ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Ms licensing for a windows jump server

    IT Discussion
    6
    23
    3.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      Kris_K
      last edited by Kris_K

      Hey guys,
      i'm a little confused with MS licensing for a jump box. As we need more than 2 concurrent RDP sessions, we need RDS role installed and CALs assigned. For obvious reasons the server is not joined to a domain, so according to MS i can only use device (not user) CALs.
      https://blogs.technet.microsoft.com/askperf/2015/05/08/multiple-per-device-rds-cals-are-issued-the-same-device-issue/ - a certificate is transferred from the server to a connected client.
      But some of the clients use Macs instead of pcs, not sure how this is going to work out.
      Is anyone else using a similar setup?
      Thanks!

      scottalanmillerS 2 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @Kris_K
        last edited by

        @kris_k said in Ms licensing for a windows jump server:

        Hey guys,
        i'm a little confused with MS licensing for a jump box. As we need more than 2 concurrent RDP sessions, we need RDS role installed and CALs assigned.

        Just to be clear, there is no "up to two" allowance. A graphical jump box is a normal RDS server and requires RDS licensing even for two. The "two user limit" on Windows Servers is exclusively for the administration of the local box, not for any other purpose. And CALs are needed for every user, even if you only have one.

        1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller @Kris_K
          last edited by

          @kris_k said in Ms licensing for a windows jump server:

          For obvious reasons the server is not joined to a domain, so according to MS i can only use device (not user) CALs.

          I thought RDS requires AD. In any case, just add it to AD. It's that simple. There is nothing obvious about not having it on AD. It should be the obvious, "We have RDS, so obviously we are using AD."

          If there is a reason (and I can't think of any possible) to not have RDS on AD, you'll need to really spell it out, because I literally can't think of a possible reason to not have it on there.

          K PhlipElderP 2 Replies Last reply Reply Quote 1
          • scottalanmillerS
            scottalanmiller
            last edited by

            And by no possible reason, that includes things like "we don't use AD otherwise" and "we don't want more Windows licensing"... neither of which are applicable because they aren't relevant. Those would be common misconception reasons.

            1 Reply Last reply Reply Quote 0
            • K
              Kris_K @scottalanmiller
              last edited by

              @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

              travisdh1T KellyK scottalanmillerS 3 Replies Last reply Reply Quote 0
              • K
                Kris_K
                last edited by

                It's recommended to have AD for RDS, but it's not a requirement - https://www.dell.com/support/article/us/en/04/sln268318/how-to-deploy-windows-2012-remote-desktop-services-in-a-workgroup?lang=en

                DustinB3403D 1 Reply Last reply Reply Quote 0
                • travisdh1T
                  travisdh1 @Kris_K
                  last edited by travisdh1

                  @kris_k said in Ms licensing for a windows jump server:

                  @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                  If I was in front of a computer right now instead of my phone, I'd insert a facepalm.

                  In what possible way could running RDS not joined to a domain make any difference security wise? If users are going to access any resources on the domain, it's just making life harder on IT for zero benefit. The only way this makes sense it's if someone doesn't trust the security of the authentication mechanism already in use, which is a whole other can of worms to open.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • KellyK
                    Kelly @Kris_K
                    last edited by

                    @kris_k said in Ms licensing for a windows jump server:

                    @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                    You're actually increasing the attack surface of the RDS server by having the accounts local to the server instead of on the AD server. You're increasing the attack surface of the AD server by allowing the RDS server on the edge. This might seem like a splitting of hairs, but if you have a proper DMZ and your AD server is properly isolated and secured it is a reasonable exposure. If it is AD joined the accounts are on the AD server and there is no additional access granted. However if they are local there is the potential of having additional accounts compromised aside from the one that was used for the initial access. Does that make sense?

                    scottalanmillerS 1 Reply Last reply Reply Quote 1
                    • DustinB3403D
                      DustinB3403 @Kris_K
                      last edited by

                      @kris_k said in Ms licensing for a windows jump server:

                      It's recommended to have AD for RDS, but it's not a requirement - https://www.dell.com/support/article/us/en/04/sln268318/how-to-deploy-windows-2012-remote-desktop-services-in-a-workgroup?lang=en

                      Recommended because you have additional security solutions in place by using AD to trust who is using your RDS server.

                      @kris_k said in Ms licensing for a windows jump server:

                      @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                      @travisdh1 I got you 🤦

                      scottalanmillerS 1 Reply Last reply Reply Quote 1
                      • PhlipElderP
                        PhlipElder @scottalanmiller
                        last edited by

                        @scottalanmiller There are "ways" to make a RDS setup work without AD. They are not officially supported but can be done.

                        For a Jump box set up an isolated Private virtual network that both the DC and the RDS Broker/Gateway/Web and Session Host sit on.

                        Use a *NIX freebie edge VM with two NICs with a VLAN structure set up to allow communication from the outside (I suspect this is needed?).

                        Cloud/Internet HTTPS --> Production Edge --> VLAN to *NIX Edge vNIC ---> Edge --> Gateway subnet vNIC --> RD Broker/Gateway/Web --> Session Host --> Jump endpoint.

                        scottalanmillerS 2 Replies Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @PhlipElder
                          last edited by

                          @phlipelder said in Ms licensing for a windows jump server:

                          @scottalanmiller There are "ways" to make a RDS setup work without AD. They are not officially supported but can be done.

                          That's normally the case with most requirements. But .... why?

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Kris_K
                            last edited by

                            @kris_k said in Ms licensing for a windows jump server:

                            @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                            No additional attack surface.

                            1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @travisdh1
                              last edited by

                              @travisdh1 said in Ms licensing for a windows jump server:

                              @kris_k said in Ms licensing for a windows jump server:

                              @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                              If I was in front of a computer right now instead of my phone, I'd insert a facepalm.

                              In what possible way could running RDS not joined to a domain make any difference security wise? If users are going to access any resources on the domain, it's just making life harder on IT for zero benefit. The only way this makes sense it's if someone doesn't trust the security of the authentication mechanism already in use, which is a whole other can of worms to open.

                              There are benefits to it being on a DIFFERENT domain. But not to having no domain at all.

                              PhlipElderP 1 Reply Last reply Reply Quote 0
                              • PhlipElderP
                                PhlipElder
                                last edited by

                                2FA ought to be a part of this consideration.

                                1 Reply Last reply Reply Quote 1
                                • PhlipElderP
                                  PhlipElder @scottalanmiller
                                  last edited by

                                  @scottalanmiller said in Ms licensing for a windows jump server:

                                  @travisdh1 said in Ms licensing for a windows jump server:

                                  @kris_k said in Ms licensing for a windows jump server:

                                  @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                                  If I was in front of a computer right now instead of my phone, I'd insert a facepalm.

                                  In what possible way could running RDS not joined to a domain make any difference security wise? If users are going to access any resources on the domain, it's just making life harder on IT for zero benefit. The only way this makes sense it's if someone doesn't trust the security of the authentication mechanism already in use, which is a whole other can of worms to open.

                                  There are benefits to it being on a DIFFERENT domain. But not to having no domain at all.

                                  Concur.

                                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                                  • scottalanmillerS
                                    scottalanmiller @Kelly
                                    last edited by

                                    @kelly said in Ms licensing for a windows jump server:

                                    You're actually increasing the attack surface of the RDS server by having the accounts local to the server instead of on the AD server.

                                    Because of caching, local is just as secure. Local is actually more secure. But you can run AD locally, making it both AD and local at the same time. While making it not part of the existing AD.

                                    KellyK 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @DustinB3403
                                      last edited by

                                      @dustinb3403 said in Ms licensing for a windows jump server:

                                      @kris_k said in Ms licensing for a windows jump server:

                                      It's recommended to have AD for RDS, but it's not a requirement - https://www.dell.com/support/article/us/en/04/sln268318/how-to-deploy-windows-2012-remote-desktop-services-in-a-workgroup?lang=en

                                      Recommended because you have additional security solutions in place by using AD to trust who is using your RDS server.

                                      AD is not "extra" security. AD offers "ease of management" of accounts, but not more security.

                                      1 Reply Last reply Reply Quote 2
                                      • scottalanmillerS
                                        scottalanmiller @PhlipElder
                                        last edited by

                                        @phlipelder said in Ms licensing for a windows jump server:

                                        For a Jump box set up an isolated Private virtual network that both the DC and the RDS Broker/Gateway/Web and Session Host sit on.
                                        endpoint.

                                        You'd absolutely still want AD in that scenario. No matter how isolated it is, that's never a reason for dropping AD for RDS.

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @PhlipElder
                                          last edited by

                                          @phlipelder said in Ms licensing for a windows jump server:

                                          @scottalanmiller said in Ms licensing for a windows jump server:

                                          @travisdh1 said in Ms licensing for a windows jump server:

                                          @kris_k said in Ms licensing for a windows jump server:

                                          @scottalanmiller The reason for having a jump server not connected to AD is to reduce the attack surface if the jump server gets compromised.

                                          If I was in front of a computer right now instead of my phone, I'd insert a facepalm.

                                          In what possible way could running RDS not joined to a domain make any difference security wise? If users are going to access any resources on the domain, it's just making life harder on IT for zero benefit. The only way this makes sense it's if someone doesn't trust the security of the authentication mechanism already in use, which is a whole other can of worms to open.

                                          There are benefits to it being on a DIFFERENT domain. But not to having no domain at all.

                                          Concur.

                                          This is all that I'm thinking... run a single AD instance on the RDS server itself to hand out AD for RDS, but AD that is 100% isolated to the RDS box. No open ports, no shared AD.

                                          K 1 Reply Last reply Reply Quote 1
                                          • KellyK
                                            Kelly @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in Ms licensing for a windows jump server:

                                            @kelly said in Ms licensing for a windows jump server:

                                            You're actually increasing the attack surface of the RDS server by having the accounts local to the server instead of on the AD server.

                                            Because of caching, local is just as secure. Local is actually more secure. But you can run AD locally, making it both AD and local at the same time. While making it not part of the existing AD.

                                            As I understand it, caching stores verifiers rather than the whole of the account.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post