When trying to RDP to a Windows server via ASA Active Directory (AD)-Joined Passwordless flow, the RDP fails with the following error:
Your credentials could not be verified
When inspecting the Kerberos communication between the target server and the authenticating DC, the following Kerberos error might be seen:
KDC_ERR_CERTIFICATE_MISMATCH
- Advanced Server Access (ASA)
- Remote Desktop Protocol (RDP)
Windows is moving towards stronger enforcement of attributes used in certificate-based authentication per the following Microsoft KB:
When Domain Controllers (DCs) are set to this new "Full Enforcement Mode", they will reject the certificate in the Kerberos authentication because, by default, ASA does not include any of the "Strong" certificate mappings in its certificate.
- On the ASA side, configure the Team Settings to include the user SID in the certificate. See Team Settings.
- Ensure user sync job(s) are running successfully and configured properly to match all ASA users. This is required for ASA to obtain and use the SID in the certificate.
- Ensure that the
active directory passwordless identityattribute value for users is the same UPN format as expected by AD (for example, <user> vs. <user>@<domain> and case sensitivity).- If the UPN does not match, the following error may occur:
userSID is required for creating x509 certificate with includeSID=Always
-
- If the domain needs to be added for all users, this can be done with an OEL expression in the attribute mapping from the AD connection to the Okta profile attribute mapped to the ASA passwordless identity attribute and forcing a sync.
- For example, the OEL expression in the setup doc
Arrays.add(Arrays.toCsvString({}),appuser.userName)can be modified toArrays.add(Arrays.toCsvString({}),appuser.userName + "@domain.com")
- For example, the OEL expression in the setup doc
- If the domain needs to be added for all users, this can be done with an OEL expression in the attribute mapping from the AD connection to the Okta profile attribute mapped to the ASA passwordless identity attribute and forcing a sync.
If this is not viable or still does not resolve the issue, consider setting the enforcement back to Compatibility mode on the Windows side so that it will support the default ASA certificates. Consult with Microsoft for more details on how to set this mode on the Windows side.
