Setting up your first RDP multi Target Application


Article ID: 194679


Updated On:


Secure Access Cloud



RDP multi-target application allows the admin to provision a single RDP application, providing access to multiple users to multiple machines. Following user authentication, the user can launch a dynamically constructed application, created by Secure Access Cloud using the information stored in the users’ IDP attribute. Then, the user can select an RDP target from a list of predefined RDP targets.


Secure Access Cloud


Configuring Steps and prerequisites:

As described above, RDP multi-target requires the target list to be synchronised to a specific, preconfigured IDP attribute. Creating and synchronising the IDP attributes are IDP specific. See KB’s on how to do so in the supported IDPs (AAD, OKTA, OneLogin)

While integrating your IDP or editing an existing integration you will be asked to point out where the target list is located. I.e What’s the attribute name that was synched with the target names.

     The example above is from configuring AAD.

Next, configure an RDP multi Target application 

In the application tab, select a new RDP application and change the option to multi-target, notice that the internal URL disappears as it’s irrelevant when configuring a multi-target application, the only prerequisite is to make sure that the target server will accept incoming connections in default RDP port 3389. 

Site assignment is critical. The configured target should reside in the site where the application is configured. If multiple connectors can resolve the target name, the target can be reachable from multiple sites. However, the best location is the closest possible location to the target. 


Launching an RDP Multi-Target Application:

The user goes through authentication as they would normally do and is able to launch an RDP application. 

Inside the launch application screen, the user can select from the predefined target list and download a specific RDP file for the selected target. 

Later using a temporary password or an existing long term password the user can initiate the session and authentication with Secure Access Cloud.