Delinea Secret Server Β· Training Guide

RDP Launcher vs PRA Launcher

A practical comparison of Secret Server's built-in RDP Launcher and the Delinea Privileged Remote Access (PRA) Launcher β€” covering architecture, use cases, and real-world differences.

Secret Server RDP Launcher (Built-in)
Delinea PRA Launcher
Overview

Both launchers enable privileged remote access from within Secret Server, but they serve distinct use cases and have fundamentally different designs. Understanding the difference is the first step to deploying the right tool.

πŸ–₯️
Secret Server RDP Launcher
BUILT-IN Β· DIRECT CONNECTION

The native RDP Launcher is baked into Secret Server. It invokes the Windows Remote Desktop client (mstsc.exe) or a compatible RDP app, passing credentials automatically so the IT admin never sees or types them. The connection is a standard Microsoft RDP session from the admin's workstation directly to the target.

Direct Connection Agentless IT Admin Use Requires Network Line-of-Sight
πŸ”
Delinea PRA Launcher
PRIVILEGED REMOTE ACCESS Β· PROXIED

The PRA Launcher (Privileged Remote Access) is a separate Delinea product integrated with Secret Server. It enables third-party vendors, contractors, or internal staff to access end-user desktops or servers through a fully brokered, clientless session β€” no VPN or direct network path required.

Proxied / Brokered Clientless Browser Access Vendor / 3rd Party Use No VPN Required
Feature Comparison at a Glance
Feature RDP Launcher PRA Launcher
Connection Type Direct client-to-target RDP Fully proxied / brokered session
VPN Required Usually Yes No
Client Software mstsc.exe or RDP client Browser only (clientless)
Credential Injection Injected at launch (not shown) Injected server-side at broker
Session Recording Video-level (requires Protocol Handler) Native HD with metadata
Primary User Internal IT Admins Vendors, 3rd parties, remote support
Target Support Windows (RDP targets) Windows, Linux, web apps, custom
Firewall Requirements Port 3389 open to target Outbound 443 only
Agent on Target Not Required Optional (enhances capabilities)
Audit Trail Secret access log + video Full session audit + keystrokes
Architecture Differences

The most important distinction is direct vs. proxied connectivity. This architectural choice cascades into every other difference: firewall rules, credential exposure, recording quality, and who can use each launcher.

πŸ–₯️ RDP Launcher β€” Direct Connection Flow
Admin Workstation
Gets creds
Secret Server Vault
mstsc launch
Direct RDP :3389
RDP session
Target Windows Server
πŸ” PRA Launcher β€” Proxied / Brokered Flow
User Web Browser
HTTPS :443
Delinea PRA Broker
Injects creds
Secret Server Vault
Brokered RDP/SSH
Target Server / Desktop
⚑
RDP Launcher Architecture
DIRECT / AGENTLESS
  • 1Admin clicks "Launch" inside Secret Server's web interface.
  • 2Secret Server's Protocol Handler (a small browser extension or helper app) invokes mstsc.exe with injected credentials.
  • 3The RDP client opens a native Windows Remote Desktop window connecting directly to the target on port 3389.
  • 4No agent is needed on the target. No brokering occurs β€” this is a peer-to-peer RDP session.
Key Point: The admin's workstation must have a routable network path to the target. This usually means VPN or being on the same corporate LAN.
πŸ”—
PRA Launcher Architecture
PROXIED / OPTIONALLY AGENT-ASSISTED
  • 1User (vendor, contractor, or IT) opens their browser and logs into Secret Server / PRA portal.
  • 2A session request is sent to the PRA broker. The broker retrieves credentials from Secret Server's vault.
  • 3The PRA broker establishes the RDP/SSH connection to the target on behalf of the user.
  • 4The user sees the remote desktop rendered inside the browser. They never receive or see the credentials.
Key Point: The user's device has no direct network path to the target. All traffic flows through the PRA broker, which sits inside (or securely bridges to) the target network.
πŸ’‘
Agent vs. Agentless The RDP Launcher is fully agentless β€” nothing is installed on the target machine. PRA is also agentless by default but optionally deploys a lightweight Jump Client or Jumpoint component on the target network to improve session performance, support non-RDP protocols (SSH, VNC), and enable unattended access to endpoints behind firewalls.
When to Use Each Launcher

Choose the launcher that matches your scenario. Use the interactive decision guide below to identify the right tool for a given situation.

πŸ€” Decision Guide β€” Click a Scenario to Explore
🏒 The user is an internal IT admin managing servers on the corporate networkβ–Ό
β†’
Use RDP Launcher. The admin has VPN or LAN access, uses a Windows workstation, and needs a full native RDP experience. Secret Server injects credentials so the admin never types a password.
🌐 A third-party vendor needs to access a server without VPN accessβ–Ό
β†’
Use PRA Launcher. Vendors should never be granted VPN access. PRA allows scoped, time-limited, brokered access through a browser with full session recording. Credentials are never exposed to the vendor.
πŸ–±οΈ An end user needs remote desktop support from IT Helpdeskβ–Ό
β†’
Use PRA Launcher. PRA supports attended help desk scenarios where a user initiates or accepts a support session from their own desktop. The PRA Jump Client or support session feature is purpose-built for this use case.
β†’
RDP Launcher can work if the helpdesk admin knows the target machine name, has credentials in Secret Server for that machine, and has network access. But it is not designed for attended support β€” the user experience is inferior.
πŸ“‹ Compliance requires keystroke logging and full session metadataβ–Ό
β†’
Strongly prefer PRA Launcher. PRA records sessions natively with searchable metadata, keystroke capture, and file transfer logging. RDP Launcher video recording is available but lower-fidelity and lacks structured metadata.
πŸ”’ Target machine is in a heavily firewalled DMZ or remote siteβ–Ό
β†’
Use PRA Launcher. PRA requires only outbound HTTPS (443) from the PRA broker/Jumpoint to the cloud relay. No inbound firewall rules needed for the target. RDP Launcher would require port 3389 to be open and routable.
⚑ Admin wants the fastest, lowest-latency RDP experienceβ–Ό
β†’
Use RDP Launcher. Because the connection is direct (workstation-to-target), there is no broker hop adding latency. Native mstsc.exe also leverages all RDP performance optimizations including RemoteFX and compression.
πŸ“± User is on a non-Windows device (Mac, Linux, iPad, Chromebook)β–Ό
β†’
Use PRA Launcher. PRA is fully browser-based and cross-platform. The RDP Launcher depends on mstsc.exe (Windows-only) or requires a compatible client β€” deploying it on non-Windows devices adds complexity and is not officially supported.
βœ…
Best Uses for RDP Launcher
  • Internal IT admins performing routine server management
  • Accessing Windows servers within the same LAN or over VPN
  • Full native RDP performance with RemoteFX support
  • Scenarios where the admin already has an established VPN connection
  • Quick ad-hoc admin access without setting up a brokered session
  • High-bandwidth tasks: graphics-heavy remote work
βœ…
Best Uses for PRA Launcher
  • Third-party vendors, contractors, MSPs needing scoped access
  • Helpdesk/support sessions on end-user desktops (attended)
  • Access to targets in DMZs, restricted networks, or cloud environments
  • Compliance-heavy environments requiring keystroke logging
  • Non-Windows admin devices (Mac, Linux, browser-only)
  • Zero-trust access where VPN is not permitted
Session Recording Quality

Session recording is available in both launchers, but they differ significantly in fidelity, searchability, and the overhead required to enable it.

🎬
RDP Launcher Recording
VIDEO-BASED Β· SCREEN CAPTURE

Secret Server's RDP Launcher records sessions by capturing the screen using the Protocol Handler helper application installed on the admin's workstation. Recording is stored as a video file.

FormatVideo file (MP4/WebM)
Keystrokes CapturedLimited / No
Metadata / SearchNot searchable
Recording DependencyRequires Protocol Handler on admin machine
Tamper ResistanceStandard
PlaybackSecret Server UI (video player)
⚠️ Limitation: If the Protocol Handler is not installed or the admin bypasses the launcher, no recording occurs. Recording completeness depends on the endpoint.
🎬
PRA Launcher Recording
NATIVE BROKER-LEVEL Β· FULL FIDELITY

PRA records sessions at the broker level, meaning every session is always recorded regardless of what the user does on their end. Recording happens inside the proxy β€” it cannot be bypassed by the user.

FormatProprietary HD format with metadata
Keystrokes CapturedYes β€” full keystroke log
Metadata / SearchSearchable by text/keystroke
Recording DependencyNone β€” happens at broker
Tamper ResistanceHigh β€” user cannot disable
PlaybackPRA portal with timeline, search, export
βœ… Advantage: PRA recording is always on. Reviewers can search recorded sessions for specific commands typed during the session β€” invaluable for compliance audits and incident investigations.
πŸ“Œ
Compliance Recommendation: For PCI-DSS, SOX, HIPAA, and similar frameworks requiring privileged session monitoring, PRA's broker-level recording with keystroke capture and tamper-resistant storage is significantly stronger evidence than RDP Launcher's video-only recording. If an audit requires proof that every session was recorded and that recordings cannot be tampered with by the administrator, PRA is the appropriate choice.
Credential Injection Method

Both launchers ensure the user never sees or types the privileged password β€” but they achieve this in very different ways, with different implications for security and auditability.

πŸ”‘
RDP Launcher β€” Client-Side Injection
INJECTED ON THE ADMIN MACHINE
  • 1Admin clicks Launch in Secret Server. The web app passes a launch token to the Protocol Handler.
  • 2Protocol Handler retrieves the credential from Secret Server over an encrypted API call.
  • 3Credential is passed to mstsc.exe via the Windows /v and credential APIs β€” it populates the RDP login automatically.
  • 4The password exists briefly in memory on the admin's workstation during the launch handoff.
⚠️ Note: The credential temporarily passes through the admin's machine memory. In most environments this is acceptable, but for ultra-high security scenarios (e.g., privileged access workstations under surveillance), this should be evaluated.
πŸ”‘
PRA Launcher β€” Server-Side Injection
INJECTED AT THE BROKER β€” NEVER REACHES USER
  • 1User opens a PRA session in their browser. Only an HTTPS session token is issued to the user's browser.
  • 2The PRA broker calls Secret Server's API to retrieve the credential server-side.
  • 3The broker injects the credential into the RDP/SSH session it establishes with the target β€” entirely in the broker's secure environment.
  • 4The user's browser only ever sees a rendered screen. The password never crosses the network to the user's device.
βœ… Zero Credential Exposure: The user (including vendors and contractors) never has access to the credential at any point, in any form. This is the strongest model for third-party and untrusted-endpoint access.
Credential Injection Security Summary
Consideration RDP Launcher PRA Launcher
Password visible to user? No No
Password transits user's device? Briefly (in memory) Never
Password visible on target login screen? No (auto-filled) No (broker fills)
Works with MFA on target? Depends on config Yes β€” PRA handles MFA flows
Suitable for untrusted endpoints? Not recommended Yes β€” designed for this
Requires Protocol Handler install? Yes No
Network & Firewall Requirements

Network requirements are one of the starkest differences between the two launchers. The RDP Launcher is firewall-heavy; PRA is designed to traverse restrictive environments.

🌐
RDP Launcher Network Requirements

Requires a direct, routable network path from the admin workstation to the target on TCP 3389. This means either being on the same LAN or connecting via VPN.

PortProtocolPurpose
443HTTPSSecret Server web UI + API
3389TCPRDP to target machine (must be open)
VPNVariousRequired if target is not on local LAN
⚠️ Firewall Challenge: Port 3389 must be open from the admin's IP range to the target. In hardened environments, this may require specific firewall rules per target or use of a jump server.
🌐
PRA Launcher Network Requirements

Users only need outbound HTTPS on port 443 to the PRA cloud relay or on-prem broker. The PRA broker (or Jumpoint) inside the network makes the RDP connection to the target β€” not the user's device.

PortProtocolPurpose
443HTTPSUser browser to PRA portal
443HTTPS/WSSJumpoint outbound to PRA relay
3389TCPPRA Jumpoint to target (internal only)
βœ… Firewall Advantage: No inbound firewall rules needed for external users. The Jumpoint component makes all connections outbound from the internal network. This works through NAT, proxies, and strict egress-only firewalls.
πŸ—ΊοΈ
Key Network Architecture Rule With the RDP Launcher: the firewall must allow the admin workstation to reach port 3389 on the target.
With PRA: the firewall must allow the Jumpoint/broker to reach port 3389 on the target, and the Jumpoint only needs outbound 443 to the internet. The user's device needs nothing except a browser.
Scenario: Access from Outside the Corporate Network
ScenarioRDP LauncherPRA Launcher
Admin on corporate VPN Works Works
Admin on public Wi-Fi, no VPN Fails (no path to :3389) Works
Vendor on home network Not supported safely Works
Target in DMZ (no inbound 3389) Requires firewall change Works via Jumpoint
Target in cloud (AWS/Azure VPC) Requires VPN or peering Works with cloud Jumpoint
Target behind CGNAT / strict NAT Very difficult Works (outbound only)
User Experience Differences

The experience of using each launcher is very different β€” for IT administrators configuring and launching sessions, and for end users or vendors on the other side of the connection.

For the IT Administrator / Session Initiator
πŸ–₯️  RDP Launcher β€” IT Admin Experience β–Ό
Admin
Navigates to the target server's secret in Secret Server, clicks the Launch button next to the RDP launcher.
System
Browser triggers the Protocol Handler (a small app installed during onboarding). A native Windows Remote Desktop window opens automatically.
Admin
The RDP session opens directly in the familiar Windows Remote Desktop client. The admin sees the remote desktop immediately β€” no browser tab, no web interface overhead.
Admin
Works in the native mstsc.exe window: full clipboard, audio redirection, drive mapping, RemoteFX graphics β€” all standard RDP features are available.
System
Session is logged in Secret Server. If recording is configured, the Protocol Handler captures screen video in the background.
Admin UX Summary: Very familiar, fast, full-featured RDP experience. Feels like any other remote desktop connection β€” just without typing a password.
πŸ”  PRA Launcher β€” IT Admin / Vendor Experience β–Ό
Admin
Logs into the Secret Server or PRA portal from any browser. Navigates to the target or clicks an access link sent via email/ticket.
System
PRA authenticates the user, checks their authorization policy, and establishes the brokered session with the target. The user waits a brief moment for the connection.
Admin
The remote desktop renders inside the browser window. The user interacts with the remote desktop through the web-based viewer β€” mouse and keyboard input are forwarded in real time.
Admin
Some native RDP features (clipboard sharing, drive mapping) may have restrictions configured by policy. File transfer uses a dedicated PRA file transfer panel.
System
Session is fully recorded at the broker. All keystrokes are logged. Session duration and all activity is tracked in the PRA audit trail.
Admin/Vendor UX Summary: Works from any device with a browser. Slightly more overhead than native RDP. Clipboard and drive mapping are policy-controlled and may require an extra step.
For the End User Being Supported
πŸ‘€
End User β€” RDP Launcher Scenario

In a typical admin-to-server scenario, there is no end user β€” the admin is logging into a headless server. However, if IT is connecting to a user's workstation to provide support:

  • β†’User's workstation must have RDP enabled, and the IT admin must have credentials for that machine.
  • β†’The user may see a notification that someone has connected (if they're at the machine).
  • β†’There is no built-in screen-share consent flow β€” the admin simply connects using credentials.
  • β†’Not ideal for attended support β€” the user experience is unintuitive and lacks a "request support" feature.
πŸ‘€
End User β€” PRA Launcher Scenario

PRA is purpose-built for attended remote support. It provides a consent-based, user-friendly experience when IT needs to help an end user:

  • β†’User visits a support URL or the IT admin sends them a session link via chat/email.
  • β†’User is prompted with a clear consent screen: "IT is requesting to view or control your screen."
  • β†’User can see and revoke the session at any time from the PRA Jump Client tray icon.
  • β†’Session ends cleanly and the user is notified when IT disconnects.
Best practice for helpdesk: PRA's attended support model provides transparency, consent, and a professional experience for the user being helped.
UX Summary Table
AspectRDP LauncherPRA Launcher
Setup for first-time usersInstall Protocol Handler onceNothing to install
Session start speedVery fast (native app)Slightly slower (broker setup)
Cross-platform supportWindows-primaryAny OS, any browser
Clipboard transferFull native clipboardPolicy-controlled
File transferDrive mapping (native RDP)PRA file transfer panel
End-user consent screenNot availableYes β€” consent flow built in
Vendor/contractor useNot suitablePurpose-built for this
Works on mobile/tabletNoYes (browser-based)
Quick Reference Card

Use this as a at-a-glance summary for training, onboarding, or when you need to quickly decide which launcher to use.

πŸ–₯️  Use RDP Launcher when…
  • You are internal IT staff with VPN or LAN access
  • The target is a Windows server you regularly manage
  • You want the fastest, most native RDP experience
  • You need full RemoteFX, drive mapping, or audio redirect
  • You are using a Windows workstation with Protocol Handler installed
  • The scenario does not involve third parties or vendors
πŸ”  Use PRA Launcher when…
  • A vendor, contractor, or MSP needs access
  • The user has no VPN and must not get one
  • The target is in a DMZ, cloud, or restricted network
  • You need end user consent for attended desktop support
  • Compliance requires keystroke-level audit trails
  • Users are on Mac, Linux, or non-Windows devices
  • You need to record sessions that users cannot disable
Full Feature Comparison
CategoryRDP LauncherPRA Launcher
Connection modelDirect (client β†’ target)Proxied (client β†’ broker β†’ target)
VPN requiredTypically yesNo
Agent on targetNone requiredOptional Jump Client/Jumpoint
Client softwareProtocol Handler + mstsc.exeBrowser only
Credential injectionClient-side (admin machine)Server-side (broker only)
Credential exposure to userNone visibleNone β€” never reaches user
Session recordingVideo capture (screen)HD + keystrokes + metadata
Recording bypass riskIf handler not installedCannot be bypassed
Attended support (end users)Not designed for itBuilt-in consent + visibility
Firewall rules requiredPort 3389 to targetOutbound 443 from broker only
Cross-platformWindows-primaryAll platforms
Vendor / 3rd party accessNot recommendedPurpose-built
LatencyLow (no broker hop)Slightly higher (broker)
Native RDP featuresFull (RemoteFX, audio, drives)Policy-controlled subset
License requirementIncluded in Secret ServerSeparate PRA license
πŸŽ“
Training Summary The RDP Launcher is your tool for trusted, internal admins managing known infrastructure with an established network path. The PRA Launcher is your tool for any scenario involving external parties, restricted networks, attended support, or strict compliance. When in doubt, PRA provides a stronger security posture at the cost of some native feature richness.