Skip to content

Commit 6229fdf

Browse files
mamoreau-devolutionsawakecoding
authored andcommitted
update tile image and readme
1 parent bb2811a commit 6229fdf

File tree

3 files changed

+36
-2
lines changed

3 files changed

+36
-2
lines changed

README.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,23 @@ Set-ItemProperty -Path $RdpCredProvRegPath -Name "AutoLogonWithDefault" -Value 1
5151
Set-ItemProperty -Path $RdpCredProvRegPath -Name "UseDefaultCredentials" -Value 1 -Type DWORD
5252
```
5353

54-
Those credentials will be used automatically in the Hyper-V enhanced session mode. If you want to enable autologon in the Hyper-V basic session mode, set the following registry keys:
54+
Those credentials will be used automatically in the Hyper-V enhanced session mode, and inside a RDP session with RDP NLA disabled. Here are a few example user names with their correct mapping for reference:
55+
56+
**Administrator** (local account):
57+
* DefaultUserName: "Administrator"
58+
* DefaultDomainName: "."
59+
60+
**IT-HELP\Administrator** (domain account):
61+
* DefaultUserName: "Administrator"
62+
* DefaultDomainName: "IT-HELP"
63+
64+
**Administrator@ad.it-help.ninja** (domain account):
65+
* DefaultUserName: "Administrator@ad.it-help.ninja"
66+
* DefaultDomainName: ""
67+
68+
### Console Session
69+
70+
If you want to enable autologon in the Hyper-V basic session mode, or with the physical (console) session, set the following registry keys:
5571

5672
```powershell
5773
$RdpCredProvRegPath = "HKLM:\SOFTWARE\Devolutions\RdpCredProv"
@@ -60,6 +76,24 @@ $WinlogonRegPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
6076
Set-ItemProperty -Path $WinlogonRegPath -Name "DisableCAD" -Value 1 -Type DWORD
6177
```
6278

79+
### RDP without NLA
80+
81+
For regular RDP, a credential provider can only *complement* RDP NLA but not *substitute* it. The only way to really perform autologon in RDP where the client sends no credentials is to disable RDP NLA on the client and server.
82+
83+
With mstsc.exe, save your .RDP file (Default.rdp) and add or edit the following line to it: `enablecredsspsupport:i:0`.
84+
85+
In the RDP server, ensure RDP NLA enforcement is disabled:
86+
87+
```powershell
88+
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name 'UserAuthentication' -Value 0
89+
```
90+
91+
You should now be able to connect with no credentials sent from the client, with a server that will perform automatic logon with the saved credentials.
92+
93+
## RDP with NLA
94+
95+
RDP NLA performs NTLM or Kerberos authentication *before* the full credentials are delegated to the server and sent to Winlogon. This means it is unfortunately not possible for the server to just connect without authenticating, and have the credential provider perform autologon on behalf of the client. The only thing the credential provider can do is customize the authentication with additional steps, but it cannot fully replace it. For this reason, the current credential provider does nothing useful with RDP NLA.
96+
6397
## Logging
6498

6599
To enable logging, set the **LogEnabled** registry key. The log files will be located in "%ProgramData%\RdpCredProv":

RdpCredProv/TileImage.bmp

60 KB
Binary file not shown.

RdpCredProv/common.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ static const FIELD_STATE_PAIR s_rgFieldStatePairs[] =
3535

3636
static const CREDENTIAL_PROVIDER_FIELD_DESCRIPTOR s_rgCredProvFieldDescriptors[] =
3737
{
38-
{ SFI_TILEIMAGE, CPFT_TILE_IMAGE, L"Image", },
38+
{ SFI_TILEIMAGE, CPFT_TILE_IMAGE, L"Devolutions", CPFG_CREDENTIAL_PROVIDER_LOGO },
3939
{ SFI_USERNAME, CPFT_EDIT_TEXT, L"User name", CPFG_LOGON_USERNAME },
4040
{ SFI_PASSWORD, CPFT_PASSWORD_TEXT, L"Password", CPFG_LOGON_PASSWORD },
4141
{ SFI_SUBMIT_BUTTON, CPFT_SUBMIT_BUTTON, L"Submit" },

0 commit comments

Comments
 (0)