Skip to main content

RDP Server Installation

This guide provides all necessary steps to install and configure the RDP Server, which enables secure, gateway-managed remote desktop access to your assets directly from the ServiceOps UI.

The RDP Server, powered by MeshCentral, acts as the central communication gateway that facilitates secure remote desktop connections between your ServiceOps instance and the target assets. This guide provides comprehensive instructions for installing and configuring the RDP Server for on-premise deployment.

Architecture

Deployment Models

The RDP Server can be deployed in two primary configurations:

  • Local Deployment: The RDP Server and the main ServiceOps Server are installed on the same machine. This is a simpler setup suitable for smaller environments.
  • Remote Deployment: The RDP Server is installed on a separate, dedicated machine. This is recommended for larger environments to distribute the load and enhance security.

Communication Flow

This architecture demonstrates how ServiceOps integrates with an RDP Server to enable secure remote management of endpoints, especially for discovery and remote sessions. The flow includes on-premise deployment, secure gateway protection, DNS routing, and communication with remote users.

RDP Server Communication Architecture

On-Premise Setup

The ServiceOps Application is deployed within the organization's data center. It communicates with the RDP Server over standard secure ports (443, 22, 5432) for session control, authentication, and data exchange. Local Users connect using either a Discovery Agent (to detect assets, configurations, and statuses) or a Remote RDP Agent (to enable remote session handling).

Secure Gateway

All traffic from the internet passes through the Secure Gateway (Firewall/Reverse Proxy). It ensures encrypted communication, enforces security policies, and prevents unauthorized access to the internal RDP and ServiceOps servers.

DNS Resolution

The DNS Server resolves domain names like:

  • serviceopsdomain.com:443 → Directs to the ServiceOps Application
  • rdp.serviceopsdomain.com:443 → Directs to the RDP Server

These entries allow users and agents to securely reach the correct service endpoints over the internet.

Remote Access via Internet

Remote Users outside the corporate network access ServiceOps and RDP sessions through the internet. They install Discovery Agents (for endpoint inventory and updates) and Remote RDP Agents (to establish secure RDP sessions). Communication is encrypted over port 443 to ensure data privacy and compliance.

Components & Roles

On-Premise

  • ServiceOps Application: Central ITSM application handling requests, workflows, and integration with RDP Server.
  • RDP Server: Provides remote session hosting, allowing ServiceOps to initiate and manage RDP connections to endpoints. Communicates with ServiceOps via secure ports (443, 22, 5432).
  • Local Users: Use Discovery and RDP Agents to interact with endpoints and ServiceOps.

Agents

  • Discovery Agent: Collects inventory and status of endpoints.
  • Remote RDP Agent: Facilitates remote desktop sessions through the RDP server.

Security & Connectivity

  • Secure Gateway (Firewall/Proxy): Protects internal servers and routes secure traffic between remote users and ServiceOps/RDP servers.
  • DNS Server: Resolves domain requests for ServiceOps (serviceopsdomain.com) and RDP (rdp.serviceopsdomain.com).
  • Internet: Provides connectivity between remote users and on-premise infrastructure.

Remote Users

  • Discovery Agent (Remote): Installed on remote endpoints to enable asset discovery and updates over the internet.
  • Remote RDP Agent: Allows secure remote desktop sessions to be established via ServiceOps and the RDP server.
Summary

This architecture allows both local and remote users to securely connect to organizational resources using ServiceOps and RDP. The Secure Gateway ensures protected traffic, while DNS routing and encrypted ports (443) provide seamless and secure endpoint discovery and remote access capabilities.

Prerequisites

Before you begin the installation, ensure the following requirements are met.

System Requirements

  • Operating System:
    • Ubuntu 22.04 / 24.04
    • Red Hat Enterprise Linux (RHEL) 9.2 / 9.4
  • Permissions: Root or sudo privileges are required for installation.

Network Requirements

  • Internet Access: Required during installation to verify the wildcard SSL certificate.
  • ServiceOps Server Access: The RDP server machine must be able to communicate with the main ServiceOps server's IP address.
  • Database Access: If the ServiceOps database is on a separate server, the RDP server must have access to the database on port 5432.
  • Firewall Ports:
    • Local Connection: Port 8443 must be open.
    • Remote Connection: Port 443 must be open.
    • Use sudo ufw status to check and sudo ufw allow <port> to open ports on Ubuntu.
  • DNS / Host Entry: If the ServiceOps server is not publicly accessible via a domain name, you must add a host entry on the RDP server to map the ServiceOps IP address to its domain name.

Required Information

  • ServiceOps Server IP Address: The IP address of your main ServiceOps instance.
  • ServiceOps Domain Name: The fully qualified domain name (FQDN) of your ServiceOps instance.
  • ServiceOps Database Password: The encrypted database password from your main ServiceOps server configuration.
  • (Optional) A valid CA-signed SSL certificate and private key: Needed if you are using a CA-signed certificate for secure communication.
note

This document applies to Ubuntu OS v22, 24 and RedHat OS v9.2 and 9.4.


RDP Server Installation Steps

This section outlines the two methods available for installing the RDP Server, allowing you to choose the approach that best suits your deployment needs.

This section outlines the process for installing the RDP Server using the simplified installer. The installation supports self-signed certificate generation during setup if CA-signed certificate is not available.

note

Starting from v8.7.4, the RDP Server must be installed using the simplified installation method instead of the manual method.

Installation Steps

Follow these steps to install the RDP Server.

Step 1: Download the Installer

  1. Download the latest RDP Server installer package for your operating system from the Download Links page.

Step 2: Copy the RDP Installer File

Copy the RDP installer file to the target server and place it in a directory where you have execution permissions.

Step 3: Assign Executable Permissions

Provide executable permission to the installer file:

Syntax: chmod 777 <installer-file-name>

Example: chmod 777 MotadataMeshcentralserver

Step 4: Run the Installer

Run the installer using the following command:

Syntax: ./<installer-file-name>

Example: ./MotadataMeshcentralserver

Step 5: Enter the RDP Server FQDN

When prompted, enter the Fully Qualified Domain Name (FQDN) of the RDP Server.

This FQDN is used for server configuration and certificate setup.

Step 6: Certificate Configuration

During installation, you will be prompted to specify whether a valid CA-signed certificate is available.

Option 1: CA-Signed Certificate Available (Select Yes)

If you have a valid CA-signed certificate:

  1. Enter the full path to the certificate file.
  2. Enter the full path to the private key file.
  3. The installer validates the certificate and continues with the installation.


Step 7: Provide Sudo User Details

Enter the username of the sudo user that should be used to configure the RDP Server.

This user account will be used to complete the installation and configuration steps.

Step 8: Installation Completion

After all required inputs are provided:

  • Certificate configuration is completed.
  • RDP Server installation finishes successfully.
  • The RDP Server is ready for use.

Post-Installation Configuration

After a successful installation, you may need to perform additional configurations to tailor the RDP server to your environment.

Port Configuration

Port Configuration

To change the default listening port of the RDP server, you must edit configuration files for MeshCentral and Nginx, update your firewall, and finally update the port in the ServiceOps UI.

The following example shows how to change the port to 8089.

1. Update the RDP Server's Config File (config.json)

  1. Navigate to the MeshCentral data directory:

    cd /opt/meshcentral/meshcentral-data/

  2. Open the config.json file for editing.

  3. Add or modify the "port" key to specify your desired port.

    json
    "port": 8089

    Set new port in config.json

  4. Save and close the file.

2. Update the RDP Nginx Config File (mesh_nginx.conf)

  1. Navigate to the Nginx configuration directory:

    cd /etc/nginx/conf.d/

  2. Open the mesh_nginx.conf file for editing.

  3. Locate the listen directive and change the port number to match the port you set in config.json (e.g., 8089). The default is 8443.

    nginx
    listen 8089;

    Set new port in mesh_nginx.conf

  4. Save and close the file.

3. Configure ServiceOps Reverse Proxy (fmt_nginx.conf) [Local Deployments Only]

If your RDP Server is installed on the same machine as ServiceOps, you must update the main Nginx reverse proxy configuration.

  1. In the /etc/nginx/conf.d/ directory, open the fmt_nginx.conf file for editing.

  2. Locate the location block that forwards traffic to the RDP server (the proxy_pass will point to the old port).

  3. Update the port in the proxy_pass URL to your new port number. For example, change proxy_pass https://localhost:8443; to proxy_pass https://localhost:8089;.

    Update fmt_nginx.conf proxy_pass

  4. Save and close the file.

note

This step is only required for local deployments where ServiceOps and the RDP Server share the same Nginx instance.

4. Update Firewall Rules

Open the new port in your firewall. For example, on Ubuntu:

sudo ufw allow 8089

5. Restart Services

Restart both Nginx and MeshCentral to apply all changes.

```
sudo systemctl restart nginx
sudo systemctl restart meshcentral.service
```

6. Update Port in ServiceOps UI

Finally, inform ServiceOps of the new port number.

  1. Log in to your ServiceOps technician portal.
  2. Navigate to Admin > Asset Management > RDP Configurations.
  3. Update the Port field to the new port number (e.g., 8089).
  4. Save the configuration.

Uninstallation Steps

To uninstall the RDP Server, you need to stop and disable the MeshCentral service and then remove the installation directory, as shown in the steps below:

  1. Login to the terminal server with root user.
  2. Stop the MeshCentral Service:
    sudo systemctl stop meshcentral.service
  3. Disable the Service: This prevents the service from starting up on boot.
    sudo systemctl disable meshcentral.service
  4. Remove the Service File:
    sudo rm /etc/systemd/system/meshcentral.service
  5. Remove the Installation Directory: This will delete all RDP server files and configurations.
    sudo rm -rf /opt/meshcentral/
  6. After uninstalling the server, verify the uninstallation by navigating to the /opt folder and checking for the presence of the meshcentral folder. If the folder is not found, the uninstallation was successful.

Frequently Asked Questions

Why do we need a Wildcard Certificate?

A: An SSL/Self-Signed Certificate is required, matching the domain of the ServiceOps Nginx server.

For Example: If ServiceOps has a certificate for abc.motadataserviceops.com and RDP Server has rdp.motadataserviceops.com, a wildcard certificate (*.motadataserviceops.com) ensures both use the same SSL.

Both ServiceOps and RDP Nginx must have the same SSL Certificate.

Do we need HTTP or HTTPS?

A: Only HTTPS is required for security.

What ports need to be open on the RDP server?

A: The required ports are:

  • Local Access: Port 8443
  • Remote Access: Port 443
  • ServiceOps DB: Port 5432
Can RDP Server be deployed On-Premise while ServiceOps is on SaaS?

A: Yes, but the customer must use a private cloud and be willing to expose its database to the public.

Is the Internet required for On-Premise setups?

A: Not necessarily. However, if an SSL certificate requires validation, Internet access is needed.

Troubleshooting

For common issues and solutions related to RDP installation and configuration, refer to the RDP Installation and Troubleshooting Guide.

Next Steps