Deploy UltraVNC with Windows Login and Encryption
This article will walk you through the process of deploying UltraVNC silently to your workstations and servers. We will also cover the simple process of enabling SecureVNC encryption and windows login.
This article uses version 2016.5.4 of Bozteck VENM Remote Desktop Manager.
First, we will create a deployment profile that will contain the settings that we will package up for deployment to our networked computers. That deployment profile will set the initial server password. This password is required even if you will authenticate sessions using your domain accounts. The profile will also choose the “flavor” of VNC. For this tutorial, we will use UltraVNC.
Step 1 – Launch the deployment profile editor
Step 2 – Choose to create a new profile
Step 3 – Give the profile a name and set the initial password
Step 4 – Enable MS login and SecureVNC Encyption
Step 4 – Save and close back to the main windows – Launch the Deployment tool
Step 5 – Set the username/password for deployment and go!
This is a very simple overview of the steps to deploy UltraVNC with strong encryption and Windows accounts. We will deep dive into the SecureVNC plugin and MS authentication methods in a more geeky level in future articles.
In the meantime, here is some basic information about the SecureVNC plugin:
- Default configuration uses 2048-bit RSA keys and 256-bit AES keys.
- RSA public-key cryptography supports 512-, 1024-, 2048-, and 3072-bit keys.
- Configurable choice of symmetric ciphers and keys:
- AES: Supports 128-, 192-, and 256-bit keys.
- Blowfish: Supports 56-, 128-, 192-, 256-, and 448-bit keys.
- IDEA: Supports 128-bit keys.
- CAST5: Supports 56- and 128-bit keys.
- ARC4: Supports 56-, 128-, 192-, and 256-bit keys.
- Classic interface for older UltraVNC versions 220.127.116.11 or below uses 2048-bit RSA keys and 128-bit AES keys.
- All versions are thread safe, allowing the UltraVNC server to host multiple simultaneous viewers.