A non domain-joined client doesn't know everything already that a domain joined client would know, like what domain to auth to and where the Kerberos servers (DCs) are. Here's some things to make sure are configured so your client knows where to go for authentication.
DNS name of RDP Target Server
Specify the AD domain-based FQDN of the RDP target server when connecting via RDP. For example, specify "hostname.domain.com", where "domain.com" is the FQDN of the AD domain.
Username
You must specify the FQDN of the AD domain when specifying your username. You can do that with either of these methods: "username<AT symbol>domain.com" or "domain.com\username".
Network Ports
Make sure your client can reach your DCs on port 88 for Kerberos authentication.
DNS Records
Once your client knows what domain to contact, which it learns through the username field, it will attempt a DNS lookup to find that domain's Kerberos servers. It may consult the following DNS records:
- _kerberos._tcp.domain.com
- _kerberos._tcp.dc._msdcs.ad.uni.edu
Those SRV DNS records should point to the DNS names of your DCs and port 88. Here's example output from nslookup:
PS> nslookup -type=SRV _kerberos._tcp.domain.com
Server: dns.domain.com
Address: 10.0.0.2
_kerberos._tcp.domain.com SRV service location:
priority = 0
weight = 100
port = 88
svr hostname = dc3.domain.com
_kerberos._tcp.domain.com SRV service location:
priority = 0
weight = 100
port = 88
svr hostname = dc4.domain.com
_kerberos._tcp.domain.com SRV service location:
priority = 0
weight = 100
port = 88
svr hostname = dc1.domain.com
_kerberos._tcp.domain.com SRV service location:
priority = 0
weight = 100
port = 88
svr hostname = dc2.domain.com
dc3.domain.com internet address = 10.0.0.4
dc4.domain.com internet address = 10.1.0.4
dc1.domain.com internet address = 10.2.0.4
dc2.domain.com internet address = 10.3.0.4
https://willssysadmintechblog.wordpress.com/2023/08/29/disabling-ntlm-authentication-guide-part-3-migrating-to-kerberos/