I was asked to crosspost this, so here we go:
Hello, I am currently validating Yubikey Security Keys for my business. The use case is logging in to Salesforce with MFA, but only after connecting to a Terminal Server from a Thin Client via RDP - meaning the SF-user is working on the TS, not on the local machine.
I have most possibly tried all solutions out there (RemoteFX, registry hacks, etc), but up to now, I am unable to get it to work.
For testing purposes, I have as clients
- a Macbook Pro with a Windows 10 VM (latest build, latest patches)
- an Intel NUC Thin Client with Windows 10 Enterprise LTSC 2021 (latest patches)
On the remote side, I have
- a regular Win 10 VM (latest build, latest patches)
- TS 2012 R2 (latest patches)
- TS 2016 (latest patches)
- TS 2019 (latest patches)
On both the Win 10 VM and the TC, I can select "Webauthn (Windows Hello or Security Key)" from "Local devices and ressources" in the RDP-Client. And indeed, it works perfectly when I connect to the regular Win 10 VM. This tells me that using the Yubikey inside a RDP session is possible after all.
The problem: It will NOT work with Terminal Servers at the remote end. I have checked group policies and allowed basically everything, but to no avail. Why does it work with a Win 10 VM, but not with Terminal Servers? Is there any way to make it work?
Any help is greatly appreciated.
Edit: I do not need Smartcard features or anything fancy, I don't need TOTP, I just need U2F to work like it does between two non-Terminal-Server-Windows-10s.