Welcome to the Microsoft Q&A Platform!
Thank you for asking your question. When publishing RDWeb through Azure AD Application Proxy on Windows Server 2025, intermittent RemoteApp connection failures are usually caused by missing prerequisites in the proxy configuration or backend RDS roles. I would like to provide you some key points to check with a sample working setup.
Key Points:
1. Enable WebSockets in Azure Application Proxy
RemoteApp/RDWeb requires WebSockets for session establishment. If disabled, connections may fail randomly.
2. Verify the Application Proxy Connector
Ensure the connector is healthy and the external RDWeb URL is reachable over HTTPS only.
3. Check Azure AD Registration & Conditional Access
Please ensure:
- RDWeb is registered as an enterprise application
- Users are assigned
- MFA requirements match your Conditional Access policies
4. Validate Certificates
RDWeb and RD Gateway must use valid, trusted SSL certificates to avoid TLS negotiation issues.
5. Review RD Gateway CAP/RAP Policies
Confirm users are explicitly allowed by connection and resource authorization policies.
6. Check Session Host & RD Broker Health
Session hosts must be reachable and the RD Broker must route sessions correctly.
7. DNS Round Robin for HA
Works for RDWeb and RD Gateway—but remember it's not intelligent load balancing.
Session persistence is handled by the RD Broker.
8. Outbound Connectivity (Port 443)
Reverse-connect transport requires outbound 443 from session hosts to Azure.
Working Configuration Example:
- RDWeb published through Azure Application Proxy with WebSockets enabled
- RDWeb registered in Azure AD with Conditional Access enforcing MFA
- RD Gateway and RDWeb split on separate servers and load-balanced via DNS round robin
- RD Broker in HA mode backed by SQL Server
- Session Hosts in collections with RemoteApps published
- Publicly trusted SSL certificates on RDWeb and RD Gateway
- Outbound 443 open from Session Hosts to Azure
- Required internal ports open between RDWeb ↔ RD Gateway ↔ RD Broker ↔ Session Hosts
References: Publish Remote Desktop with Microsoft Entra application proxy
I hope these steps above can help you align with a stable and fully supported deployment when integrating RDS with Azure AD Application Proxy and MFA.