I'm on the same boat as the OP and hate to see answers without specific guidance.
- Our non-domain devices have a valid client authentication cert from our CA.
- The cert on the device has both the subject name and SAN with the device FQDN.
- The CA is trusted by the NPS server.
- The NPS policy is configured for EAP-TLS with the EAP Auth set to 'Microsoft: Smart Card or other certificate. Besides that, the only other condition is the NAS port type, set to the appropriate wireless types.
Despite all this, the devices cannot connect to the Wifi network using it's certificate. NPS is still trying to match the device with an AD account and rejects the auth request. The audit logs simply stating 'The specified user account does not exist.'
Here's my problem with the answer provided here by the MS people:
- "Alternatively, you can configure NPS to accept certificates based on specific attributes, such as the Subject Alternative Name (SAN) value." No links, no guidance on how this is accomplished. I'm yet to find anything in the NPS policies related to this.
- "Ensure that the policies are correctly set up to handle the authentication requests from non-domain joined devices." Meaning what? Again, no specifics. I've made this policy as vanilla as I can.
Countless other searches have provided similar outcomes. So I'm calling bs on the notion that NPS can authenticate non-domain devices just using device certificates. It still wants an AD object associated with it.