Fix RDP auth failure for AD Protected Users (NTLM disabled)#3176
Draft
Copilot wants to merge 2 commits intov1.78.2-devfrom
Draft
Fix RDP auth failure for AD Protected Users (NTLM disabled)#3176Copilot wants to merge 2 commits intov1.78.2-devfrom
Copilot wants to merge 2 commits intov1.78.2-devfrom
Conversation
…y modes Co-authored-by: Kvarkas <3611964+Kvarkas@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Fix RDP connection issue with protected user in mRemoteNG
Fix RDP auth failure for AD Protected Users (NTLM disabled)
Feb 25, 2026
|
robertpopa22
added a commit
to robertpopa22/mRemoteNG
that referenced
this pull request
Mar 1, 2026
…sers) Backport of upstream copilot PR mRemoteNG#3176. When UseRestrictedAdmin or UseRCG is enabled, credentials are forwarded via Kerberos — assigning a password would cause NTLM fallback attempts that fail for AD Protected Users accounts. Also improves property descriptions for these modes. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
robertpopa22
added a commit
to robertpopa22/mRemoteNG
that referenced
this pull request
Mar 1, 2026
README: update issue counts (843 triaged, 697 addressed = 83%), needs_human 0, upstream PR backports (mRemoteNG#3177/mRemoteNG#3176/mRemoteNG#3154/mRemoteNG#3171), SQL schema fix. Remove outdated "74 needs_human" section. iis-verify: add Qodo review check, upstream PR status, issues triage status to quality verification report. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
7 tasks
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.




Users in the AD Protected Users security group have NTLM blocked at the domain level. mRemoteNG unconditionally sets
ClearTextPasswordon the RDP ActiveX control, causing CredSSP to fall back to NTLM — producing "A user account restriction is preventing you from logging in" — whilemstscsucceeds via Windows SSO/Kerberos.mRemoteNG already implements two Kerberos-based auth modes in
RdpProtocol8(UseRestrictedAdmin→RestrictedLogon,UseRCG→DisableCredentialsDelegation+RedirectedAuthentication). The gaps being addressed:RdpProtocol.cs/SetCredentials()— Skip settingClearTextPasswordwhenUseRestrictedAdminorUseRCGis active. These modes use the current user's Kerberos ticket and never forward explicit credentials; setting a password is not only unnecessary but risks triggering an NTLM attempt before the extended properties take effect.Language.resx— UpdatedPropertyDescriptionUseRestrictedAdminandPropertyDescriptionUseRCGto explicitly call out AD Protected Users / NTLM-disabled scenarios, Kerberos requirements, and pre-requisites (domain membership, admin rights on target) so users can self-diagnose and apply the correct setting.Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.