preview.jpg

How to Enable Passwordless RDP with FIDO2 Security Keys in Microsoft Intune

Remote Desktop Protocol (RDP) is a popular protocol that allows you to remotely access and manage Windows computers. Enter in your machine’s name or IP address, provide your username and password, and you can access your desktop from anywhere. However, RDP opens up a potential attack vector for cybercriminals, especially if you are using weak or reused passwords. To enhance the security of your RDP sessions, you can enable passwordless authentication using FIDO2 security keys in Microsoft Intune. This guide will walk you through the steps to set up passwordless RDP with FIDO2 security keys in Microsoft Intune.

What are FIDO2 Passkeys and How Are They Stronger than Passwords?

FIDO2 passkeys are a modern authentication method where instead of a username and password, you use a hardware security key (like a YubiKey) or a built-in biometric authentication method (like Windows Hello) to authenticate. Instead of memorizing a password (what you know), you authenticate with a physical device (what you have) or a biometric factor (what you are). This makes FIDO2 passkeys much stronger than traditional passwords, as they are resistant to phishing attacks, credential stuffing, and other common password-based attacks. Plus, when paired with a PIN or biometric check, they provide multi-factor authentication without the need for a password. In fact, at Keytos Security we only use passwordless authentication methods, and our engineers don’t even have passwords for their accounts.

Interested in moving to passwordless and unphishable FIDO2 passkeys? Our blog post walks you through how to onboard users to FIDO2 security keys in Entra ID, which is a prerequisite for using them for passwordless RDP.

Learn How to Onboard YubiKeys for Azure CBA and FIDO2 in Entra ID

How to Configure Microsoft Intune to Push Out Passwordless RDP with FIDO2 Security Keys

It’s easy to configure passwordless RDP using Microsoft Intune. There are two main Configuration profiles you’ll be creating in Intune:

  1. A Device Configuration profile to enable RDP and FIDO2 authentication on the target machines.
  2. An Endpoint Security Firewall profile to open port 3389 for RDP traffic.

Prerequisites for Enabling Passwordless RDP

  • You need to enable FIDO2 security keys as an authentication method and have users register their security keys in Entra ID. Learn how to do that here.
  • You need to have Microsoft Intune set up with devices enrolled.

How to Enable RDP and FIDO2 Authentication in Microsoft Intune

The first step to moving to passwordless RDP is to enable RDP on the target machines. You can do this using Intune by creating a device configuration profile with the required settings.

  1. Navigate to the Intune portal.

  2. From the left-hand menu, select Devices.

    Select Devices in Intune
  3. Under Manage devices, select Configuration.

    Select Configuration in Intune
  4. Click on + Create+ New Policy.

    Create a new profile in Intune
  5. Select Windows 10 and later as the platform and Settings catalog as the profile type, then click Create.

    Select profile type in Intune
  6. Give your new policy a name and a description, then click Next.

    Configure the basics of the Intune profile
  7. Click + Add settings and add the following settings:

    • Allow users to connect remotely using Remote Desktop Services: Enabled
    • Require user authentication for remote connections by using Network Level Authentication: Enabled
    • Use Security Key for Signin: Enabled
    Configure the settings of the Intune profile
  8. Set any Scope tags if needed, then click Next.

  9. Under Assignments, select the groups of devices you want to apply this policy to, then click Next.

    Assign the Intune profile to device groups
  10. Review your settings, then click Create to create the policy.

The next time your managed devices sync with Intune, they will receive the new configuration profile, and RDP will be enabled along with FIDO2 authentication. However, you won’t be able to use your FIDO2 security keys just yet, as you still need to configure a firewall rule.

How to Open RDP Port 3389 in Microsoft Intune Firewall Settings

While enabling RDP directly in Windows Settings also enables the required firewall rules, the same is not true when enabling RDP through Intune. You need to create a new firewall rule in Intune to allow RDP traffic on port 3389.

  1. In the Intune portal, navigate to Endpoint Security

    Select Endpoint Security in Intune
  2. Under Manage, select Firewall and click on + Create Policy.

    Create a new firewall policy in Intune
  3. Select Windows as the Platform and Windows Firewall Rules as the Profile, then click Create.

    Select firewall policy type in Intune
  4. Under Basics, give your new firewall policy a name and a description, then click Next.

    Configure the basics of the Intune firewall policy
  5. Under Configuration settings, click on + Add.

  6. Enter a friendly name for the rule, select Allow as the Action, and click Edit instance.

  7. Enter the following settings for the firewall rule:

    • Enabled: Enabled
    • Interface Types: Set as needed (e.g. Lan, Wireless, etc.). Choose only the interfaces you want to allow RDP traffic on and where you expect to use RDP from.
    • File Path: Set to Configured with value %SystemRoot%\System32\svchost.exe.
    • Edge Traversal: Disabled
    • Network Types: Recommended to restrict to FW_PROFILE_TYPE_DOMAIN and FW_PROFILE_TYPE_PRIVATE to avoid allowing RDP traffic on public networks, but set as needed.
    • Local Port Ranges: Click + Add and add 3389 to allow RDP traffic.
    • Protocol: Select Configured and choose 6 (TCP).
    • Direction: Inbound
    Configure the settings of the Intune firewall policy
  8. Review your settings and click Save.

    Configure the firewall rule in Intune

The next time your managed devices sync with Intune, they will receive the new firewall policy, and RDP traffic on port 3389 will be allowed. You can now use your FIDO2 security keys to authenticate when connecting to your remote desktop via RDP.

How to RDP Into a Remote Machine Using FIDO2 Security Keys

Now that you have your remote machine configured for passwordless RDP with FIDO2 security keys, you can connect to it using the Remote Desktop client on Windows.

  1. Open Remote Desktop Connection on your Windows machine.

  2. In the Computer field, enter the name or IP address of the remote machine you want to connect to.

  3. Click on Show Options to expand the options, then navigate to the Advanced tab.

  4. Under User authentication, check the box for Use a web account to sign in to the remote computer.

    Configure RDP connection options for FIDO2 authentication
  5. Back in the General tab, enter your Entra ID email address in the User name field. Click Connect to initiate the connection.

    Configure RDP connection options for FIDO2 authentication
  6. A pop-up window will appear asking you to sign-in with your web account. Follow the prompts to authenticate using your FIDO2 security key (e.g. insert your YubiKey and enter your PIN or use Windows Hello biometric authentication).

    Authenticate RDP connection with FIDO2 security key
  7. Once authenticated, you will be connected to your remote desktop without ever having to enter a password!

    Authenticate RDP connection with FIDO2 security key

Check out our video walkthrough of these steps, along with some troubleshooting tips:

Further Reading - How to RDP into Hybrid Joined Devices and From Other Users

While the above steps are great for enabling passwordless RDP to Entra ID joined devices using FIDO2 security keys, you may have other scenarios where you want to use passwordless RDP that require additional configuration. For example, if you want to RDP into a hybrid Azure AD joined device, you will need some additional configuration to allow the device to use FIDO2 authentication for RDP. Additionally, if you want to RDP from a different user than the one which owns the machine, you will also need to configure group access. Learn more about these advanced settings in this Microsoft blog post.

Learn How to Configure Advanced Settings for Passwordless RDP with FIDO2 Security Keys

Conclusion - Going Passwordless Doesn’t Have to Limit You

A big concern we often hear from organizations when they are considering going passwordless is that it will limit their users’ experience or prevent them from using certain applications or services. Thankfully, most applications and services out there today fully support passwordless authentication methods like FIDO2 security keys, and RDP is no exception. Entra ID takes care of the authentication process and FIDO2 passkey auth flows, allowing you and your apps to seamlessly use passwordless credentials.

Looking to start your passwordless journey? Set up a free assessment with an identity expert today to learn how EZCMS can help you easily onboard users to FIDO2 security keys and other passwordless authentication methods, and provide a seamless and secure remote onboarding experience for your users.

Learn How EZCMS Can Help You Go Passwordless