Last month’s security patches for Windows 8.1/Windows Server 2012 R2 introduced a problem with NPS Authentication. This month is no different, as Microsoft has altered how authentication works in this area – and the issue will probably be ongoing.
If your environment is affected by this authentication problem, Microsoft has provided the following workaround:
On the server, set the following DWORD registry key’s value to = 0: SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\13\DisableEndEntityClientCertCheck
If you configured this last month, the setting should have been retained and you won’t need to reconfigure it again.
Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!