A practical comparison of Secret Server's built-in RDP Launcher and the Delinea Privileged Remote Access (PRA) Launcher β covering architecture, use cases, and real-world differences.
Both launchers enable privileged remote access from within Secret Server, but they serve distinct use cases and have fundamentally different designs. Understanding the difference is the first step to deploying the right tool.
The native RDP Launcher is baked into Secret Server. It invokes the Windows Remote Desktop client (mstsc.exe) or a compatible RDP app, passing credentials automatically so the IT admin never sees or types them. The connection is a standard Microsoft RDP session from the admin's workstation directly to the target.
The PRA Launcher (Privileged Remote Access) is a separate Delinea product integrated with Secret Server. It enables third-party vendors, contractors, or internal staff to access end-user desktops or servers through a fully brokered, clientless session β no VPN or direct network path required.
| Feature | RDP Launcher | PRA Launcher |
|---|---|---|
| Connection Type | Direct client-to-target RDP | Fully proxied / brokered session |
| VPN Required | Usually Yes | No |
| Client Software | mstsc.exe or RDP client | Browser only (clientless) |
| Credential Injection | Injected at launch (not shown) | Injected server-side at broker |
| Session Recording | Video-level (requires Protocol Handler) | Native HD with metadata |
| Primary User | Internal IT Admins | Vendors, 3rd parties, remote support |
| Target Support | Windows (RDP targets) | Windows, Linux, web apps, custom |
| Firewall Requirements | Port 3389 open to target | Outbound 443 only |
| Agent on Target | Not Required | Optional (enhances capabilities) |
| Audit Trail | Secret access log + video | Full session audit + keystrokes |
The most important distinction is direct vs. proxied connectivity. This architectural choice cascades into every other difference: firewall rules, credential exposure, recording quality, and who can use each launcher.
mstsc.exe with injected credentials.Choose the launcher that matches your scenario. Use the interactive decision guide below to identify the right tool for a given situation.
Session recording is available in both launchers, but they differ significantly in fidelity, searchability, and the overhead required to enable it.
Secret Server's RDP Launcher records sessions by capturing the screen using the Protocol Handler helper application installed on the admin's workstation. Recording is stored as a video file.
| Format | Video file (MP4/WebM) |
| Keystrokes Captured | Limited / No |
| Metadata / Search | Not searchable |
| Recording Dependency | Requires Protocol Handler on admin machine |
| Tamper Resistance | Standard |
| Playback | Secret Server UI (video player) |
PRA records sessions at the broker level, meaning every session is always recorded regardless of what the user does on their end. Recording happens inside the proxy β it cannot be bypassed by the user.
| Format | Proprietary HD format with metadata |
| Keystrokes Captured | Yes β full keystroke log |
| Metadata / Search | Searchable by text/keystroke |
| Recording Dependency | None β happens at broker |
| Tamper Resistance | High β user cannot disable |
| Playback | PRA portal with timeline, search, export |
Both launchers ensure the user never sees or types the privileged password β but they achieve this in very different ways, with different implications for security and auditability.
/v and credential APIs β it populates the RDP login automatically.| Consideration | RDP Launcher | PRA Launcher |
|---|---|---|
| Password visible to user? | No | No |
| Password transits user's device? | Briefly (in memory) | Never |
| Password visible on target login screen? | No (auto-filled) | No (broker fills) |
| Works with MFA on target? | Depends on config | Yes β PRA handles MFA flows |
| Suitable for untrusted endpoints? | Not recommended | Yes β designed for this |
| Requires Protocol Handler install? | Yes | No |
Network requirements are one of the starkest differences between the two launchers. The RDP Launcher is firewall-heavy; PRA is designed to traverse restrictive environments.
Requires a direct, routable network path from the admin workstation to the target on TCP 3389. This means either being on the same LAN or connecting via VPN.
Users only need outbound HTTPS on port 443 to the PRA cloud relay or on-prem broker. The PRA broker (or Jumpoint) inside the network makes the RDP connection to the target β not the user's device.
| Scenario | RDP Launcher | PRA Launcher |
|---|---|---|
| Admin on corporate VPN | Works | Works |
| Admin on public Wi-Fi, no VPN | Fails (no path to :3389) | Works |
| Vendor on home network | Not supported safely | Works |
| Target in DMZ (no inbound 3389) | Requires firewall change | Works via Jumpoint |
| Target in cloud (AWS/Azure VPC) | Requires VPN or peering | Works with cloud Jumpoint |
| Target behind CGNAT / strict NAT | Very difficult | Works (outbound only) |
The experience of using each launcher is very different β for IT administrators configuring and launching sessions, and for end users or vendors on the other side of the connection.
In a typical admin-to-server scenario, there is no end user β the admin is logging into a headless server. However, if IT is connecting to a user's workstation to provide support:
PRA is purpose-built for attended remote support. It provides a consent-based, user-friendly experience when IT needs to help an end user:
| Aspect | RDP Launcher | PRA Launcher |
|---|---|---|
| Setup for first-time users | Install Protocol Handler once | Nothing to install |
| Session start speed | Very fast (native app) | Slightly slower (broker setup) |
| Cross-platform support | Windows-primary | Any OS, any browser |
| Clipboard transfer | Full native clipboard | Policy-controlled |
| File transfer | Drive mapping (native RDP) | PRA file transfer panel |
| End-user consent screen | Not available | Yes β consent flow built in |
| Vendor/contractor use | Not suitable | Purpose-built for this |
| Works on mobile/tablet | No | Yes (browser-based) |
Use this as a at-a-glance summary for training, onboarding, or when you need to quickly decide which launcher to use.
| Category | RDP Launcher | PRA Launcher |
|---|---|---|
| Connection model | Direct (client β target) | Proxied (client β broker β target) |
| VPN required | Typically yes | No |
| Agent on target | None required | Optional Jump Client/Jumpoint |
| Client software | Protocol Handler + mstsc.exe | Browser only |
| Credential injection | Client-side (admin machine) | Server-side (broker only) |
| Credential exposure to user | None visible | None β never reaches user |
| Session recording | Video capture (screen) | HD + keystrokes + metadata |
| Recording bypass risk | If handler not installed | Cannot be bypassed |
| Attended support (end users) | Not designed for it | Built-in consent + visibility |
| Firewall rules required | Port 3389 to target | Outbound 443 from broker only |
| Cross-platform | Windows-primary | All platforms |
| Vendor / 3rd party access | Not recommended | Purpose-built |
| Latency | Low (no broker hop) | Slightly higher (broker) |
| Native RDP features | Full (RemoteFX, audio, drives) | Policy-controlled subset |
| License requirement | Included in Secret Server | Separate PRA license |