Windows Login & RDP

Windows & RDP Login

Secure Windows Login & Remote Desktop Sessions


Secure your Microsoft Servers, RDP login and RDS

Microsoft Remote Desktop and Services provide an easy way for users to connect enterprise systems and use shared applications from remote locations. Yet Microsoft remote sessions’ services have not been designed to be deployed over untrusted networks without additional protection.
RCDevs helps you to

Protect your Microsoft Servers, RDP Login and Remote Desktop Services (RDS)

RCDevs provides a Windows Credential Provider (CP) for Windows integrations. Our OpenOTP CP is your additional layer of protection for Windows logon and remote access with Remote Desktop (RDP login) and RDS.

Our latest versions of OpenOTP CP support both OTP and U2F authentication mechanisms. With OTP, both challenged and concatenated password modes are supported and any OpenOTP method like SMS, Token or Yubikey is supported.

Note: OpenOTP Credential Provider provides client-based security. This means that unlike other integrations at the service level, a Windows CP must be installed directly on a server or desktop in order to secure ActiveDirectory user logons.

For Desktops and Laptops
Unlike any other MFA vendor, RCDevs supports MFA login, even for Windows users working offline, without access to the Internet or office. The unique capability is based on the RCDevs intelligent Credential Provider plugin installed on Windows endpoints as local authentication agents, providing an added layer of security to both Windows domain authentication and local machine access. When working online, users can authenticate with any preferred method of the second factor, like the convenient mobile app-based push authentication, when offline the agents will automatically initiate offline login where users are presented with a QRCode that will generate an OTP for the session once scanned with the free OpenOTP Token mobile app.
With RCDevs Windows Login one can offer true enterprise grade MFA for Windows access with confidence, without risk of needing to revert back to username/password login as soon network connectivity goes out or communication with authentication backends fail.

Complete guide on how to enable MFA on Windows Client Login
For Remote Desktop Services
RCDevs Credential Provider (CP) provides full integration with Windows Server operating systems to add the market’s leading second-factor methods to Remote Desktop Services access. RCDevs CP supports all OpenOTP authentication methods on RDP login, seamlessly within the RDS login session, without redirects or additional buttons to click. RCDevs CP is delivered as an easy-to-install MSI package that can be deployed in a few minutes.

Complete guide on how to enable MFA on Windows Server Login
For RD Web Access
RCDevs CP seamlessly integrates also with RD Web login, supporting every method of second factor available in OpenOTP, from convenient push-based login to U2F.

Complete guide on how to enable MFA on RD Web Access
For Terminal Service Gateway
RCDevs OpenOTP Push authentication for Terminal Service Gateway or Remote Desktop Gateway (TSG) is natively available through the use of Network Policy Server (NPS), with help of standard RADIUS communication.

Complete guide on how to enable MFA on Terminal Service Gateway
For Local Users and Computers Out of Domain
Configure RCDevs OpenOTP servers and OpenOTP Credential Provider for Windows to authenticate local users using 2-factor authentication and for Windows on a computer out of the domain. Both scenarios require an LDAP server to store user metadata (Token metadata needs to be stored on a user account in WebADM even for local account authentication).

Complete guide on how to enable MFA on Local Users and Computers Out of Domain

Key features

Supports NT Domain-style login names like ‘Domain\Username’
Supports User Principal Names (UPN), implicit and explicit
Supports LDAP and LDAP+OTP login modes
Supports any OpenOTP method (Tokens, YubiKey, SMSOTP, MailOTP)
Supports both challenged OTP and concatenated passwords
Enterprise deployment with AD automated software deployment tools
Compatible with

Windows CP works with desktops and servers

Windows Desktop Vista, Windows 7, Windows 8, Windows 10
Windows Server 2008-R2, Windows Server 2012, Windows Server 2012-R2
Microsoft Remote Desktop Services
Microsoft Remote Desktop Gateway (RD Gateway)
Microsoft Terminal Services
windows azure

OpenOTP Credential Provider for Windows

How to integrate OpenOTP with AD

Frequently Asked Questions – Windows & RDP Login

How do I use Google Authenticator for Windows login?
Remote Desktop Manager allows you to use Google Authenticator or any authenticator app that works on OATH Event-based (HOTP) & Time-based (TOTP). It provides an additional security layer when opening a data source. For instance, you can use RCDevs' OpenOTP Token App, which allows two-factor authentication with push notification.
Check how RCDevs' OpenOTP Token app works as a Windows login credential provider.
Can I authenticate Windows Login with Smart Card?
You can authenticate with a smart card for both online and offline modes. Offline mode is possible either via QR Code or Fido key.

Firstly you need to configure the smart card with your MFA setup. Check the configuration documentation for smart card logins with RCDevs Security Solutions. After configuring, insert your smart card in the card reader. If the card is detected and the stored certificate can be used for logon, a new credential tile for the smart card will be prompted. You can select it and enter your PIN code. You will be logged in.
Documentation of windows login authentication with smart card.
Is Windows FIDO login possible?
Yes, it is possible. You need to register the key and activate the client policy.

Read more about related products

To request an online demo, you only have to create your account or contact us.

Online Demos are available for free to let you try RCDevs multi-factor in 5 minutes and authenticate with your mobile or Yubikey.