![windows rdp client for mac windows rdp client for mac](https://teamipad.weebly.com/uploads/1/1/0/4/110416839/423769970.jpg)
- #Windows rdp client for mac for mac os x
- #Windows rdp client for mac mac
- #Windows rdp client for mac windows
#Windows rdp client for mac windows
TLS by the way does work when communicating with Windows Server 2008 R2/2012. So we’re essentially forcing the RDP client NOT to use TLS.
#Windows rdp client for mac mac
The Mac RDP client does support TLS – however when using TLS to communicate with 2012 R2, it fails and obstinately does not fall back to the RDP security layer. Why? Is it because the RDP client on the Mac does not support TLS? Actually. We need to change that setting to the RDP security layer. With a suitable risk assessment and potential mitigation, this may also be suitable in an enterprise environment. My home *cough* IPS *cough* will take care of that. I certainly don’t mind making that change on my home system, given I’m not overly concerned about the risks associated with lowering the security layer. The fix here requires us to force the Remote Desktop Session Host to not negotiate the security layer, but rather use a weaker security layer than the default. We’re able to take a leaf out of some government play books here, which is to disable the negotiation option, and then hold fast on a weaker position. Now this can be configured either by a group policy within an Active Directory environment, or by a local policy (Start -> Run -> GPEdit.MSC) if you don’t have a domain, or don’t want to create a GPO specifically for this purpose in your domain. The setting is called Require use of specific security layer for remote (RDP) connections. Specifically…Ĭomputer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security This configuration item is applied by Group Policy. TLS is the stronger security layer, but not as widely supported.
![windows rdp client for mac windows rdp client for mac](https://www.solvps.com/blog/wp-content/uploads/2015/05/Screen-Shot-2015-05-27-at-2.55.45-PM.png)
This is the original RDP security layer, its supported by 3rd party RDP clients. As it should be in most situations, Windows’ first thought it to negotiate with the client to select a mutually supported security layer. This involved dictating which security layers will be used by the Remote Desktop Session Host on the server itself. There are three options to the security layer configuration, mind you it’s essentially two options with an auto-negotiate setting. I was able to fix the problem so that I could connect.
#Windows rdp client for mac for mac os x
Update (22 October): I’ve published a new post here describing the new Microsoft RDP Client for Mac OS X that is perfectly compatible with Windows Server 2012 R2. I would always receive the error ‘ Remote Desktop Connection cannot verify the identity of the computer that you want to connect to.’ Most frustrating.
![windows rdp client for mac windows rdp client for mac](https://user-images.githubusercontent.com/300046/30454717-88bb8e14-995a-11e7-9326-66afa8fee329.png)
Well, happy enough given I can’t connect to my primary server. There are other alternatives around that may be better – I’ve heard CoRD mentioned a few times, but I’m happy using the Microsoft one. I use the Microsoft RDP client that comes with Microsoft Office for Mac 2011. Ever since upgrading my home server from Windows Server 2012 to Windows Server 2012 R2, I’ve been unable to RDP to it from my Mac OS X laptop.