RDP and User Principal Name (UPN) format or the fully qualified domain name (FQDN)

SSE@TUE 160 Reputation points
2025-09-17T11:08:35.71+00:00

Hi,

the RDP client by defaults to using the User Principal Name (UPN) format (******@domain.com) or the fully qualified domain name (FQDN) instead of the NetBIOS domain name (DOMAIN\user).

My RDP Client use sometimes the User Principal Name (UPN) format and not the NetBIOS domain name (DOMAIN\user), therefore I cannot connect to the Remote machine, it says wrong password.

Regards

Nick

Windows for business | Windows Client for IT Pros | User experience | Remote desktop clients
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Henry Mai 6,505 Reputation points Independent Advisor
    2025-09-17T13:39:26.8933333+00:00

    Hello SSE, I am Henry and I want to share my insight about your issue.

    I see the issue, where modern RDP clients default to UPN-based Kerberos authentication, which can fail if the server-side configuration is incorrect. The fact that a reboot of the remote machine temporarily fixes it points to a specific root cause.

    Please refer to the action plan outlined below:

    Part 1: Client-Side Fixes

    If you need to connect immediately, you can force the RDP client to use the older NetBIOS/NTLM authentication method.

    • Force NetBIOS Format: In the RDP client, explicitly enter the username as DOMAIN\username instead of ******@domain.com.
    • Clear Cached Credentials: On your local computer, go to Credential Manager > Windows Credentials and remove any saved entries for the remote machine.
    • Edit the .RDP File: For a more permanent workaround, open your saved .rdp file in Notepad and add the following line to the end: enablecredsspsupport:i:0 This forces the client to use a more basic authentication provider that is less prone to Kerberos issues.

    Part 2: Server-Side SPN Correction Fixes

    To ensure UPN logons work reliably without requiring reboots, you must validate the Service Principal Name (SPN) for the Remote Desktop service in Active Directory.

    1. Check for Missing or Duplicate SPNs: On a Domain Controller (or using RSAT), open an administrative Command Prompt and run the following commands:
      • To check for duplicates across the entire forest: setspn -X ( Look for any conflicts related to TERMSRV/YourRemoteMachineName)
      • To list the SPNs registered to the remote machine: setspn -l YourRemoteMachineName (You MUST see TERMSRV/YourRemoteMachineName and TERMSRV/YourRemoteMachineName.domain.com in the list.)
    2. Repair the SPN: If the SPNs are missing or incorrect, register them with these commands:
      • setspn -A TERMSRV/YourRemoteMachineName YourRemoteMachineName
      • setspn -A TERMSRV/YourRemoteMachineName.domain.com YourRemoteMachineName

    If this guidance helps, feel free to click “Accept Answer” to let us know we're on the right track.


  2. SSE@TUE 160 Reputation points
    2025-09-18T09:59:16.4533333+00:00

    Hi Henry,

    Thank you again for your help and replay. I am really sure the DC 2025 is the issue.

    But I cannot understand why the DC 2025 cannot work with my existing DC 2016/2019. Do you mean because of AES256?

    Now my questions an you

    1. should upgrade all the 2016/2019 DCs to the new DC 2025?
    2. Is that issue after above step resolved?
    3. The DC 2016 holds at the time all FSMOs.

    Should I do that on all DCs?

    I did go the OU containing my Remote machine "evaixtest" and right-click on it and Properties and go to the Attribute Editor

    selected the msDS-SupportedEncryptionTypes

    I see the following value

    User's image

    Is that Ok or should I change it to the value 24? Which value is default by 2025?


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.