RADIUS/IAS and Verisign cert not playing nice with wireless.


i trying start utilizing verisign wlan certificate within wireless environment, because blackberries can't told ignore server cert windows can be.  i've followed both microsoft's guide (http://www.microsoft.com/downloads/details.aspx?familyid=1971d43c-d2d9-408d-bd97-139afc60996b&displaylang=en) several guides verisign publishes purchasing , installing cert.  i'm relativly sure cert installed properly.  @ verisign walked me through doing on phone yesterday. 

inside of ias had remote access policy wireless clients changed eap methods > select eap providers > protected eap (peap) > certificate issued | field new verisign class 3 wlan secure server ca instead of other cert. 

when clients go connect error inside system event log:

could not retrieve remote access server's certificate due the  following error: credentials supplied package not recognized


directly followed error:

access request user ourdomain\jvillarreal discarded.

 fully-qualified-user-name = ourdomain.org/information technology/users/jordan villarreal

 nas-ip-address = 10.0.0.17

 nas-identifier = tchmcrcswisma0

 called-station-identifier = 00-1d-70-92-d1-10:testnet

 calling-station-identifier = 00-1f-3c-a2-ee-1f

 client-friendly-name = tchmcrcswisma0

 client-ip-address = 10.0.0.17

 nas-port-type = wireless - ieee 802.11

 nas-port = 29

 proxy-policy-name = use windows authentication users

 authentication-provider = windows

 authentication-server = <undetermined>

 reason-code = 1

 reason = internal error occurred. check system event log additional information.

 

for more information, see , support center @ http://go.microsoft.com/fwlink/events.asp .


i'm @ wits end issue.  if has ideas i'd enormously greatful. 

hi andrew,

review last response in thread: http://social.technet.microsoft.com/forums/en-us/winservernap/thread/e7b174cd-1bc9-4f52-b65d-b5c9676dae5d - may fix issue.

also please check requirements i've posted below. http://technet.microsoft.com/en-us/library/bb457068.aspx. in particular, check fqdn requirement.

thanks,
-greg

certificates on ias servers

for computer certificates installed on ias servers, following must true:

  • they must installed in local computer certificate store.

  • they must have corresponding private key. when view properties of certificate certificate snap-in, should see text you have private key corresponds certificate on general tab.

  • the cryptographic service provider certificates supports schannel. if not, ias server cannot use certificate , not selectable properties of smart card or other certificate eap type authentication tab on properties of profile remote access policy.

  • they must contain server authentication certificate purpose (also known enhanced key usage [eku]). eku identified using object identifier (oid). oid server authentication "1.3.6.1.5.5.7.3.1".

  • they must contain qualified domain name (fqdn) of computer account of ias server computer in subject alternative name property.

additionally, root ca certificates of cas issued wireless client computer , user certificates must installed in certificates (local computer)\trusted root certification authorities\certificates folder.

certificates on wireless client computers

for user , computer certificates installed on wireless client computers, following must true:

  • they must have corresponding private key.

  • they must contain client authentication eku (oid "1.3.6.1.5.5.7.3.2")

  • computer certificates must installed in local computer certificate store.

  • computer certificates must contain fqdn of wireless client computer account in subject alternative name property.

  • user certificates must installed in current user certificate store.

  • user certificates must contain universal principal name (upn) of user account in subject alternative name property.

additionally, root ca certificates of cas issued ias server computer certificates must installed in certificates (local computer)\trusted root certification authorities\certificates or certificates (current user)\trusted root certification authorities\certificates folder.



Windows Server  >  Network Access Protection



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file