Last year, after much troubleshooting, I managed to get RADIUS authentication working for my AD users (although the first time they connect they have to enter their AD username and password as ticking the 'Use my Windows credentials' checkbox does not work).
Anyway, I'd like switch to computer account authentication, so users aren't prompted to re-authenticate against the WiFi when their AD password changes. However, when I switch to this, users (all on Windows 10) are unable to connect.
This is what is shown in the NPS logs:
Network Policy Server denied access to a user.
Contact the Network Policy Server administrator for more information.
User:
Security ID: OURDOMAIN\Daniel
Account Name: Daniel
Account Domain: OURDOMAIN
Fully Qualified Account Name: OURDOMAIN\Daniel
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
Called Station Identifier: 9A-15-54-AB-56-2D:ES_Radius_Test
Calling Station Identifier: B8-08-CF-3E-20-26
It looks as if the machine name isn't being passed to the RADIUS server (Windows Server 2016). Is this a bug?
To confirm, this is the Network Policy config that works and allows users to connect with the AD credentials:
This config works.
But if I change from User Groups to Machine Groups, users can't connect:
This config doesn't work.