Share via

Explicit EAP error 0x9009030C. Authentication failed due to a user credentials mismatch on NPS server

RONNIE SHIH 5 Reputation points
2024-10-01T18:09:27.51+00:00

We've been having a strange problem related to 802.1x authentication using internal CA certificates against a wireless network that uses 802.1x authentication. Most of the computers don't have issues but this problem crops up on newly setup machines which have acquired internal certs for 802.1X authentication recently. The Explicit EAP error 0x9009030C pops up from the endpoint Windows 11 pc end. On the Windows NPS RADIUS server side, we see eventlog ID 6273 "Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing user account or the password was incorrect." Sometimes I can wire up the laptop and have the user login then the error goes away and wifi connects using 802.1x authentication miraculously. Often times, I need to remote to the pc and launch certificate management console as a domain account that is a local admin on the laptop and launch certificate management console to "request new certificate" then the problem also gets fixed. However, I do not have the real root cause that's causing this problem.

Anyone has any similar experience or insight on this?

Windows for business | Windows Server | User experience | Other
0 comments No comments

3 answers

Sort by: Most helpful
  1. RONNIE SHIH 5 Reputation points
    2024-10-14T16:56:40.0166667+00:00

    Disabled option "Verify the server's identity by validating the certificate" option inside group policy that governs the WLAN 802.1x authentication settings. This seems to have fixed most of the problems.

    I referenced this article:

    https://vcloudnine.de/windows-nps-authentication-failed-with-error-code-16/#:~:text=Logging%20Results:%20Accounting%20information%20was%20written%20to%20the%20local%20log

    I don't see why reverse server side certificate check is ever necessary when an internal CA is used for our 802.1x authentication infrastructure. This shortened the amount of time for wifi connection also, especially during high bandwidth usage inside our SD-WAN.

    0 comments No comments

  2. RONNIE SHIH 5 Reputation points
    2024-10-14T16:56:17.6233333+00:00

    Disabled option "Verify the server's identity by validating the certificate" option inside group policy that governs the WLAN 802.1x authentication settings. This seems to have fixed most of the problems.

    I referenced this article:

    https://vcloudnine.de/windows-nps-authentication-failed-with-error-code-16/#:~:text=Logging%20Results:%20Accounting%20information%20was%20written%20to%20the%20local%20log

    I don't see why reverse server side certificate check is ever necessary when an internal CA is used for our 802.1x authentication infrastructure. This shortened the amount of time for wifi connection also, especially during high bandwidth usage inside our SD-WAN.

    0 comments No comments

  3. Konstantin Golovitser 0 Reputation points
    2024-10-14T14:56:03.8+00:00

    Had the same experience but with wired connection, troubleshooted a lot and noticed that in network capture in non-working device EAPOL packets are missing from authentication session. Re-enrolling the personal certificate did resolved the problem, but i guess that this is more workaround than a solution. Thanks for hint @Ronnieshi

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.