RADIUS/IAS and Verisign cert not playing nice with wireless.
inside of ias had remote access policy wireless clients changed eap methods > select eap providers > protected eap (peap) > certificate issued | field new verisign class 3 wlan secure server ca instead of other cert.
when clients go connect error inside system event log:
could not retrieve remote access server's certificate due the following error: credentials supplied package not recognized
directly followed error:
access request user ourdomain\jvillarreal discarded.
fully-qualified-user-name = ourdomain.org/information technology/users/jordan villarreal
nas-ip-address = 10.0.0.17
nas-identifier = tchmcrcswisma0
called-station-identifier = 00-1d-70-92-d1-10:testnet
calling-station-identifier = 00-1f-3c-a2-ee-1f
client-friendly-name = tchmcrcswisma0
client-ip-address = 10.0.0.17
nas-port-type = wireless - ieee 802.11
nas-port = 29
proxy-policy-name = use windows authentication users
authentication-provider = windows
authentication-server = <undetermined>
reason-code = 1
reason = internal error occurred. check system event log additional information.
for more information, see , support center @ http://go.microsoft.com/fwlink/events.asp .
i'm @ wits end issue. if has ideas i'd enormously greatful.
review last response in thread: http://social.technet.microsoft.com/forums/en-us/winservernap/thread/e7b174cd-1bc9-4f52-b65d-b5c9676dae5d - may fix issue.
also please check requirements i've posted below. http://technet.microsoft.com/en-us/library/bb457068.aspx. in particular, check fqdn requirement.
thanks,
-greg
certificates on ias servers
for computer certificates installed on ias servers, following must true:
-
they must installed in local computer certificate store.
-
they must have corresponding private key. when view properties of certificate certificate snap-in, should see text you have private key corresponds certificate on general tab.
-
the cryptographic service provider certificates supports schannel. if not, ias server cannot use certificate , not selectable properties of smart card or other certificate eap type authentication tab on properties of profile remote access policy.
-
they must contain server authentication certificate purpose (also known enhanced key usage [eku]). eku identified using object identifier (oid). oid server authentication "1.3.6.1.5.5.7.3.1".
-
they must contain qualified domain name (fqdn) of computer account of ias server computer in subject alternative name property.
additionally, root ca certificates of cas issued wireless client computer , user certificates must installed in certificates (local computer)\trusted root certification authorities\certificates folder.
certificates on wireless client computers
for user , computer certificates installed on wireless client computers, following must true:
-
they must have corresponding private key.
-
they must contain client authentication eku (oid "1.3.6.1.5.5.7.3.2")
-
computer certificates must installed in local computer certificate store.
-
computer certificates must contain fqdn of wireless client computer account in subject alternative name property.
-
user certificates must installed in current user certificate store.
-
user certificates must contain universal principal name (upn) of user account in subject alternative name property.
additionally, root ca certificates of cas issued ias server computer certificates must installed in certificates (local computer)\trusted root certification authorities\certificates or certificates (current user)\trusted root certification authorities\certificates folder.
Windows Server > Network Access Protection
Comments
Post a Comment