Windows Server
Local Agent
Gateway RDP Proxy
Zero-Day Shield

Enable SAML/OIDC SSO for RDP on Windows Server 2019 — Agent or Gateway Deployment

Microsoft

Add enterprise SSO to Windows Server 2019 RDP sessions. Authenticate via your corporate IdP instead of AD passwords. Deploy with local agent or gateway RDP proxy for agentless coverage.

Identity-Based RDP Access for Windows Server 2019

Windows Server 2019 remains one of the most widely deployed server operating systems in enterprise environments, running critical workloads from Active Directory and DNS to SQL Server, Exchange, and line-of-business applications. Its mainstream support ended in January 2024, meaning it now receives only security updates — yet millions of instances continue running in production. RDP authentication on Server 2019 still relies on AD credentials via NLA, offering no native path to SAML/OIDC SSO or centralized MFA from non-Microsoft identity providers. OnePAM solves this by providing two deployment options. The local agent installs on each Windows Server 2019 instance and intercepts the RDP credential provider flow, redirecting authentication to your corporate IdP (Okta, Azure AD, Google Workspace) before granting desktop access. The gateway RDP proxy operates as a dedicated OnePAM instance that authenticates users via SAML/OIDC and then brokers the RDP connection to the target server — no agent installation required. Both approaches deliver MFA enforcement, session recording, and compliance-ready audit trails.

Local Agent

Install the OnePAM agent on each Windows server. The agent intercepts RDP authentication and enforces SAML/OIDC SSO with Kerberos and Protected User support before granting desktop access — no gateway required.

Gateway RDP Proxy

Run a dedicated OnePAM gateway with native RDP protocol support. Users authenticate via SAML/OIDC at the gateway, which brokers the RDP session using Kerberos NLA. No agent needed on target servers.

RDP Security Risks on Windows Server 2019

Without identity-based RDP access, these risks threaten your Windows servers every day.

Windows Server 2019 has entered extended support — fewer proactive security improvements from Microsoft
BlueKeep (CVE-2019-0708) demonstrated that RDP zero-days can enable wormable remote code execution
RDP is the initial access vector in over 50% of ransomware incidents targeting Windows servers
NLA bypass vulnerabilities allow attackers to reach the RDP session without valid credentials

RDP Security Challenges

These are the risks organizations face with traditional RDP authentication.

AD Password Dependency

RDP on Server 2019 requires Active Directory passwords. Organizations cannot enforce SAML/OIDC SSO from Okta, Google Workspace, or other non-Microsoft IdPs. OnePAM bridges this with native Kerberos authentication combined with SAML/OIDC SSO.

Extended Support Phase

Server 2019 mainstream support ended in January 2024. Security-only updates mean fewer protections against emerging RDP attack techniques.

NTLM Fallback Risk

Without Kerberos enforcement and Protected User group support, RDP connections can fall back to NTLM, exposing credentials to relay and pass-the-hash attacks.

Ransomware Target

RDP-exposed Windows Server 2019 instances are the primary entry point for ransomware groups using brute-force and stolen credentials.

No Built-In Session Recording

Windows Server 2019 does not provide native RDP session recording. Event logs capture login events but not session activity.

Lateral Movement Risk

Once an attacker compromises one server via RDP, they use the same AD credentials to move laterally. Kerberos with Protected User enforcement and short-lived tokens breaks this chain.

How OnePAM Adds SSO to Windows Server 2019 RDP

Step-by-step guide to deploying identity-based Windows RDP access.

1

Choose Agent or Gateway Mode

Install the OnePAM agent on Server 2019 for direct SSO, or deploy a gateway RDP proxy for zero-install protection.

Agent mode provides deep integration with the Windows credential provider. Gateway mode is ideal for servers you cannot install software on, or for centralized session management.
2

Connect Your Corporate IdP

Configure your SAML 2.0 or OIDC identity provider — Okta, Azure AD, Google Workspace, Ping Identity, or any compliant provider.

OnePAM handles IdP discovery, assertion validation, and token verification. Users experience a familiar browser-based login before their RDP session starts.
3

Map Users to Windows Accounts

Define mappings between IdP identities and Windows user accounts (local or domain) for RDP session creation.

Supports UPN matching, email-to-SAMAccountName mapping, group-based role assignment, and just-in-time account provisioning.
4

Set Access Policies

Create granular policies: who can RDP into which servers, with what MFA, from which locations, during which hours.

Policies are evaluated per connection attempt. Deny by default. Contractors get time-boxed access; admins get persistent access with step-up MFA.
5

Monitor and Record

Audit every RDP session with identity context. Enable visual session recording for compliance and incident response.

Full audit trail: IdP identity, MFA method, device info, geo-location, session duration, and optional video-like recording of the entire RDP session.

Business Impact of SSO for Windows Server 2019 RDP

Measurable security and operational outcomes from deploying OnePAM Windows RDP SSO.

Kerberos NLA with Protected User

OnePAM authenticates to Server 2019 via Kerberos NLA with Protected User group enforcement, blocking NTLM downgrade and credential theft attacks.

Kerberos + Protected User

Block Ransomware Initial Access

RDP brute-force and credential stuffing attacks fail because OnePAM requires IdP-verified authentication — no passwords to spray.

100% brute-force attacks blocked

Extend Server 2019 Security

As Server 2019 enters extended support, OnePAM provides a compensating control layer with native RDP protocol handling that shields from new vulnerabilities.

Compensating control for EOL risk

MFA Without Azure AD Premium

Enforce MFA on every RDP session using Okta, Google, Duo, or any IdP — no Azure AD Premium or NPS RADIUS required.

MFA with any IdP

Compliance-Ready Recordings

Visual RDP session recordings satisfy SOC 2, HIPAA, and PCI DSS requirements for privileged access monitoring.

Full session visibility

Vendor-Neutral SSO

Not locked to Azure AD or Microsoft's ecosystem. Use any SAML/OIDC provider for RDP authentication.

Any IdP, any RDP server

Windows RDP SSO Capabilities

Every feature needed for enterprise-grade Windows RDP authentication.

SAML 2.0 & OIDC SSO for Windows Server 2019 RDP
Agent and gateway deployment modes
MFA via any SAML/OIDC IdP (Okta, Azure AD, Google, Duo)
Visual RDP session recording
IdP group-to-AD group synchronization
Just-in-time local account creation
Time-limited RDP access windows
IP/geo-based access restrictions
Device trust verification
Concurrent session and idle timeout policies

Zero-Day Protection Features

Enterprise-grade security controls for RDP access.

Identity-verified RDP connections only
TLS encryption for all RDP traffic
RDP protocol inspection and filtering
Automatic session termination on IdP logout
Clipboard/drive redirection controls
Network isolation via gateway mode

Windows Server 2019 RDP SSO Use Cases

Common scenarios where organizations deploy OnePAM Windows RDP SSO.

1
Protecting legacy Windows Server 2019 workloads during extended support with identity-based RDP access
2
Enforcing MFA for RDP to Server 2019 SQL Server and Exchange hosts
3
Providing recorded RDP access for contractors managing Server 2019 infrastructure
4
Meeting SOC 2 and HIPAA audit requirements for privileged RDP access to production servers
5
Securing hybrid environments with both Server 2019 and Server 2022 under a unified RDP SSO policy
6
MSPs managing multi-tenant Windows Server 2019 environments with per-customer IdP integration

Windows Server 2019 RDP SSO FAQ

Common questions about Windows RDP SSO and zero-day protection.

Does OnePAM work with Windows Server 2019 in extended support?

Yes. OnePAM is fully compatible with Windows Server 2019 in its extended support phase. It provides a compensating security control that enhances RDP security regardless of Microsoft's support lifecycle.

Can I migrate from Windows Server 2019 to 2022 while keeping OnePAM?

Yes. OnePAM policies and configurations work across Windows Server versions. You can migrate servers incrementally while maintaining consistent RDP SSO and access policies.

How does OnePAM compare to Microsoft's NPS RADIUS MFA for RDP?

OnePAM is simpler and more flexible. NPS RADIUS requires Azure AD Premium licensing, NPS server infrastructure, and complex configuration. OnePAM works with any SAML/OIDC provider out of the box and adds session recording and policy enforcement.

What RDP clients are supported?

OnePAM works with any standard RDP client — Microsoft Remote Desktop (MSTSC), Remote Desktop Connection Manager, Royal TS, and browser-based RDP via the OnePAM web portal.

Does gateway mode expose my servers to the internet?

No. In gateway mode, only the OnePAM gateway is reachable. Target Windows servers are network-isolated and only accept RDP connections from the gateway. Attackers cannot reach the servers directly.

Secure Windows Server 2019 RDP with Enterprise SSO.

Add SAML/OIDC authentication, MFA, and session recording to Windows Server 2019 RDP — via local agent or gateway proxy.