Root CA Renewal Broke Wireless Authentication via EAP (NPS Issue)

Skyycc 0 Reputation points
2025-01-24T18:00:06.56+00:00

So we had our Root CA Certificate expire, and I renewed it the same day it expired. Since then the wireless clients that connected via a certificate from the CA can no longer connect to the wireless. They simply receive the error "Can't connect to this network"

Here's the setup:

Users connect to the WiFi via a Ruckus Access Point system, which is configured to use a RADIUS server on our DCs for authentication.

The Ruckus controller has the Root CA Certificate added to its Trusted CA Certificates/Chain (external) list.

The RADIUS server is running on our domain controllers (NPS on Windows Server), which also have the renewed CA Certificate and the RADIUS authentication certificate installed.

Wireless authentication is configured using EAP, and both the CA Certificate and the Wireless Authentication Enrollment Certificates are deployed to clients via Group Policy.

What I've done so far:

I renewed the Root CA Certificate on the CA server the same day it expired.

Deleted the old certificates (both Root CA and any client certificates issued before renewal) from all domain controllers and clients.

Pushed the renewed CA Certificate to all domain-joined devices via Group Policy.

Verified that the renewed CA Certificate is installed in the Trusted Root Certification Authorities store on all devices (clients and servers).

Verified that the Wireless Authentication Enrollment Certificate is being issued from the CA server to clients and installed correctly.

Event Log on the NPS server shows:

Reason Code: 295

Reason: A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.

The Root CA certificate expired and was renewed, but wireless clients can no longer authenticate via EAP. Despite having the correct certificates installed and trusted on all devices, the NPS server continues to reject authentication attempts with Reason Code 295, citing a trust issue with the CA chain.

Any thoughts on what I might be missing or what else to try? Thank you for reading!

 So we had our Root CA Certificate expire, and I renewed it the same  day it expired. Since then the wireless clients that connected via a  certificate from the CA can no longer connect to the wireless. They  simply receive the error "**Can't connect to this network**"   

 Here's the setup:   

 Users connect to the WiFi via a Ruckus Access Point system, which is  configured to use a RADIUS server on our DCs for authentication.   

 The Ruckus controller has the Root CA Certificate added to its Trusted CA Certificates/Chain (external) list.   

 The RADIUS server is running on our domain controllers (NPS on  Windows Server), which also have the renewed CA Certificate and the  RADIUS authentication certificate installed.   

 Wireless authentication is configured using EAP, and both the CA  Certificate and the Wireless Authentication Enrollment Certificates are  deployed to clients via Group Policy.   

 What I've done so far:   

 I renewed the Root CA Certificate on the CA server the same day it expired.   

 Deleted the old certificates (both Root CA and any client  certificates issued before renewal) from all domain controllers and  clients.   

 Pushed the renewed CA Certificate to all domain-joined devices via Group Policy.   

 Verified that the renewed CA Certificate is installed in the Trusted  Root Certification Authorities store on all devices (clients and  servers).   

 Verified that the Wireless Authentication Enrollment Certificate is  being issued from the CA server to clients and installed correctly.   

 **Event Log on the NPS server shows:**   

 **Reason Code: 295**   

 **Reason:** A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.   

 The Root CA certificate expired and was renewed, but wireless  clients can no longer authenticate via EAP. Despite having the correct  certificates installed and trusted on all devices, the NPS server  continues to reject authentication attempts with **Reason Code 295**, citing a trust issue with the CA chain.   

 Any thoughts on what I might be missing or what else to try? Thank you for reading!   
Windows
Windows
A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.
5,778 questions
Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,665 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Geoff McKenzie 315 Reputation points
    2025-01-27T23:16:01.9433333+00:00

    Hi SkyCC,

    As you are seeing error 295 on the NPS server (which I understand is also your DC), I would start looking there.

    I would enable CAPI2 log on that server. Note this may rollover quickly so you may want to increase the log size a bit AND time your test to minimise noise. e.g. enable CAPI2 log. Perform test, disable CAPI2 log.

    Then look through the logs. From this log you should be able to determine which certificate and where in the chain, the validation fails.

    I can't see in your description, if you have more than just a root (i.e. do you have a 2 tier PKI with issuing CAs) so I am just assuming you have only a root CA.

    I aslo cannot see any indication of how you performed the Root CA cert renewal. If I recall correctly there are some scenarios where you need to keep the old Root CA in the systems to enable cross certification between old CA cert and new CA cert, however, I am not sure if that is relevant in your situation, especially with the old Root expired.

    Regardless, the CAPI2 log should tell you where the validation is failing and on which certificate.

    CAPI2 logs are in eventvwr under "Applications and services" -> Microsoft -> Windows -> CAPI2

    Good luck

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.