You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article describes the methods to configure listener certificates on a Windows Server that is not part of a Remote Desktop Services (RDS) deployment.
16
+
This article describes the methods to configure listener certificates on a Windows Server that isn't part of a Remote Desktop Services (RDS) deployment.
17
17
18
18
_Original KB number:_ 3042780
19
19
20
20
## About Remote Desktop server listener availability
21
21
22
-
The listener component runs on the Remote Desktop server and is responsible for listening to and accepting new Remote Desktop Protocol (RDP) client connections. This lets users establish new remote sessions on the Remote Desktop server. There is a listener for each Remote Desktop Services connection that exists on the Remote Desktop server. Connections can be created and configured by using the Remote Desktop Services Configuration tool.
22
+
The listener component runs on the Remote Desktop server and is responsible for listening to and accepting new Remote Desktop Protocol (RDP) client connections. This lets users establish new remote sessions on the Remote Desktop server. There's a listener for each Remote Desktop Services connection that exists on the Remote Desktop server. Connections can be created and configured by using the Remote Desktop Services Configuration tool.
23
23
24
24
## Configure Remote Desktop server listener certificate
@@ -32,23 +32,23 @@ The Remote Desktop Configuration Manager MMC snap-in enables you direct access t
32
32
::: zone-end
33
33
::: zone pivot="windows-server-2012"
34
34
35
-
The MMC method is not available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
35
+
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
36
36
37
37
::: zone-end
38
38
::: zone pivot="windows-11-or-server-2025"
39
39
40
-
The MMC method is not available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
40
+
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
The configuration data for the RDS listener is stored in the `Win32_TSGeneralSetting` class in WMI under the `Root\CimV2\TerminalServices` namespace.
47
47
48
48
The certificate for the RDS listener is referenced through the **Thumbprint** value of that certificate on a **SSLCertificateSHA1Hash** property. The thumbprint value is unique to each certificate.
49
49
50
50
> [!NOTE]
51
-
> Before you run the commands, the certificate that you want to use must be imported to the **Personal** certificate store for the computer account (via `certlm.msc`). If you do not import the certificate, you will receive an **Invalid Parameter** error.
51
+
> Before you run the commands, the certificate that you want to use must be imported to the **Personal** certificate store for the computer account (via `certlm.msc`). If you don't import the certificate, you'll receive an **Invalid Parameter** error.
52
52
53
53
To configure a certificate by using WMI, follow these steps:
54
54
@@ -72,48 +72,48 @@ To configure a certificate by using WMI, follow these steps:
72
72
73
73
Make sure that this ASCII character is removed before you run the command to import the certificate.
74
74
75
-
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This is not visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
75
+
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
76
76
77
-
4. At command prompt, run the following wmic command together with the thumbprint value that you obtain in step 3:
77
+
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
78
78
79
79
```console
80
80
wmic /namespace:\\root\cimv2\TerminalServices PATH Win32_TSGeneralSetting Set SSLCertificateSHA1Hash="THUMBPRINT"
81
81
```
82
82
83
83
The following screenshot is a successful example:
84
84
85
-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the wmic command together with the thumbprint value that you obtain in step 3." border="false":::
85
+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the `wmic` command together with the thumbprint value that you obtain in step 3." border="false":::
86
86
87
87
::: zone-end
88
88
::: zone pivot="windows-server-2012"
89
89
90
-
2. Scroll down to the **Thumbprint** field and copy the spacedelimited hexadecimal string into something like Notepad.
90
+
2. Scroll down to the **Thumbprint** field and copy the space-delimited hexadecimal string into a text editor like Notepad.
91
91
92
-
The following screenshot is an example of the certificate thumbprint in the **Certificate** properties:
92
+
The following screenshot shows an example of the certificate thumbprint in the **Certificate** properties:
93
93
94
94
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
95
95
96
-
If you copy the string into Notepad, it should resemble the following screenshot:
96
+
When you copy the string into Notepad, it should look like the following screenshot:
97
97
98
98
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-string-in-notepad.png" alt-text="Copy and paste the thumbprint string into Notepad.":::
99
99
100
-
After you remove the spaces in the string, it still contains the invisible ASCII character that is only visible at the command prompt. The following screenshot is an example:
100
+
After you remove the spaces in the string, it still contains an invisible ASCII character that is only visible at the command prompt. The following screenshot shows an example:
101
101
102
102
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/ascii-character-in-command-prompt.png" alt-text="The invisible ASCII character that is only shown at the command prompt." border="false":::
103
103
104
-
Make sure that this ASCII character is removed before you run the command to import the certificate.
104
+
Ensure that this ASCII character is removed before you run the command to import the certificate.
105
105
106
-
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This is not visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
106
+
3. Remove all spaces from the string. There might be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
107
107
108
-
4. At command prompt, run the following wmic command together with the thumbprint value that you obtain in step 3:
108
+
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
109
109
110
110
```console
111
111
wmic /namespace:\\root\cimv2\TerminalServices PATH Win32_TSGeneralSetting Set SSLCertificateSHA1Hash="THUMBPRINT"
112
112
```
113
113
114
-
The following screenshot is a successful example:
114
+
The following screenshot shows a successful example:
115
115
116
-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the wmic command together with the thumbprint value that you obtain in step 3." border="false":::
116
+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the `wmic` command together with the thumbprint value that you obtain in step 3." border="false":::
117
117
118
118
::: zone-end
119
119
::: zone pivot="windows-11-or-server-2025"
@@ -123,15 +123,15 @@ To configure a certificate by using WMI, follow these steps:
123
123
124
124
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property-w11.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
125
125
126
-
3. At command prompt, run the following powershell command together with the thumbprint value that you obtain in step 2:
126
+
3. At command prompt, run the following PowerShell command together with the thumbprint value that you obtain in step 2:
The following screenshot shows a successful example:
133
133
134
-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-powershell-commands.png" alt-text="A successful example of running the powershell command together with the thumbprint value that you obtain in step 2." border="false":::
134
+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-powershell-commands.png" alt-text="A successful example of running the PowerShell command together with the thumbprint value that you obtain in step 2." border="false":::
135
135
136
136
::: zone-end
137
137
@@ -164,14 +164,14 @@ To configure a certificate by using registry editor, follow these steps:
164
164
165
165
To change the permissions, follow these steps on the Certificates snap-in for the local computer:
166
166
167
-
1. Click **Start**, click **Run**, type *mmc*, and then click **OK**.
168
-
2. On the **File** menu, click **Add/Remove Snap-in**.
169
-
3. In the **Add or Remove Snap-ins** dialog box, on the **Available snap-ins** list, click **Certificates**, and then click **Add**.
170
-
4. In the **Certificates** snap-in dialog box, click **Computer account**, and then click **Next**.
171
-
5. In the **Select Computer** dialog box, click **Local computer: (the computer this console is running on)**, and then click **Finish**.
172
-
6. In the **Add or Remove Snap-ins** dialog box, click **OK**.
167
+
1. Select **Start**, select **Run**, type *mmc*, and then select **OK**.
168
+
2. On the **File** menu, select **Add/Remove Snap-in**.
169
+
3. In the **Add or Remove Snap-ins** dialog box, on the **Available snap-ins** list, select **Certificates**, and then select **Add**.
170
+
4. In the **Certificates** snap-in dialog box, select **Computer account**, and then select **Next**.
171
+
5. In the **Select Computer** dialog box, select **Local computer: (the computer this console is running on)**, and then select **Finish**.
172
+
6. In the **Add or Remove Snap-ins** dialog box, select **OK**.
173
173
7. In the **Certificates** snap-in, on the console tree, expand **Certificates (Local Computer)**, expand **Personal**, and then select the SSL certificate that you want to use.
174
174
8. Right-click the certificate, select **All Tasks**, and then select **Manage Private Keys**.
175
-
9. In the **Permissions** dialog box, click **Add**, type *NETWORK SERVICE*, click **OK**, select **Read** under the **Allow** check box, and then click **OK**.
175
+
9. In the **Permissions** dialog box, select **Add**, type *NETWORK SERVICE*, select **OK**, select **Read** under the **Allow** check box, and then select **OK**.
0 commit comments