MFA for Remote Desktop

Option 1: Duo MFA for RDP (fast, easy, proven)

Pros:

  • Quick to deploy (literally <30 min).
  • Protects both console and RDP logins.
  • Works with your existing domain users.
  • Simple rollback if needed.

High-level install steps:

  1. Create a Duo account (free trial or paid).
  2. Add a new “Windows Logon” application in Duo Admin Panel.
  3. Download and install Duo Authentication for Windows Logon on the server.
  4. During install, enter the integration key, secret key, and API hostname from Duo.
  5. (Optional) Set policies (e.g., allow offline logins if Duo is unreachable).
  6. Test RDP — it will now prompt for MFA after entering username/password.

▶ Link to official Duo guide:
Duo MFA for Windows RDP – Step-by-Step


Option 2: Azure MFA with NPS Extension (Microsoft “native” method)

Pros:

  • Fully integrates with Azure AD / Conditional Access policies.
  • No Duo or 3rd-party dependency.
  • Centralizes MFA rules.

High-level install steps:

  1. Install NPS (Network Policy Server) role on a management server (can be a VM).
  2. Install the NPS Extension for Azure MFA.
  3. Register the server with Azure AD (tenant-level app registration).
  4. Configure RADIUS authentication on NPS.
  5. Point RDP servers to use NPS for auth (via RADIUS Client settings).
  6. Optional: Set conditional policies (e.g., MFA only from external IPs).

▶ Link to official Microsoft guide:
Configure NPS Extension for Azure MFA


Recommendation:

  • If you already use Azure AD + Conditional Access, go with Option 2.
  • If you want something faster, easier, and simple to manageDuo is the better choice.
  • Both are production-ready, supported, and widely used.

Leave a Reply

Your email address will not be published. Required fields are marked *

Share on Social Media