หน้านี้ยังไม่พร้อมใช้งานในภาษาท้องถิ่นของคุณ เรากำลังพยายามอย่างหนักเพื่อเพิ่มเวอร์ชันภาษาอื่น ๆ เพิ่มเติม ขอบคุณสำหรับการสนับสนุนเสมอมา

Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive
On this page
Help Center/ Workspace/ User Guide (Application Streaming)/ Administrator Operation Guide/ FAQs/ How Do I Configure RDS Licensing and Security Policies?

How Do I Configure RDS Licensing and Security Policies?

Updated on 2024-10-12 GMT+08:00

Scenarios

This section describes how to configure RDS licensing and security policies on the AD domain server by setting group policies.

After VMs are added to an application group, you need to configure the RDS service authorization function of the APS on the AD domain server to ensure that users obtain RDS service authorization of the RD Licensing server when accessing applications published by the APS. Otherwise, users cannot use remote applications after a trial period of 120 days.

Before publishing applications on the APS, harden the security by configuring security policies of the APS to ensure secure access of authorized users.

Prerequisites

  • You have logged in to the AD domain server as an administrator.
  • You have obtained RDS service licensing options and security policies.

Data

Table 1 lists the data to be obtained.

Table 1 Data to be obtained

Parameter

Description

Example Value

Name

Identifies an APS organization unit (OU) in the cloud application scenario.

SBCOU

Name of the group policy

Identifies a group policy of the APS. The name consists of digits, letters, and underscores (_), and cannot exceed 30 characters.

SBCGRP

IP address of the license server to use

Specifies the server that provides the RDS service licensing function to the APS, that is, the RD Licensing server.

192.168.1.60

Procedure

Creating an APS OU

In the cloud application scenario, control authorization and configure security policies for the APS by configuring group policies. In this case, an independent OU must be created for the APS.

  1. On the active AD domain server, choose > Administrative Tools > Active Directory Users and Computers.

    NOTE:

    This section uses a Windows AD domain server running Windows Server 2016 as an example to describe the configuration procedure.

    The Active Directory Users and Computers window is displayed.

  2. In the navigation pane, right-click a domain name and choose New > Organizational Unit.

    The New Object-Organizational Unit dialog box is displayed.

  3. Enter the name of the application virtualization OU to be created, for example, SBCOU, and click OK.
  4. Add the APS to the new OU.

Creating an APS group policy

  1. On the active AD domain server, click .

    The Windows PowerShell dialog box is displayed.

  2. Enter gpmc.msc to open the Group Policy Management window.
  3. Right-click the selected OU and choose Create a GPO in this domain, and Link it here.
  4. In the displayed dialog box, enter the group policy name, for example, SBCGRP.
  5. Click OK.

Configuring the RDS service licensing function of the APS

  1. Right-click the new group policy and choose Edit from the shortcut menu.

    The Group Policy Management Editor window is displayed.

  2. In the navigation pane, choose Computer Configuration > Policy > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Licensing.
  3. In the Licensing area, right-click Use the specified Remote Desktop license servers and choose Edit.

    The Use the specified Remote Desktop license servers dialog box is displayed.

  4. Set parameters as shown in Figure 1, and click OK.

    Figure 1 Using the specified remote desktop license servers

  5. In the Licensing area, right-click Set the Remote Desktop licensing mode and choose Edit.

    The Set the Remote Desktop licensing mode dialog box is displayed.

  6. Set parameters as shown in Figure 2, and click OK.

    Figure 2 Setting the remote desktop licensing mode

(Optional) Configuring APS security policies
NOTICE:

Security policies are mandatory if users have specific security requirements.

For the APS, two security policies are available. Table 2 provides the specific operations and application scenarios of the two security policies.

Table 2 Security policies

Security Policy

Operation

Scenario

Common office mode

  • Use all applications provisioned by the administrator.
  • Enable Control Panel and system settings.
  • Enable Task Manager.
  • Enable the Internet control panel function.
  • Enable powershell.exe and cacls.exe.
  • Disable the Windows updating, registry editing, CLI, and Run functions.
  • Disable the Shut Down, Restart, Sleep, and Hibernate functions.

Scenarios that require the advantages of cloud applications for efficient office and that do not require high security.

Security isolation mode

  • Use specified Windows applications.
  • Disable most system settings.

Scenarios that have high security requirements and must strictly control application and session rights

  1. Right-click the new group policy and choose Edit from the shortcut menu.

    The Group Policy Management Editor window is displayed.

  2. Set an APS security policy for common office or security isolation mode. For details about how to configure security policies of the APS, see the following file.

    Submit a service ticket for technical support of security policies.

  3. The following uses the Prohibit access to the Control Panel policy as an example to describe how to configure security policies.

    1. In the navigation pane of the Local Group Policy Management Editor window, choose User Configuration > Policies > Administrative Templates > Control Panel.
    2. In the right pane, right-click Prohibit access to the Control Panel and choose Edit.
    3. Select Enabled and click OK.

Denying Apply group policy to the APS domain account

  1. In the navigation pane of the Group Policy Management window, choose Forest:Domain name > Domains > Domain name > APS OU > Group policy name.

    NOTE:

    The APS group policy has been created in Creating the APS group policies, for example, SBCGRP.

    The Group Policy Management Console dialog box is displayed.

  2. Click OK.

    The APS group policy is displayed in the right pane.

  3. Click the Delegation tab and then click Add.

    The Select User, Computer, or Group dialog box is displayed.

    NOTE:

    This policy applies to all users by default. You need to deny this policy to the APS domain account to facilitate the APS maintenance.

  4. Enter the APS domain account and click Check Names.

    The queried domain account is displayed.

  5. Click OK.

    The Add Group or User dialog box is displayed.

  6. Grant the Read permission for a group or user, and click OK.

    The APS group policy window is displayed.

  7. Click Advanced.

    The Group policy name Security Settings dialog box is displayed.

  8. Select the APS domain account, and select Deny in Apply group policy, as shown in Figure 3.

    Figure 3 Denying the policy to the APS domain account

  9. Click Apply.

    The Windows Security window is displayed.

  10. In the displayed dialog box, click Yes.
  11. Click OK.

Refreshing the policy

  1. Click .

    The Windows PowerShell dialog box is displayed.

  2. Run the following command to refresh the policy:

    gpupdate /force

  3. Press Enter. The task is complete.

    If the following information is displayed, the policy is successfully refreshed:

    Updating Policy...
    User Policy update has completed successfully.
    Computer Policy update has completed successfully.
    NOTE:
    • Other component servers will synchronize the new policy. The synchronization mechanism determines the specific synchronization time.
    • The new policy is synchronized after component servers are restarted.

เราใช้คุกกี้เพื่อปรับปรุงไซต์และประสบการณ์การใช้ของคุณ การเรียกดูเว็บไซต์ของเราต่อแสดงว่าคุณยอมรับนโยบายคุกกี้ของเรา เรียนรู้เพิ่มเติม

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback