Step by Step Windows 2019 Remote Desktop Services – Using the GUI

A step by step guide to build a Windows Server 2019 Remote Desktop Services deployment.
I posted this before based on Windows Server 2012 R2 RDS and thought it was high time to update this post to a more modern OS version.
I will provide all the steps necessary for deploying a single server solution using the GUI tools.

Although it is called a single server installation, we will need 2 servers as shown below.

01 RDS Deployment - Single Server 2019

Software used in this guide:
Windows Server 2019 ISO (evaluation can be downloaded here: https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2019).

SQL Server 2017 Express x64 (free version can be downloaded here: https://www.microsoft.com/en-us/download/details.aspx?id=55994).

SQL Server 2016 Native Client (free version can be downloaded here: https://www.microsoft.com/en-us/download/details.aspx?id=52676. After clicking the download button select ENU\x64\sqlncli.msi). Although I’m installing SQL Express 2017, there are no newer client tools available.

And a certificate. I got mine for free from https://www.sslforfree.com/. This certificate needs to contain the FQDN you will use as the RD Web Access URL (mine is rds.it-worxx.nl in this guide). It needs to be in .pfx format and you need to have the private key in it.

This guide will not focus on building a domain using a single domain controller and adding the second server as a member server to this domain.

Also some basic knowledge is assumed in this guide. I will not detail how to create a Security Group and adding a computer account to it. I will also not detail how to install SQL Express, or adding logins to a SQL Server Instance security context. If you need extra help with this, Bing it or drop me a mail with details, and I will provide steps to continue.

I will be using Hyper-V on my Windows 10 1809 laptop and I have prepared 2 servers:

ITWDC (1 vCPU, 1024MB memory, dynamic, 60GB Harddisk)
Installed Windows
IPv4 192.168.0.4/24
Added .NET Framework 3.5 as a feature

Added Active Directory Domain Services as a role

Configured this server as a Domain Controller in a new forest: it-worxx.lab

ITWRDS (1 vCPU, 1024MB memory, dynamic, 60GB Harddisk)

Added .NET Framework 3.5 as a feature

IPv4 192.168.0.10/24, DNS server 192.168.0.4

Configured it as a member server in the it-worxx.lab domain

Installing the Remote Desktop Services Roles

Log on to the Domain Controller, and in Server Manager right-click the All Servers node and add the second server using the Add Servers command (or select the All Servers node, click Manage and click Add Servers).

02 RDS Deployment - Single Server 2019

Now that all servers needed in this deployment scenario are present, click Manage, and click Add Roles & Features.

03 RDS Deployment - Single Server 2019

Before you begin

Click Next.

04 RDS Deployment - Single Server 2019

Select Installation Type

Select Remote Desktop Services installation.
Click Next.

05 RDS Deployment - Single Server 2019

Select Deployment Type

Although Quick Start might be a valid option for a single server deployment, leave the default selected. This will explain the steps necessary to install Remote Desktop Services in greater detail.
Click Next.

06 RDS Deployment - Single Server 2019

Select Deployment Scenario

Select Session-based desktop deployment.
Click Next.

07 RDS Deployment - Single Server 2019

Review Role Services

Review the services that will be installed.
Click Next.

08 RDS Deployment - Single Server 2019

Specify RD Connection Broker server

Click the member server and click the Add button.
Click Next.

09 RDS Deployment - Single Server 2019

Specify RD Web Access server

Check Install the RD Web Access role on the RD Connection Broker server.
Click Next.

10 RDS Deployment - Single Server 2019

Specify RD Session Host server

Click the member server and click the Add button.
Click Next.

11 RDS Deployment - Single Server 2019

Confirm selections

Check Restart the destination server automatically if required.
Click Deploy.

12 RDS Deployment - Single Server 2019

View progress

Wait until all role services are deployed and the member server has restarted.
Click Close.

13 RDS Deployment - Single Server 2019

In Server Manager click Remote Desktop Services and scroll down to the overview.

As you can see the deployment is missing a RD Gateway server and a RD Licensing server.

14 RDS Deployment - Single Server 2019


Click the Add RD Licensing server button.

15 RDS Deployment - Single Server 2019

Select a server

Click the domain controller and click the Add button.
Click Next.

16 RDS Deployment - Single Server 2019

Confirm selections

Click Add.

17 RDS Deployment - Single Server 2019

View progress

Wait until the role service is deployed. No restart is needed.
Click Close.

18 RDS Deployment - Single Server 2019


Click the Add RD Gateway server button.

19 RDS Deployment - Single Server 2019

Select a server

Click the member server and click the Add button.
Click Next.

20 RDS Deployment - Single Server 2019

Name the self-signed SSL certificate

The wizard creates a self-signed certificate. We will deal with certificates in this deployment in a little bit. We will replace the self-signed certificate.

Enter the external Fully Qualified Domain Name which you will also use for the Web Access URL. In my case, for lack of a better name, I used “rds.it-worxx.nl”. I didn’t want to use “remote.it-worxx.nl” or “desktop.it-worxx.nl” or anything else.
Click Next.

21 RDS Deployment - Single Server 2019

Confirm selections

Click Add.

22 RDS Deployment - Single Server 2019

View progress

Wait until the role service is deployed. Again, no restart is needed.

Notice that “rds.it-worxx.nl” was configured for the deployment.

Also notice that even more certificate configuring is needed, but we’ll get to that later. Pay no attention to it for now. The same goes for the RD Gateway properties for the deployment. We’ll get to that later.
Click Close.

Review role installation and setting License Mode

Let’s have a quick look at the configuration we have so far.

23 RDS Deployment - Single Server 2019


In Server Manager, Remote Desktop Services, Overview, click Tasks and click Edit Deployment Properties.

<a href=24 RDS Deployment - Single Server 2019" width="" />

Configure the deployment

Review the RD Gateway settings and notice what settings are available.
Click RD Licensing.

25 RDS Deployment - Single Server 2019

Configure the deployment

Notice that an RD License server is available, but no license type is selected yet.

I selected Per User, but since this is just a guide setup, it really doesn’t matter.
Click RD Web Access.

26 RDS Deployment - Single Server 2019

Configure the deployment

By default the RD Web Access IIS application is installed in /RdWeb.

This is for Windows Server 2012 R2 RDS, but it also works for Windows Server 2019 RDS.
Click Certificates.

27 RDS Deployment - Single Server 2019

Configure the deployment

Notice that the certificate level currently has a status of Not Configured.
As you can see, certificates are used for different goals within the deployment.

The RD Gateway certificate is used for Client to gateway communication and needs to be trusted by the clients. Either install the self-signed certificate on all clients, or use a certificate for which the complete certificate chain is already trusted by all clients. As it said in the wizard, the external FQDN should be on the certificate.

The RD Web Access certificate is used by IIS to provide a server identity to the browser clients.

The RD Connection Broker actually has two goals for which it needs certificates. To enable single sign on (server to server authentication), and for publishing (signing RDP files). If you look in the deployment you’ll see that the Connection Broker is now configured to use “itwrds.it-worxx.lab”, so we have to change it to use an external FQDN as well.

If we use the same FQDN for all goals described above, we need only 1 certificate, and only 1 external IP address.

We’ll come back to this wizard later to assign the certificate. First order of business is to change the internal FQDN for the Connection Broker to an external FQDN.

Click OK (no reason why we shouldn’t commit the change we made on the licensing tab, remember?)

Changing the Connection Broker FQDN to an externally resolvable FQDN

28 RDS Deployment - Single Server 2019

Open DNS Manager on the domain controller and browse to Forward Lookup Zones.

Right click Forward Lookup Zones and click New Zone… Go through this wizard accepting the defaults until you have to enter a Zone Name.

29 RDS Deployment - Single Server 2019


Enter the external FQDN which will also be used by the Connection Broker.

Finish the rest of the wizard accepting the defaults.

30 RDS Deployment - Single Server 2019

Browse to the newly created zone.

Right click the newly created zone and click New Host (A or AAAA)…

31 RDS Deployment - Single Server 2019

New Host

Leave the Name field blank, but enter the member server’s (holding the RD Connection Broker role) IPv4 address.
Click Add Host.

Now the configuration will be able to resolve “rds.it-worxx.nl” to the server holding the Connection Broker role, and this will work because “rds.it-worxx.nl” is also on the certificate that we will configure later.

Create a new Global Security Group called “RD Connection Brokers” and add the computer account for the member server to it as a group member.

We need this group to be able to convert the RD Connection Broker to a highly available RD Connection Broker. You’ll see why we need to do this in a few steps.

Reboot the member server to let it know it’s a member of the RDS Connection Brokers security group.

The next steps in re-configuring the RD Connection Broker depend on an SQL database shared by all Connection Brokers in the deployment. Without this configuration the RD Connection Broker will rely on the Windows Internal Database that was created during the initial deployment of the roles.

Install SQL Express on the Domain Controller (or use an existing SQL Server if you already have one).

It’s not best practice to install SQL onto a Domain Controller, but it’ll do for this guide.

32 RDS Deployment - Single Server 2019

Here’s a list of needed features:

33 RDS Deployment - Single Server 2019


Use the Default Instance (so click Default, and do not leave the wizard’s selection on Named instance: SQLEXPRESS).

34 RDS Deployment - Single Server 2019


Set the SQL Service to start using SYSTEM because the default account of SQLSERVER cannot be used on a Domain Controller.

35 RDS Deployment - Single Server 2019

When the installation is done open SQL Configuration manager and browse to Client Protocols under SQL Native Client 11.0 Configuration.

Check if TCP/IP is enabled under Client Protocols. SQL Express install enables this by default, but check it just to be sure, especially if you use an existing SQL Server.

36 RDS Deployment - Single Server 2019

Browse to Protocols for MSSQLSERVER under SQL Server Network Configuration.

Enable TCP/IP. If this is a new SQL installation, this will be disabled by default.
Restart the SQL Server service if you changed this setting.

37 RDS Deployment - Single Server 2019

On the SQL Server, make sure port 1433 is not being blocked by Windows Firewall.

I added the SQL Server executable to the exception list to allow all inbound traffic, but TCP 1433 inbound should suffice.
If you installed SQL Server using the default folder locations, the sqlservr.exe executable is found in “C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn”.

38 RDS Deployment - Single Server 2019

Open SQL Server Management Studio, connect to the default instance on the Domain Controller and browse to Logins under Security.

Remember the Management Studio is no longer available with the SQL Server download, but is a different download.
Right click Logins and click New Login…

39 RDS Deployment - Single Server 2019

Login – New

Click Search…

40 RDS Deployment - Single Server 2019

Select User, Service Account, or Group

Click Object Types… and select Group.
Type the RDS Connection Brokers security group name and click Check Names.
Click OK.

41 RDS Deployment - Single Server 2019

Login – New

Click Server Roles and select dbcreator.
Click OK.

We have just effectively granted the RDS Connection Broker server the right to create databases.

We need this because the RDS Connection Broker service will try to migrate from WID (Windows Internal Database to a (high available) SQL Server instance when we convert the Broker to a high available broker.

Install the SQL Native Client on the member server (Client Components only). If you used the member server in this setup to install the SQL Management Studio, you can skip this step because the Native Client was installed with installing the Management Studio.

Everything we need is in place to convert the RD Connection Broker, so let’s do just that.

42 RDS Deployment - Single Server 2019

In Server Manager click Remote Desktop Services and scroll down to the overview.

Right click RD Connection Broker and click Configure High Availability.

43 RDS Deployment - Single Server 2019

Before you begin

So we’re building a single node cluster here ;)
Look at the pre-requisites.

If you have more than one RD Connection Broker they need to be configured using DNS Round Robin.

44 RDS Deployment - Single Server 2019

Configure RD Connection Broker for High Availability

Since we just installed an SQL Server for this, leave the default selected. You’d use the other option for instance if you’d like to use Azure SQL for this deployment.
Click Next.

45 RDS Deployment - Single Server 2019

Configure RD Connection Broker for High Availability

DNS name for the RD Connection Broker cluster:
The DNS Zone name we configured in DNS earlier: rds.it-worxx.nl

Connection string:
DRIVER=SQL Server Native Client 11.0;SERVER=ITWDC;Trusted_Connection=Yes;APP=Remote Desktop Services Connection Broker;DATABASE=ITWRDCB

Folder to store database files:
C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\DATA
I used the instance default folder.

46 RDS Deployment - Single Server 2019

Confirmation

If you get an error before this page:

47 RDS Deployment - Single Server 2019

Progress

If you get an error on this page:

48 RDS Deployment - Single Server 2019


The RD Connection Broker is now in High Availability Mode, and configured as “rds.it-worxx.nl” and we are finally ready to complete the configuration.

49 RDS Deployment - Single Server 2019


In Server Manager, Remote Desktop Services, Overview, click Tasks and click Edit Deployment Properties, then click Certificates.

50 RDS Deployment - Single Server 2019

Configure the deployment

Click RD Connection Broker – Enable Single Sign On and click Select Existing certificate.

51 RDS Deployment - Single Server 2019


Browse to the .pfx file, enter its password, and check Allow the certificate..
Click OK.

67 RDS Deployment - Single Server 2019


So click Apply. This takes a little while, be patient.

52 RDS Deployment - Single Server 2019

Configure the deployment

Click RD Connection Broker – Publishing and click Select Existing certificate.

51 RDS Deployment - Single Server 2019


Browse to the .pfx file, enter its password, and check Allow the certificate..
Click OK.

67 RDS Deployment - Single Server 2019


Click Apply. This again takes a little while, be a little more patient.

53 RDS Deployment - Single Server 2019

Configure the deployment

Click RD Web Access and click Select Existing certificate.

68 RDS Deployment - Single Server 2019


Note: Did you notice the warning when you select RD Web Access?

51 RDS Deployment - Single Server 2019


Browse to the .pfx file, enter its password, and check Allow the certificate..
Click OK.

67 RDS Deployment - Single Server 2019


Click Apply again. This takes another little while longer, be slightly more patient.

54 RDS Deployment - Single Server 2019

Configure the deployment

Last one. Click RD Gateway and click Select Existing certificate.

51 RDS Deployment - Single Server 2019


Browse to the .pfx file, enter its password, and check Allow the certificate..
Click OK.

Click OK to apply the final certificate step.

Configured all servers, configured certificates..

One thing left to do: Tell our RDS environment exactly what to publish.

Publishing resources to your users

In fact you can use this setup to either provide full desktop sessions on the Session Host, or you can choose to publish only applications on the Session Host.

Let’s publish full desktop sessions.

55 RDS Deployment - Single Server 2019


In Server Manager, Remote Desktop Services, Session Collections, click Tasks and click Create Session Collection.

56 RDS Deployment - Single Server 2019

Before you begin

Review the requirements. This won’t be an issue in this setup, but you could restrict access to this collection by selecting a select group of people.
Click Next.

57 RDS Deployment - Single Server 2019

Name the collection

Enter a descriptive name. This name will be displayed under its icon in the Web Access interface.
Click Next.

58 RDS Deployment - Single Server 2019

Specify RD Session Host servers

Click the member server and click the Add button.
Click Next.

59 RDS Deployment - Single Server 2019

Specify user groups

You can limit access to the resource here if you want. Add one or more groups to restrict access to these groups only. In this setup the default selection of Domain Users will do fine. Groups you specify here will be added to the list of groups of users that are allowed to connect using RDP to the Session Host server(s).
Click Next.

60 RDS Deployment - Single Server 2019

Specify user profile disks

User profile disks are not in focus in this guide. Since I have no file shares configured in this setup, uncheck Enable user profile disks for now.
Click Next.

61 RDS Deployment - Single Server 2019

Confirm selections

Review the information and click Create.

62 RDS Deployment - Single Server 2019

View Progress

Wait until the collection is created and the server is added to the collection.
Click Close.

Time to test the setup!

Testing the setup

On a machine that has access to your test setup (you may have to add the external FQDN to your hosts file if you didn’t publish it to the internet) open https://rds.it-worxx.nl/rdweb

63 RDS Deployment - Single Server 2019


Hey! At least the RD Web Access application works :)
Enter a valid username and password (IT-WORXX\username or username@it-worxx.lab).
Create a user for this, or simply use the domain admin account.
Click Sign in.

64 RDS Deployment - Single Server 2019


After logging in you are presented with the full desktop session collection we created.

65 RDS Deployment - Single Server 2019


After clicking the Full Desktop icon you get the warning that devices are going to be redirected.

66 RDS Deployment - Single Server 2019


And when you click Connect, you connect :)