NPS Extension for Azure MFA failing to generate MFA prompt

Warren Calvert 11 Reputation points
2023-05-09T23:24:26.2+00:00

Hi

I am trying to setup a new NPS server with the NPS Extension for Azure MFA to control access to an RDS server on-prem. Authentication works fine when not using the NPS Extension.

With the NPS Extension enabled, the user does not receive an MFA prompt, only an access denied message.

The AuthZOptCh logs shows only the below entry

NPS Extension for Azure MFA: CID xxxxxxxxxxxxxxxxx : Challenge requested in Authentication Ext for user Domain\UserName with state xxxxxxxxxxxxxxxxxxxxxxxx

There are no other entries and nothing else logged. AzureAD logs show no success or failed sign-in attempts.

I have the latest version of the MFA extension.
I'm aware there are issues with MFA number matching and have set OVERRIDE-NUMBER-MATCHING-WITH-OTP to TRUE in the registry as Microsoft document.
The user's default authentication method is Microsoft Authenticator - Notification

Of course, there are no issues with MFA authentication when accessing Office 365.

Please could someone help to work out what is wrong

Thanks,
Warren.

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

6 answers

Sort by: Most helpful
  1. Leandro Marques dos Santos 110 Reputation points
    2023-05-30T20:41:31.0733333+00:00

    Dears,

    I just fixed the event. In my case it was related to the version of the NPS extension where from version 1.2.2216.1 the TOTP authentication method is requested. I found references to turning the authentication type back to Approve/Deny in the references below.

    https://learn.microsoft.com/pt-br/azure/active-directory/authentication/how-to-mfa-number-match#nps-extension

    https://blog.hametbenoit.info/2022/11/21/azure-ad-authenticator-number-matching-will-be-enabled-for-all-users/#.ZHZWSn3MLIU

    https://fberson.medium.com/new-number-matching-azure-mfa-feature-impact-microsoft-rdgw-nps-extension-df938a15c53

    To solve it, I just had to add the entry OVERRIDE_NUMBER_MATCHING_WITH_OTP as "FALSE" in the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa".

    Hope this helps.

    Leandro Marques.

    22 people found this answer helpful.

  2. Konstantinos Passadis 19,591 Reputation points MVP
    2023-05-09T23:33:55.9133333+00:00

    Hello @Warren Calvert !

    At this point i can offer a detailed reading of the Guide

    https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension

    Especially at the end

    Please tell us how are you Syncing to Azure AD ?

    Do you have Premium P1 Licenses or Licenses with MFA for the users ?

    Sorry for asking but we need every small detail as you can understand

    This is a straight forward setup so something is amiss

    Post you info , again read carefully the guide and the prerequisites

    If there is a Firewall Disable packet inspection for the NPS Server

    Also verify TIME is correct on server

    I hope this helps!

    Kindly mark the answer as Accepted and Upvote in case it helped!

    Regards


  3. Warren Calvert 11 Reputation points
    2023-05-10T16:48:10.8433333+00:00

    Hi Konstantinos

    Thanks for your reply. That article is the one I followed.

    I'm syncing AzureAD using AzureAD Connect with PHS

    Users have M365 E3 licenses

    Time is correct.

    I'm hoping someone has seen this issue and can offer some advice for resolving it.

    Thanks,
    Warren.

    0 comments No comments

  4. Marilee Turscak-MSFT 37,206 Reputation points Microsoft Employee Moderator
    2023-05-10T23:01:17+00:00

    @Warren Calvert

    These are common root causes for this issue:

    • Delay or failure to synchronize password changes for some users
    • Users have Extended ASCII chars into the password

    Note that the Network Policy Server (NPS) does not support the use of the Extended ASCII characters within passwords and this limitation can lead to access issues. https://learn.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-best-practices

    Please also verify the following:

    1. Confirm that the user's phone number is correctly configured and formatted, and that the number in the portal is accurate.
    2. Verify that you have enough Premium P1 licenses assigned for the users.

    If you can reproduce the issue, it would be helpful if you could collect a network trace and provide event logs when this issue occurs.

    Does this issue only occur for the one user or are there multiple users who are affected?

    Feel free to reach out to me at ******@microosft.com ("Attn: Marilee Turscak") to further troubleshoot. Please also include your subscription ID and a link to this issue if you'd like to get a one-time free support case opened to look into this.

    If the information helped you, please Accept the answer. This will help us as well as others in the community who may be researching similar issues.


  5. Leandro Marques dos Santos 110 Reputation points
    2023-05-30T16:01:53.1+00:00

    Hi, all.

    I have the same problem. I needed to update the certificate that had expired and later update the NPS Extension for Azure MFA and after updating the problems started.

    I couldn't find the source of the problem. However, the settings are all correct, as the deployment was carried out with the responsible team at Microsoft.

    I believe it's something after updating the NPS extension, but the logs are too simplistic to handle the problem.

    If you have any ideas on possible treatments, I'd appreciate it.

    Regards,

    Leandro Marques.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.