
When this setting is enabled on the machine from which you are trying to launch the remote desktop client (and not on the target remote server), you will receive the error message we have seen above. As I said, our security team (more focused on blocking access to system than helping us in providing good service to our customers) decided without discussing with us to apply this new group policy settings.Īs you can see in the screenshot below, there is indeed a new settings available since Windows 8/Windows 2012 and later called “Restrict delegation of Credentials to remote Servers”. rights to access remotely servers was grantedĮverything was OK and still it was not able to connect to the server…What’s was happening ? The Solutionīasically, there is a new Group policy settings that can prevent a system to pass credentials to a remote server.
2012 R2 REMOTE DESKTOP SERVICES PASSWORD EXPIRED WINDOWS 8
If you have d eployed Windows 8 (or later) in your infrastructure, end users accessing the RemoteApp infrastructure might also end up with the same situation.Īs a first debug steps, the user had checked that For example, blank Passwords are not allowed, sign-in times are limited or a policy restriction has been enforced.

The user with administrative rights was trying to perform a remote desktop connection from a Windows 2012 server and it failed with the following error messageĪccount restrictions are preventing this user from signing in. We have been deploying 2012 R2 RDS infrastructure and some of the administrators need time to time to perform Remote Desktop Connection to other servers for administration purposes.

Let’s quickly explain the problem and the quick fix to such situation…. In this post, a end user and an administrator can be blocked in their attempt to use the Remote Desktop Services technology if you security guys have hardened too much your servers and workstations.

In the previous post, we have describe a small issue that user can encounter when using mstsc.exe and switches tool in the wrong way.
