Maybe this one helps.
--please don't forget to close up the thread here by marking answer if the reply is helpful--
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Good afternoon, all!
My customer has an enterprise WiFi network and test Windows 11 computers aren't able to connect.
The corporate WiFi is made up of Unifi APs and a Server 2012R2 NPS doing RADIUS chores. The NPS connection policy requires a computer and user certificate, both of which are distributed by a corporate Cert server. All servers and computers, including the NPS server, have intermediate and root CAs allowing them to trust the corporate certs. Group policies distribute the certs and make for automatic WiFi connections without any user interaction. This is working without issue on Win10 machines and has for a few years.
When one user did an in-place upgrade to Win 11, all connectivity worked just fine except for WiFi. On further testing on both the users and another test machine, the NPS server refused to connect with the error:
Reason Code: 265
Reason: The certificate chain was issued by an authority that is not trusted.
As noted, there have been no issues with Win 10 machines.
We ran into a previous issue where Microsoft required certificates with a new OID sequence, but that was resolved, at least for the time being.
Is there a change from how Win 10 presents certificates to a requesting machine? Or is this error not accurate and there's another place to troubleshoot?
Thanks to all for looking!
G
Maybe this one helps.
--please don't forget to close up the thread here by marking answer if the reply is helpful--
you need to add the certificate as a trusted certificate on the windows 11 machine. its probably a self-signed cert. you may need the signing cert.
Hi,
The PEAP settings in the GPO create the wireless profile as the setting to verify the certificate, make sure Root CAs are included.
Try to manually re-install the NPS server's certificate on the client. Or try to edit the wireless connection on the client and in the Protected EAP properties specific that the client should not Validate server certificate and confirm if it works.
Regards,
Karlie