Hi B_055,
Thank you for posting in the Microsoft Community Forums.
Check the NPS server configuration:
Ensure that the network policy on the NPS server is configured correctly, especially the parts related to EAP-TLS. Check that the network policy specifies the correct authentication method (EAP-TLS) and encryption settings.
Verify the certificate chain of trust on the NPS server The NPS server needs to trust the CA root certificate issued to the client certificate.
Check the logging settings of the NPS to ensure that all relevant logs are captured and logged.
Certificate Validation:
Although you have verified that the certificate is visible on the NPS and contains the correct OID and SAN, double-check the certificate's validity, revocation status (if CRL checking is enabled), and the integrity of the certificate chain.
Ensure that the certificate on the client computer is also valid and that the client trusts the CA that issued the certificate.
Client Configuration:
Check the 802.1X configuration on the client computer, specifically the EAP settings. Ensure that the client is configured to use EAP-TLS and that the certificate is specified correctly.
Verify that the client has the latest version of operating system patches and drivers installed.
Network issues:
Use Wireshark or other network analysis tools to capture network traffic between the NPS server and the client and check for any anomalies or errors during the EAP-TLS handshake.
Check the configuration of network devices, such as switches and routers, to ensure that they support and are properly configured for 802.1X and EAP-TLS.
System logs and events:
Although you do not see event IDs 39, 40, and 41, check other relevant event logs on the NPS server and clients, such as security logs and system logs, for possible clues.
Check the application logs of the NPS server for more detailed information about authentication failures.
Domain controller and Kerberos configuration:
Although you have set the registry entry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Kdc to a value of 2, make sure that the Kerberos service is configured correctly.
Check the domain controller's system logs for any Kerberos-related errors or warnings.
Updates and patches:
Ensure that all servers, including NPS, ADDS, and CAs, have the latest updates and patches installed.
Testing and troubleshooting:
If possible, try to reproduce the problem in a simplified environment so that you can more easily localize the problem.
Test with different client computers and different network configurations to troubleshoot problems with specific devices or configurations.
Best regards
Neuvi