Windows Server: How to Use Trusted Certificates with Remote Desktop Services
Summary: This article shows how to configure Remote Desktop Services (RDS) to use a trusted certificate from a third-party certification authority (CA).
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Instructions
Several components of RDS can use certificates to provide secure communications. Self-signed certificates can be used, but they must be manually installed on clients in order to be trusted. Certificates issued by a trusted CA are automatically trusted by clients, but configuring RDS to use these certificates is not straightforward for two reasons:
- There is no integrated mechanism within RDS for creating a certificate signing request (CSR).
- A certificate received from a CA must be bound to its private key before RDS can use it.
This article shows how to generate a CSR, use the issued certificate to complete the CSR, and configure RDS to use the certificate.
Generate the CSR and submit it to the CA.
Note: In the steps below, Internet Information Services (IIS) Manager is used to generate and complete the CSR. Most RDS deployments have IIS components installed on at least one server, for use by Remote Desktop Web Access. IIS Manager provides a graphical interface for performing these steps, but there are other ways to perform them, such as the
certreq command.
- Launch Internet Information Services (IIS) Manager from the Tools menu of Server Manager.
- Select the server in the left pane and double-click Server Certificates in the middle pane.
- In the Actions menu, select Create Certificate Request.

Figure 1: Click Create Certificate Request to begin the process of creating a CSR. - Provide the requested information to the CSR wizard.
- Specify a filename and path for the CSR and click Finish.
Figure 2: Specify a file name and path for the certificate request. - Submit the CSR to the CA. The procedure for doing so cannot be documented here, as it depends on the CA.
Download the certificate, complete the CSR, and export it.
Note: The certificate issued by the CA will likely have a
.cer or .crt extension, but RDS requires a .pfx file. To convert the issued certificate to a .pfx file, bind it to its private key with the following steps. IIS Manager is again used here to perform these steps, but there are other methods.
- Download the certificate issued by the CA in response to the CSR.
- Launch IIS Manager and return to the Server Certificates section.
- Click Complete Certificate Request.

Figure 3: Click Complete Certificate Request to complete the CSR using the certificate issued by the CA. - Provide the path and filename of the certificate, its friendly name, and the certificate store where it should be stored. The friendly name can be anything you want, and the Personal store is preferred. Click OK. This associates the certificate with the private key that was created alongside the CSR.
Figure 4: Specify the path to the certificate, its friendly name, and a certificate store. - Double-click the certificate. Confirm the presence of a corresponding private key and click OK.
Figure 5: The properties of the certificate, indicating the presence of its private key - With the certificate selected, click Export.

Figure 6: Click Export to export the certificate and its private key. - Provide a filename and path for the exported certificate. Specify a password and confirm it, then click OK.
Figure 7: Provide the filename, path, and password of the exported certificate.
Configure RDS to use the certificate.
- In the Remote Desktop Services section of Server Manager, select Edit Deployment Properties.
Figure 8: Click Edit Deployment Properties to configure certificate usage in RDS. - In the properties window, select Certificates.
- Perform the following steps for each role service:
- Select the role service and click Select existing certificate.

Figure 9: Click Select existing certificate to specify a certificate for each role service. - With Choose a different certificate selected, provide the path to the exported certificate and its password.
Select Allow the certificate to be added to the Trusted Root Certification Authorities certificate store on the destination computers.
Figure 10: Specify the path and password of the certificate to the used, then check the Allow the certificate… box. - Click OK.
- Click Apply.
- Select the role service and click Select existing certificate.
- Confirm that the Level column shows a status of Trusted for each role service and click OK.
Figure 11: The certificates used by all RDS role services are now trusted.
Additional Information
Refer to this video:
Configure Remote Desktop Services to Use Trusted Certificates
Duration: 00:07:51 (hh:mm:ss)
When available, closed caption (subtitles) language settings can be chosen using the CC icon on this video player.
You can also view this video on YouTube.
Affected Products
Microsoft Windows Server 2016, Microsoft Windows Server 2019, Microsoft Windows Server 2022, Microsoft Windows Server 2025Article Properties
Article Number: 000273687
Article Type: How To
Last Modified: 28 May 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.