Supported connection modes:

Supported client applications:

  • All official Microsoft clients for Windows and macOS,
  • FreeRDP 2.0 and newer.

Supported OCR languages:

  • English
  • German
  • Norwegian
  • Polish
  • Russian


  • RDP protocol implementation supports user authentication over RADIUS in challenge-response mode.

  • When authenticating Fudo users against AD (or other external source) the TLS+NLA (Network Level Authentication) is not supported; TLS mode is used instead. NLA mode on server side is supported.

  • In case of Enhanced RDP Security (TLS) + NLA, Fudo PAM requires NTLM protocol version 2 or newer. To properly handle NLA authentication connections, enable option to only send NTLMv2 reponse both on client and server side.

    1. Click Start > All Programs > Accessories > Run.
    2. Type secpol.msc in the Open input field and click OK.
    3. Select Local Policies > Security Options and double-click Network Security: LAN Manager authentication level.
    4. Select Send NTLMv2 response only. Refuse LM & NTLM from the drop-down list.
    5. Click Apply.

  • Fudo PAM verifies input language settings when negotiation connection and does not support dynamic language change on the login screen.


Fudo natively supports RemoteApp connections over RDP protocol. Application windows are recorded the same way as RDP connections, enforcing all Fudo PAM security restrictions.

To monitor RemoteApp sessions, the connection must be launched through a *.rdp configuration file with the Fudo PAM IP address and the port number defined.

Connections initiated over Remote Desktop Web Access can be monitored by Fudo only in Transparent/Gateway mode as the Remote Desktop Web Access can not provide Fudo IP address instead of original destination server.