How to disable TLS on Thinfinity Remote Desktop

How to disable TLS on Thinfinity Remote Desktop

In this article, we’ll briefly describe how to disable TLS for Thinfinity Remote Desktop.

This article covers the guides to disabling:

  • TLS 1.0
  • TLS 1.1
  • TLS 1.2

To do so we will have to access the Registry Editor and find the TLS registry path.

To access the Registry Editor, In the search box on the taskbar, type regedit. Then, select the top result for the Registry Editor (Desktop app).

How to disable TLS on Thinfinity Remote Desktop -01

Open the folder HKEY_LOCAL_MACHINE, then pick up the folder called SOFTWARE.

You will see the folder “Cybele Software” which contains a subfolder called “Thinfinity Remote Desktop”.

It will look something like this:

How to disable TLS on Thinfinity Remote Desktop -02

 

Once in there, you will have to follow the path indicated and perform the following steps according to the TLS version you are running.

TLS 1.0

This subkey controls the use of TLS 1.0.

For TLS 1.0 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

To disable TLS 1.0 for the client or server, change the DWORD value to 0. If an SSPI app requests to use TLS 1.0, it will be denied.

To disable TLS 1.0 by default, create a DisabledByDefault entry and change the DWORD value to 1. If an SSPI app explicitly requests to use TLS 1.0, it may be negotiated.

The following example shows TLS 1.0 disabled in the registry:

How to disable TLS on Thinfinity Remote Desktop -03

TLS 1.1

This subkey controls the use of TLS 1.1.

For TLS 1.1 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

To disable TLS 1.1 for the client or server, change the DWORD value to 0. If an SSPI app requests to use TLS 1.1, it will be denied.

To disable TLS 1.1 by default, create a DisabledByDefault entry and change the DWORD value to 1. If an SSPI app explicitly requests to use TLS 1.1, it may be negotiated.

The following example shows TLS 1.1 disabled in the registry:

How to disable TLS on Thinfinity Remote Desktop -04

TLS 1.2

This subkey controls the use of TLS 1.2.

For TLS 1.2 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

To disable TLS 1.2 for client or server, change the DWORD value to 0. If an SSPI app requests to use TLS 1.2, it will be denied.

To disable TLS 1.2 by default, create a DisabledByDefault entry and change the DWORD value to 1. If an SSPI app explicitly requests to use TLS 1.2, it may be negotiated.

The following example shows TLS 1.2 disabled in the registry:

How to disable TLS on Thinfinity Remote Desktop -05

After performing these changes, it will be necessary to restart your machine.

 If you need any assistance, please contact [email protected].

 

Thinfinity Solutions for remote desktop, screen sharing, digital workspace and application virtualization.

Thinfinity Solutions

As you already know, Thinfinity Remote Desktop provides remote access, desktop delivery, and app publishing solutions.

Securely deliver your Windows applications and desktops to any device with an HTML5 browser, no matter if they are hosted on the cloud, installed on-premises, or on hybrid architectures.

Thinfinity Remote Desktop comes with its web server that creates HTTP and HTTPS connections with the end-user browser, using web sockets and providing a fluent user experience, even with heavyweight workloads. It is really that simple!

Would you like to know more? Explore our other remoting and web-enabling solutions, enjoy our free trials, or request a custom demo HERE. No commitment!

We will be happy to assist you and show you our portfolio for remote desktop, screen sharing, digital workspace, and application virtualization.

Leave a comment

Privacy Preferences
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.