Windows OS Hub
  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu

 Windows OS Hub / Group Policies / Allow Non-admin Users RDP Access to Windows Server

May 23, 2023 Active DirectoryGroup PoliciesWindows Server 2016Windows Server 2019

Allow Non-admin Users RDP Access to Windows Server

By default, the RDP access to the desktop of Windows Server member servers or Active Directory domain controllers are restricted to users added to the local Administrators or Domain Admins groups. In this post, we’ll show you how to grant non-admin users RDP access to Windows Server hosts or domain controllers without assigning them local admin rights.

Contents:
  • To Sign in Remotely, You Need the Right to Sign in Through Remote Desktop Services
  • Allow RDP Access to Domain Controller for Non-Admin User
  • How to Allow Log on Through Remote Desktop Services?
  • The Requested RDP Session Access is Denied

By default, Windows security settings allow a remote user to make RDP connections through Remote Desktop Services (TermService) if:

  • The user is a member of the local Administrators or Remote Desktop Users group;
  • The local Allow the log on through Remote Desktop Services policy allows the user to connect.

To Sign in Remotely, You Need the Right to Sign in Through Remote Desktop Services

The user receives an error when attempting to remotely connect to the Windows Server desktop:

To sign in remotely, you need the right to sign in Remote Desktop Services. By default only members of the Administrators group have this right. If the group you’re in doesn’t have this right, or if the right has been removed from Administrators group, you need to be granted this right manually.

To sign in remotely, you need the right to sign in Remote Desktop Services

If Network Level Authentication (NLA) is enabled in the RDP setting on the remote host, another error occurs when connecting:

The connection was denied because the user account is not authorized for remote login.

The connection was denied because the user account is not authorized

In this case, you simply need to add the user to the local Remote Desktop Users group to allow them to connect to Windows Server via RDP:

  1. Open the Local Users and Groups MMC snap-in (lusrmgr.msc) and navigate to the Groups section;
  2. Double-click the Remote Desktop Users group;
  3. Click the Add button and enter the name of the user (or group) you want to grant RDP access to;add user to local remote desktop users group
  4. Users can then connect to the Windows host via RDP.

It is also possible to add a user to an RDP access group from the command line:

net localgroup "Remote Desktop Users" /add woshub\testuser

or using PowerShell (Learn more about how to manage local users and local groups with PowerShell).

Add-LocalGroupMember -Group "Remote Desktop Users" -Member testuser

List users in the Remote Desktop Users group:

Get-LocalGroupMember -Group 'Remote Desktop Users'

powershell - list remote desktop users group membership

Similarly, you can grant users RDP access to Windows 10 or 11 workstations (don’t forget to enable RDP on these devices.).

By default, Windows Server allows two concurrent Remote Desktop sessions. This means that two users can work simultaneously in their own Remote Desktop sessions. If you need more concurrent RDP connections, you will need to purchase and activate licenses (RDP CALs) on the RDS License Server and install the Remote Desktop Services role (this can be a standalone RDSH server or a full RDS farm consisting of several hosts).

You can use RDS Collections to provide remote desktop access in an RDS farm. Open Server Manager -> Remote Desktop Services –> Tasks -> Edit Deployment Properties.

Open the collection and the User Group section will list the security group allowed to connect to the RDSH hosts in that collection.

RDS collection - grant access to RDSH

Allow RDP Access to Domain Controller for Non-Admin User

If you need to grant a regular (non-admin) user remote access to the desktop of a domain controller, the method described above won’t work.

After the server role is promoted to an Active Directory domain controller, you cannot manage local users and groups from the Computer Management MMC snap-in. When you try to open the Local Users and Groups console (lusrmgr.msc), the following error appears:

The computer xxx is a domain controller. This snip-in cannot be used on a domain controller. Domain accounts are managed with the Active Directory Users and Computers snap-in.

The computer xxx is a domain controller. This snip-in cannot be used on a domain controller. Domain accounts are managed with the Active Directory Users and Computers snap-in.

As you can see, there are no local groups on the domain controller. Instead of the local group Remote Desktop Users, the DC uses the built-in domain group Remote Desktop Users (located in the Builtin container). You can manage this group from the ADUC console or the DC command prompt.

domain builtin group Remote Desktop Users

However, it is not recommended to use this group to grant Remote Desktop access as this will give the user access to all DCs in the domain. In this case, it is better to grant permissions using the Allow log on through Remote Desktop Services policy.

Many might reasonably ask why non-administrators need remote access to the DC desktop. Indeed, in small and medium-sized infrastructures, where the entire infrastructure is managed by several administrators with domain admin permissions, this is unlikely to be necessary. In most cases, it is sufficient to delegate some administrative permissions in Active Directory or use PowerShell Just Enough Administration (JEA).

However, in large corporate networks with a large number of employees, it is often necessary to provide RDP access to the DC (Usually to branch DCs or RODCs) for different groups of server administrators, on-duty administrators, or other technical staff. There are also situations where third-party services managed by non-domain administrators are deployed on the DC, and there’s a need to maintain these services.

How to Allow Log on Through Remote Desktop Services?

To allow a domain user or group to remotely connect to Windows via RDP, you must grant them the SeRemoteInteractiveLogonRight privilege. You can grant this permission using the Allow log on through Remote Desktop Services policy.

The policy is called Allow log on through terminal services in Windows Server 2003 and earlier.

To allow remote connection to the domain controllers for members of the Remote Desktop Users group you need to change the settings of this policy on your domain controller:

  1. Open the Local Group Policy Editor (gpedit.msc);
  2. Go to the GPO section Computer Configuration -> Windows settings -> Security Settings -> Local policies -> User Rights Assignment;
  3. Find the policy Allow log on through Remote Desktop Services;
    Once the server has been promoted to a DC, the only group that remains in this local policy is the Administrators group (these are Domain Admins).
  4. Edit the policy and add the domain user or group directly (domain\CA_Server_Admins) to it;group policy: Allow log on through Remote Desktop Services
  5. Update the Local Group Policy settings on the DC using the command: : gpupdate /force

Note that the group that you added to the Allow log on through Remote Desktop Services policy should not be present in the “Deny log on through Remote Desktop Services” policy because it has a higher priority (check the article Block remote access under local user accounts). Also, if you restrict the list of computers that users can log on to, you must add the server name to the user account properties in AD (LogonWorkstations user attribute).

Note. To allow users to log on to the DC locally (via the server console), their account or group must also be added to the “Allow log on locally” policy. By default, the following built-in domain groups have this permission:

  • Backup Operators
  • Administrators
  • Print Operators
  • Server Operators
  • Account Operators

If you do not do this, you will get an error message when you try to connect to Remote Desktop: The sign-in method you’re trying to use isn’t allowed.

To make things easier, you can create a new security group in the domain, for example AllowDCLogin. Next, add the accounts that need to be allowed to remotely access the DC to the policy. If you need to allow access to all AD domain controllers at once, rather than editing the local policy on each DC, it’s better to add the user group to the Default Domain Controllers Policy using the Group Policy Management Console (GPMC.msc). Edit the policy item Allow log on through Remote Desktop Services under the section  Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment.

Warning. If you change the Default Domain Controllers Policy, don’t forget to add the Domain/Enterprise Admins group to the policy Allow log on through Remote Desktop Services, otherwise, they will lose remote access to the DCs.

default domain controller policy: allow logon over rdp

The users you added to the policy will now be able to connect to the AD domain controller’s desktop via RDP.

If you need to allow non-admin users to start/stop certain services on a DC, use the following guide.

The Requested RDP Session Access is Denied

In some cases, you may receive the following error when you use RDP to connect to a Windows Server domain member host or domain controller:

The requested session access is denied.

the requested rdp session access is denied

The following problems may occur if you connect to the DC using a non-administrator account:

  • You are trying to connect to the server console (using the mstsc /admin mode). This connection mode is only allowed for administrators. Attempt to connect to the server with the mstsc.exe client in normal RDP mode (without /admin option);
  • It is possible that there are already two active RDP sessions on the host (By default, no more than two concurrent RDP sessions can connect to a Windows Server without an RDS role deployed). You can get the list of active sessions and logged-on users on the remote computer by using the command:
    qwinsta /server:dc01
    You cannot end other users’ sessions without administrator permissions. You must wait for administrators to release or end a session;
  • Restricted Admin mode or Windows Defender Remote Credential Guard is enabled on the Windows Server host

25 comments
6
Facebook Twitter Google + Pinterest
previous post
How to Create, Change, and Remove Local Users or Groups with PowerShell
next post
Enable Single Sign-On (SSO) Authentication on RDS Windows Server

Related Reading

Using WPAD (Web Proxy Auto-Discovery Protocol) on Windows

November 7, 2023

Zabbix: How to Get Data from PowerShell Scripts

October 27, 2023

Tracking Printer Usage with Windows Event Viewer Logs

October 19, 2023

How to Use Ansible to Manage Windows Machines

September 25, 2023

How to View and Change BIOS (UEFI) Settings...

September 13, 2023

25 comments

Ravi February 1, 2016 - 8:36 am

Hi there.
 
Went through your post.
 
I am having windows 2012 AD with more than 350 active users. What I want to achieve is – I want to create a user group in AD for some users and have it administered by someone else apart from the server administrator  (basically creating/deleting users in that group and resetting their password.) I want this group administrator to access the server through remote desktop but, in AD users & computers only his group should be visible to him and not the entire AD.
 
How to achieve this.
 
Kindly advice.
 
Thanks.

Reply
admin February 3, 2016 - 6:20 am

Hi
Quite a strange requirements

create a user group in AD (basically creating/deleting users in that group and resetting their password.)

Create separate OU in AD, move user to it and delegates the necessary permissions to admin

I want this group administrator to access the server through remote desktop but, in AD users & computers only his group should be visible to him and not the entire AD.

Give him permissions locally on the server, not through AD

Reply
Anon_28 March 4, 2016 - 8:35 am

hi guys,
i have problem on windows 10 home edition, i want using RDP Session but not working, still error “the requested session access is denied”. after login.
help me please!
 

Reply
Benjamin November 9, 2020 - 4:35 pm

Windows 10 Home doesn’t have Remote Desktop Connection.
I would recommend upgrading to the Pro Edition.

Otherwise, There are a few Illegal avenues to attempt.

Reply
Adam Hill October 5, 2016 - 1:17 pm

out of all the articles i researched on how to enable non-admins to RDP into domain controllers (or any other server for that matter) …. this is the ONLY article that actually works. Thank you very much for posting this

Reply
Joe November 2, 2016 - 9:36 am

Thanks for posting this. It’s spot on.

Reply
BHAVIK January 4, 2017 - 7:53 pm

Thanks a lot …

Reply
sachin February 1, 2017 - 6:42 am

i just want to access a domain server, but i don’t have any admin rights the administrator have blocked almost every thing even i cannot install a program or even uninstall a program. please help

Reply
sachin February 1, 2017 - 6:46 am

I have a data but its coded in shell script i just want to read it please suggest.

Reply
Richard February 7, 2017 - 9:03 am

Thank you, this worked a charm.

Reply
Charlton April 19, 2018 - 7:09 pm

Thank you!! BCH address?

Reply
admin April 20, 2018 - 9:30 am

Welcome! You can donate us via PayPal on https://woshub.com/about/

Reply
Gerry Fahy October 2, 2018 - 2:12 pm

This is also valuable for reversing the process – i.e. when you inherit a setup where lots of users can RDP to the DCs – this shows you how to stop this happening!

Reply
Bill Rosman April 27, 2019 - 6:16 am

Normally with Remote Desktop into Windows Server 2016, if someone tries to log on and both licenses are being used, the user can disconnect of the connected users so he can log on. Is there a way to prevent the new user from knocking off a currently connected user?
much thanks bill

Reply
admin May 14, 2019 - 1:51 pm

Only an administrator can kick off another user RDP session, you can’t disable this feature.

Reply
SARAVANANK May 24, 2019 - 3:38 pm

CAUTION !!!!!, Dont do this setting through the default domain controller policy, you will be screwed. Once you enable the allow logon through remote desktop services, the default permission like domain admin everything wiped out and the only added groups might have rdp access to the domain controllers. It’s one way change no going back.

Reply
Brian Jabovs May 31, 2019 - 4:03 am

THANK YOU!! This post was the answer to my prayers after hours of searching. Thank you, and thank you again.

Reply
TrixM August 15, 2019 - 2:45 am

This is such BAD ADVICE.
There is no reason for ANYONE who is not a domain admin to RDP onto a DC in an enterprise where there are any other admins who are not Domain Admins.
There should be NO third party tools installed on a DC except by the Domain Admin after careful analysis to determine whether they need to be there.
Answer, always, is “no”, except for system monitoring tools.
Some products need to have schema modifications in the domain – e.g. Exchange, Sharepoint, etc. These do not need to be run ON the DC. They need to be run by someone with Schema Admins (and perhaps Enterprise Admins) rights on a domain-joined server in the same site as a DC running the Global Catalog role (preferably the Schema Master).
For other administrators who have been delegated account or computer management rights in the domain, they should use Active Directory Users and Computers (if they need that console) installed preferably on a jump server they can RDP to (or on a workstation, if you must), as well as any other RBAC tools they need for their tasks.
I’m not even going to get into putting management servers on their own networks and configuring firewall rules, but at least don’t let non Domain Admin techs log onto your DCs!
Also, using a GPO to add someone to any of the BUILTIN domain groups is ridiculous. You just add them directly. The point of BUILTIN is that it applies to all DCs (and only DCs, btw).

Reply
mehdi April 13, 2020 - 11:52 am

tnx -tnx -tnx

Reply
jim b April 30, 2020 - 7:43 am

Tried it on my 2019 Standard server. The users are still removed from remote desktop users after policy update. The only way I can users to login is make them administrators.
Probably I shouldn’t be using MS Server. It’s a small business, 10 users, I don’t need or care about DC, AD or any other soul sucking MS infrastructure, I just want a simple Windows file-app-remote desktop server.
I also don’t want the overhead of virtualization for this small shop and the idea of 2 servers is ridiculous.

Is there another trick or an update for 2019?

Reply
admin May 7, 2020 - 3:33 pm

I have not tried to do this on Windows Server 2019. In my opinion everything should work as in previous versions of Windows Server.
Have you edited the local policy “Allow log on through Remote Desktop Services” of your server via gpedit.msc?

Reply
Brecht Belmans May 12, 2020 - 12:58 pm

I have the same problem, and yes I have have checked the local policy “Allow log on through Remote Desktop Services” and “Deny log on through Remote Desktop Services” still no succes.

Reply
Ramesh December 23, 2021 - 6:32 pm

Can’t deny in that way. In my environment, we need permissions to login and check if there are any disk space, performance checks on the DC, so it is required RDP login on a DC. In that case, really this article will help us. But I also have a requirement is that person (non-admin) need to patch the DC but he shouldn’t have access on AD console (dsa.msc). I am looking for a solution.

Reply
MANOJ ANKUSH KADAM July 20, 2022 - 9:50 am

Hi We have 2 AD servers and a remote location has an RODC server. On-site RODC server after link down (MPSL) the admin RODC user is not able to log in on the server.

Reply
Joni Ljungqvist November 15, 2023 - 11:57 am

How do you allow non-admin users to see active RDP sessions in a RDS Session Collection? It’s like a turn-around problem…we have support staff who need to see active RDP sessions in our RDS farm.

Reply

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMWare
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • How to Connect VPN Before Windows Logon

    November 14, 2023
  • Removing Azure Arc Setup Feature on Windows Server 2022

    November 9, 2023
  • Using WPAD (Web Proxy Auto-Discovery Protocol) on Windows

    November 7, 2023
  • Send Emails with Microsoft Graph API and PowerShell

    November 6, 2023
  • Zabbix: How to Get Data from PowerShell Scripts

    October 27, 2023
  • Tracking Printer Usage with Windows Event Viewer Logs

    October 19, 2023
  • PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

    October 15, 2023
  • Reset Root Password in VMware ESXi

    October 12, 2023
  • How to Query and Change Teams User Presence Status with PowerShell

    October 8, 2023
  • How to Increase Size of Disk Partition in Ubuntu

    October 5, 2023

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Configure Google Chrome Settings with Group Policy
  • How to Find the Source of Account Lockouts in Active Directory
  • How to Disable or Enable USB Drives in Windows using Group Policy
  • Get-ADComputer: Find Computer Properties in Active Directory with PowerShell
  • Refresh AD Groups Membership without Reboot/Logoff
  • How to Automatically Fill the Computer Description in Active Directory
  • Adding Domain Users to the Local Administrators Group in Windows
Footer Logo

@2014 - 2023 - Windows OS Hub. All about operating systems for sysadmins


Back To Top