Microsoft NPS for Multi-Forests with EAP-TLS

Marcus Wong Theen Nam 1,091 Reputation points
2022-01-02T14:09:52.83+00:00

I'm deploying Microsoft NPS Windows Server 2019 in two-way trust multiple AD forests for secure wireless access using EAP-TLS. The design is as below:

Forest 1 (abc.com)
Forest 2 (XYZ.com)
One Microsoft NPS server (on abc.com)

Users in abc.com can authenticate to WIFI successfully using EAP-TLS. But users in XYZ.com failed to authenticate.

I have created another policy and included the domain users and computers group of xyz.com forest but still failed to authenticate. I have also added the NPS server computer object into RAS and IAS group of each AD forests.

Do I need to deploy a RADIUS proxy? Or is there any other configuration that I need to do in order to make it work?

Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
12,127 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Clément BETACORNE 2,031 Reputation points
    2022-01-03T08:43:29.01+00:00

    Hello,

    Based on this article it is not mandatory to have a RADIUS proxy however they mention that it will be mandatory if you are using EAP-TLS with certificate :
    "NPS supports authentication across forests without a RADIUS proxy when the two forests contain only domains that consist of domain controllers running Windows Server 2008, Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition. The forest functional level must be Windows Server 2008 or Windows Server 2003, and there must be a two-way trust relationship between forests. If you use EAP-TLS or PEAP-TLS with certificates as your authentication method, you must use a RADIUS proxy for authentication across forests that consist of Windows Server 2008 and Windows Server 2003 domains"
    https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd197447(v=ws.10)?redirectedfrom=MSDN

    This thread mention someone you make it work by adding the allow to authenticate right on the NPS :
    https://social.technet.microsoft.com/Forums/windowsserver/en-US/039ec884-3ad6-45c7-90cb-f2bbe84a6113/nps-authentication-crossforest-domains?forum=winserverNAP

    Normally you should have more information in the NPS log

    Regards,