Skip to content

Enterprise Mobility + Security

Too Much of a Good Thing

  A while back I wrote a blog post about setting up Kerberos constrained delegation. As a bit of an re-introduction, a lot of the value of the Kerberos authentication protocol is that it allows an application or service to impersonate a user in order to get resources on that users behalf. This impersonation is...

Read more

TS Gateway Certificates Part III: Connection Time Issues related to TS Gateway Certificates

This is the third and final part of our recent series on configuring certificates on TS Gateway. See also Part I and Part II Background TS clients authenticate TS Gateway server using server security certificates (X.509 format). TS Gateway passes the server security certificate to the clients during the SSL handshake process. During the SSL...

Read more

Scary Sounding Errors

We have a temporary role in CSS where support folks will help out in supporting prerelease (also known as beta) software.  I’ve worked a couple of Windows betas, and it’s a great experience.  I mention this since I remember a few years ago during the beta of a prior Windows release where there was an...

Read more

Introduction to TS Gateway Certificates

Why does TS Gateway need a certificate? A TS Gateway certificate is used for authentication and secure communication purposes by the TS clients. To appreciate the purpose of TS Gateway certificates, you will need to understand SSL communication. As illustrated in the following diagram and described in the steps below, a TS client launches an...

Read more