop Gateway role overview

To use the RDS gateway with a self-signed certificate, it must be deployed to the endpoints as a Trusted Root Certification Authority.

To work the Remote Desktop Gateway uses 2 types of policies:

  • Connection authorization policies: These define who can connect to the gateway (users and extensions), which devices are redirected, and the timeout of the sessions.
  • Resource Access Authorization Policies: They define who can connect to what.

1. Open the console from Server Manager, Tools 1 / Terminal Services 2 / Remote Desktop Gateway Manager 3 .

Ouvrir la console de Gestion

2. Click Connect to Remote Desktop Gateway Server 1 . In the new Remote Server 2 check box, enter the name of the server where the role is installed 3 and click OK 4 .

Connexion au serveur

3. When installing the role, the wizard created two 1 strategies, which makes the gateway normally usable.

Aperçu de la console

Having added a DNS record for the RDS farm (rds.rdr-it.intra) and configuring client access with this record, it is necessary to modify the resource access policy or add a computer in the Active Directory with that name.

4. In the Actions menu click Properties 1 . A window opens with different tabs available to change the options and behavior of the Remote Desktop Gateway service.

Propriétés du rôle

By default when installing a self-signed SSL certificate is created, it can be changed from the SSL Certificate tab or from the Server Manager in the Remote Desktop Services section.

Connection Authorization Policies

1. From the left menu, go to the Connection Authorization Policy 1 folder. From here, it is possible to see and manage the strategies in place. Double click on the strategy RDG_CAP_AllUsers 2 .

Stratégie d'autorisation des connexions

2. General tab: from here it is possible to change the name of the strategy and the activated or not by ticking the box Enable this strategy.

Général

3. Requirements tab: Define the user configuration to connect to the gateway services. Belonging to a group for the user, this parameter is mandatory. The other optional but very useful parameter to increase the security level is the group membership for the computer. By setting this option it is possible for example to prevent an employee from logging in from his personal computer.

Configuration requise

4. Device Redirection tab: How to configure the collection, it is possible to define which devices are redirected through the gateway. The settings in the policy take precedence over the settings in the collection. That is, if the printers are allowed in the collection and not allowed by the gateway, during a connection through the gateway the user will not have the printers.

Redirection de périphériques

Resource Access Authorization Strategies

1. From the left menu, go to the Resource Access Permit Policies 1 folder. From here, it is possible to see and manage the strategies in place. Double click on the strategy RDG_AllDomainComputers 2 .

Stratégies d'autorisation d'accès aux ressources

2. General tab: from here it is possible to change the name of the strategy and the activated or not by ticking the box Enable this strategy.

Général

3. User Groups tab: Define who can use this policy.

Groupes d'utilisateurs

4. Network Resource tab: What this policy can access.

Ressource réseau

5. Ports Allowed tab: If remote desktop access has been configured on a port other than 3389, you must configure it here.

Configuration

In this part, we will see how to make the gateway usable for the RDS farm. Several methods and solutions are available. Choose the best solution for your environment and the desired level of security.

Method 1: Allow access to all resources (deprecated)

Open the RDG_AllDomainComputers strategy and go to the Network Resource 1 tab, check Allow users to connect to any 2 network resource. Click on the Apply 3 and OK 4 buttons.

Autoriser l'accès à tout

Explanation : This method allows access to all computers (even off-domain) that have Remote Desktop enabled. In production it is not advisable to use this solution.

Method 2: Use the default configuration

As explained at the beginning of this tutorial, using a DNS alias for host servers prevents the connection to the RDS shutdown because the RDS computer (AD object) does not exist.

1. Go to the domain controller and open the Active Directory Users and Computers console and go to OR RDS 1 .

Utilisateurs et ordinateurs Active Directory

2. Right-click on OR 1 , go to New 2 and click on Computer 3 .

Ajouter un objet Ordinateur

3. Enter the Computer Name 1 that corresponds to your alias and click OK 2 .

Configuration de l'objet

4. The computer is created 1 and is a member of the group: Computer Domain 2 .

Vérification de l'objet

With this method, the default rules work with the RDS farm.

Explanation : This method allows access to all computers in the domain. Adding a fictitious computer allows the gateway to validate that the rds.rdr-it.intra computer is part of the AD group and allows access.

Method 3: Allow Access to a Restricted Active Directory Group on the RDS Farm

Prerequisites: have done the method 2 procedure.

This method consists of creating a group, in which we will put the RDS servers and declare it in the resource access strategy.

1. Return to the Active Directory Users and Computers console and go to OR RDS 1 .

Utilisateurs et ordinateurs Active Directory

2. Click the 1 icon to create a group in the container.

Ajouter un groupe

3. Enter Group Name 1 and click OK 2 .

Paramètres du groupe

4. Select Computer objects 1 to be added to the group, right-click and click Add to a 2 group.

Ajouter les ordinateurs au groupe

5. Enter the name of the 1 group that has just been created and click on OK 2 .

Sélectionner le groupe

6. Click OK 1 to close the confirmation window.

Confirmation de l'action

7. Double-click on group 1 , go to Members tab 2 and check that Computers 3 have been added.

Vérification des membres

8. Go back to the Gateway Management Console, go to the Resource Access Permit Policies 1 folder and double-click on the default 2 strategy.

Modifier la stratégie

9. Go to the Network Resources 1 tab and click Browse … 2 .

Modifier les ressources

10. Enter the name of the group 1 and click OK 2 .

Entrer le nom du groupe

11. Click Apply 1 and OK 2 .

Valider les modifications

12. The group change 1 is visible in the overview of the strategy.

Visualisation des modifications

To use RemoteApps from outside the network (Internet), you have to add the broker server to the group.

Method 4: Using the Gateway Managed Groups

This method is equivalent to method 3 unlike the groups used for the permissions are managed directly by the gateway, which allows to add computers out of domain or another domain without approval relationship.

1. On the gateway management console, go to the Resource Access Permission Policies 1 folder and double-click on the default 2 strategy.

Modifier la stratégie

2. Go to the Network Resources 1 tab, select the option Select or create Remote Desktop Gateway managed group 2 and click Browse … 3 .

Ressource réseau - groupe géré

3. Click Create a new group … 1 .

Ajouter un groupe

4. Enter the Group Name 1 and go to the Network Resources 2 tab.

Nom du groupe

5. Enter the server fqdn server name 1 and click Add 2 .

Déclarer les serveurs

6. Add all host servers that make up the RDS farm and the alias 1 and click OK 2 .

Serveur de la ferme

7. Select the 1 group that has just been created and click on OK 2 .

Sélectionner le groupe

8. Check that the group is selected 1 , validate the servers that compose it 2 then click on Apply 3 and OK 4 .

Valider les parametres

9. The group change 1 is visible in the overview of the strategy.

Stratégie modifiée

As for method 3, if you want to use RemoteApps from outside your network, you have to add the broker server to the group.

More with the Remote Desktop Gateway

Now we will put in place the necessary strategies to allow administrators to access all resources

For the creation of strategies, there are two methods:

  1. Creation using the wizard that will guide us in setting up the connections and resources strategies.
  2. Create the two strategies separately.

In this tutorial, we will use the wizard.

1. From the Management Console, go to Strategies 1 and click Create Authorization Policies 2 .

Ouvrir l'assistant de création

2. Check the first option 1 to create the two rules and click Next 2 .

Choix du type de stratégie

3. Give a name of 1 for the connection authorization policy and click Next 2 .

Nom de la stratégie d'autorisation des connexions

4. Click Add 1 for one group settings.

Ajouter un groupe

5. Select the Domain Admins group 1 and click OK 2 .

Sélection du groupe

6. To increase the security level, it is possible to add a computer group. Click Next 1 .

Passer à l'étape suivante

7. Enable or disable Device Redirection 1 and click Next 2 .

Configuration de la redirection des périphériques

8. Set session times 1 and click Next 2 .

Délais des sessions

9. A summary of the strategy is displayed, click Next 1 to move to the resource access strategy.

Résumé de la stratégie

10. Name strategy 1 and click Next 2 .

Nommer la stratégie d'autorisation d'accès aux ressources

11. The home group is already defined, click Next 1 .

Groupe à qui s'applique la stratégie

12. Select the Allow users to connect to any network resource (computer) 1 option and click Next 2 .

Ressources disponibles

13. Depending on the ports used adjust the parameters 1 and click Next 2 .

Configuration des ports autorisés

14. A summary of the strategy is displayed, click Finish 1 .

Résumé de la stratégie

15. Strategies are created, click Close 1 .

Confirmation de création

16. Go to the folder containing the connection authorization strategies 1 and select the new strategy 2 .

Stratégie ajoutée dans la console

Connection policies are read as the rules of a firewall from top to bottom (Order). By selecting a strategy, it is possible to modify its order by the Actions menu on the right of the console.

We are done with the Remote Desktop Gateway role. We will now see the Remote Desktop Services License Manager.

Remote Desktop Services License Manager

The license manager allows users or devices that connect to the RDS farm to issue an access license (CAL).

Only one licensing mode for the RDS farm can be configured: users or devices. A license server can distribute several types of licenses and different versions (2008/2012 …).

Installation

1. From Server Manager, on the RDS farm overview, click License Manager 1 to open the wizard.

Déployer le serveur de licences

2. Add the server that will receive 1 role and click Next 2 .

Sélectionner le serveur

3. Click Add 1 to start the installation.

Ajouter le rôle

4. Wait during the installation …

Installation en cours

5. The installation is complete, click Close 1 to exit the wizard.

Fermer l'assistant

The rollout of RDS farm roles is complete. It is possible to view the location of the roles from the DEPLOYMENT SERVERS insert.

Ferme RDS déployée au complet

Configuring the Remote Desktop Services Licensing Mode

1. From the overview, deployment, click on TASKS 1 / Change Deployment Properties 2 .

Modifier les prorpiétés

2. Go to the section License Manager 1 , select the license mode 2 then click on Apply 3 and OK 4 .

Choix du mode de licence

Add licenses

1. Open the console, from Server Manager, click Tools 1 / Terminal Services 2 / Remote Desktop Licensing Manager 3 .

Lancer la console

2. Before adding licenses, activate the server, right click on 1 and click Activate server 2 .

Activer le serveur

3. When launching the activation wizard, click Next 1 .

Assistant d'activation 1/5

4. Leave the World of Auto Connect. Click Next 1 .

Assistant d'activation 2/5

5. Enter Company Information 1 and click Next 2 .

Assistant d'activation 3/5

6. Enter contact information (optional) 1 and click Next 2 .

Assistant d'activation 4/5

7. The server is activated, click Next 1 , the add license wizard will launch.

Assistant d'activation 5/5

If you want to install licenses later, you have to right-click on the server from the console and click Install licenses.

8. When launching the new wizard, click Next 1 .

Assistant installation licence 1/5

9. Select license type 1 and click Next 2 .

Assistant installation licence 2/5

10. Enter the license information 1 and click Next 2 .

Assistant installation licence 3/5

11. Select product version 1 and quantity 2 then click Next 3 .

Assistant installation licence 4/5

12. Click Finish 1 to close the wizard.

Assistant installation licence 5/5

13. The licenses are visible 1 on the server.

Licence disponible sur le serveur

Since the license manager, it is possible to make reports to have a license status.

The RDS farm is configured and functional, we will see the client part.

Using the RDS Farm – Client

In this part, we will see how to operate the RDS farm with a client.

During the different steps, you will have several times the following messages which will not be detailed each time:

Identification : enter username and password of an authorized account to connect to the RDS collection.

Demande d'identification

Security alert on certificates : click on Yes to pass the alert with the possibility of checking the box to no longer have the request. During a connection it is possible to have several times the message in case of switching from one host to another by the broker.

Alerte certificat

Beforehand, the Gateway certificate has been installed on the test client computer. Here you will find a tutorial for deploying a certificate using a GPO.

To install the certificate manually on a computer, once it has been exported, paste it on the client machine, double-click on it to launch the installation wizard and place it in the Trusted Root Certification Authority store on computer.

Remote desktop connection through the web portal

This solution is the preferred method, we will go to the web portal to download the RDP file which allows us to connect to the server collection.

From a computer, open an Internet browser and enter the URL for web access (https: //name-fqdn.dom/rdweb). On the portal enter the identification information (user / password) 1 of an account authorized to connect and click on Register 2.

RDWEB

Click on the icon which represents the remote desktop 1 then, depending on the Internet browser used, Open or Save the file 2. (If the file is saved, run it).

A warning message is displayed, click on Connection 1.

Enter the login credentials of a user authorized to connect and validate the security alert messages for the certificates.

Wait while logging in …

The session is opened on the server.

It is quite possible to download the RDP file, rename it and use it without having to go through the RdWeb portal. The file can be deployed to other computers using a GPO.

Connection by the RDC client of Windows

1. Start the client, enter the RDS Firm Alias 1 and click on Connection 2 .

Connexion depuis un client Windows

2. Enter your password and validate the certificate requests.

3. The session is open on the collection’s host server.

Session ouverte en sur la ferme RDS

Connecting the RDC Windows Client with the Gateway

1. Start the client, enter the alias of the farm RDS 1 and click Options 2 .

Afficher les options du clients RDC

2. Go to the Connection tab 1 (if it is not visible click on the arrows) and click on Settings … 2 .

Options de connexion

3. Check Use these remote desktop gateway server settings 1 , enter the url defined for the gateway 2 , A to force the passage through the gateway uncheck the box . Check box 3 Use my Remote Desktop Gateway ID info for the remote computer and click OK 4 .

Paramétrage de la gateway

4. Retourner sur l’onglet Général 1 et cliquer sur Connexion 2.

Lancer la connexion

5. On the password request window, we see servers 1 where the user will be identified. Enter the identifiers 2 and click OK 3 .

Authentification sur les deux serveurs

6. Once connected to the server, click on the key 1 and it is possible to check the passage through the gateway 2 .

Visualisation du passage par la passerelle

7. Return the broker server and open the administration console of the gateway, go to the folder Analysis 1 , the connection is visible.

Connexions depuis la console d'administration

RemoteApp by Web Access

1. From a client workstation, launch an IE preference browser and enter the https: //rdsgw.rdr-it.intra/rdweb url of web access

2. Enter credentials 1 and click Register 2 .

Portail d'accès web

3. Once connected, a page with the available applications will be displayed 1 . Click a program to launch it (Microsoft Expression Web 4).

Liste des programmes disponobles

4. A security alert appears and also provides the option to choose redirected devices, click on Connection 1 .

Valider l'alerte de sécurité

5. Enter your credentials and validate certificate alerts.

6. The application starts with the impression that it is open directly on the computer. The 1 badge on the application visible in the taskbar identifies that it is in RemoteApp.

Programme ouvert

RemoteApp directly from Windows

It is possible in Windows, parameter access to the RemoteApp as if it is installed on the computer.

1. On the client open the Control Panel and click Remote Connections 1 or RemoteApp and Remote Desktop Connections depending on the version of Windows.

Panneau de configuration

2. Click Configure a new connection with RemoteApp and Remote Desktop Connections 1 .

Configurer une connexion remoteapp

3. Enter the RemoteApp Access URL 1 as https: //url-access-web/rdweb/feed/webfeed.aspx and click Next 2 .

Configurer l'url

4. Click Next 1 to start the configuration.

Lancer la configuration

5. Enter your credentials and validate certificate alerts.

6. Click Finish 1 .

Fermer l'assistant

7. Programs in RemoteApp are “installed” on the computer. They are accessible either from this page of the control panel or from the start menu.

RemoteApp configuré

8. Programs 1 from the Start menu.

RemoteApp dans le menu Démarrer Windows

9. An icon in the notification area also allows you to manage the RemoteApps configured on the machine.

Icone en zone de notification

It is possible to automate the configuration of RemoteApps using a GPO.

Enable the setting and enter the URL of the Web Access server in the Specify Default Login URL setting, which is located in: User Configuration / Policies / Administrative Templates / Windows Components / Remote Desktop Services / Connections RemoteApp programs and Remote Desktop Services.

GPO automatisation RemoteApp

Complements :

In a “desktop” environment and if the UPDs are configured, open the Windows file explorer and go to the folder C\: Users 1. The UPD of the logged-in user is mounted and has the name login of the user.

UPD des utilisateurs connectés

On the server, which hosts the UPDs, there are now VHDXs with the name ID 1 corresponding to the user’s.

UPD sur le serveur de fichier

On the broker server, go to the details of the collection, in the CONNEXIONS inset we see the user who has logged in 1 . In right click on several actions are possible, including taking the hand on the session to provide support for a person in case of problems.

Utilisateurs connectés visible depuis la console serveur

Manage and customize the environment RDS

Troubleshooting

Force connection on Remote Desktop Session Host

To force the connection on a particular host and avoid being routed by the broker, you must run the RDC client in admin mode

  1. Open Run window
  2. Enter : mstsc.exe /admin
  3. Enter the ip or dns name of the host server, the connection will not be redirected by the broker.

FAQ

Why go into an RDS environment?

Technical point of view: reduces the maintenance of the park by having to maintain only the farm RDS. Software updates are to be deployed only on the servers in the collections. The deployment of new software is also faster for the same reason. In the same vein, changing a user station is easier because its work environment is hosted on the servers. All users work on the same environment, which facilitates support.
Financial point of view: The renewal rate of positions can be extended because the computing power is provided by the servers. Thin client computers (mini-pc) are also cheaper to buy.

How much of a remote desktop session host for an RDS deployment?

The theoretical answer to this question is 1. For reasons of availability and administration I advise you to put at least two hosts. It is better to put two small virtual machines with 4 CPUs and 8GB of RAM rather than a large vm with 8CPU and 16GB of RAM.
This way, if a host crash or if you need to perform maintenance, it is possible to do so without impacting production.

How to size host servers?

This question comes up regularly on the forums and unfortunately there is no ready answer.
Before setting up an RDS farm, it is necessary to carry out an audit to know:

The software environment used
What?
By who ?
How? ‘Or’ What ?
CPU / RAM consumption
Pre-requisite editor …
Software conflict
The number of simultaneous users

Once the audit has been carried out, an analysis of the information collected is to be done to find the best solution to put in place.

How many users per host?

This question, which comes back regularly, does not have a ready answer. The answer to this question depends on the audit carried out for the establishment of the RDS farms.

How much CAL RDS?

The answer to this question is very simple, as much as users or devices that will use the RDS services. Licenses are awarded for a given time.

Often, people tend to be economically savvy to buy fewer licenses than users on the pretext that there are only X simultaneous connections.

If you have 20 users using the RDS farm with only 10 simultaneously, you need 20 licenses.

Is it possible to have several collections?

Yes it is possible, just consider that a remote desktop session host can not be part of multiple collections and UPDs are linked to a collection as well. It is not possible to share a user profile disk between multiple collections.

Why use multiple collections?

The answer to this question is multiple.
– Separation by service.
– Separation by site.
– Create specific collections by application and then present them in RemoteApp either on client computers or on remote offices.

The use of several collections makes it possible to segment the infra RDS according to the needs (performances / conflicts software …).

Romain Drouche
System Architect | MCSE: Core Infrastructure
IT infrastructure expert with over 15 years of field experience. Currently a Systems and Networks Project Manager and Information Systems Security (ISS) expert, I use my expertise to ensure the reliability and security of technological environments.

2 thoughts on “Deploy an RDS Farm Windows 2012R2/2016/2019”

  1. Hi,

    Thank you a lot for the documentation it is very help full
    what do you mean by (If you want to install licenses later, you have to right-click on the server from the console and click Install licenses)
    I would like to skip the license part for now

    Thank you

    Reply

Leave a Comment