Can anyone give me a hint?
HELP ME PLEASE, I CAN'T FIND ANY INFORMATION ABOUT THIS MATTER!
Sounds like you're headed in the right direction, but the 798 is a sure
giveaway that the cert is not there or it's the wrong kind. EAP certs need a
"Client Authentication" usage on the client and a "Server Authentication"
usage on the IAS server. Oh, and since IAS is a service, it gets the
certificate from the MACHINE store, too.
RemoteAccess must be restarted on the server after adding certificates for
L2TP because it sets the IPSec policies at startup.
--
Carl DaVault (MS)
This posting is provided "AS IS" with no warranties, and confers no rights.
"Ghenov Sergiu" <Serg...@xnet.ro> wrote in message
news:#ReXibQzCHA.1876@TK2MSFTNGP11...
But, still, the certificate is a computer one, because if I configure a MMC
with certificates selected -> computer certificates -> local machine, I cand
view that certificate there.
Do you have another hint?
Help is really needed and appreciated!
Sergiu.
MCP, MCSA.
"Carl DaVault [MS]" <car...@spambegone.microsoft.com> wrote in message
news:eV$9q1jzCHA.1736@TK2MSFTNGP10...
On the VPN client:
You need a USER cert in the USER's personal store for EAP.
You need a USER cert in the MACHINE's personal store for L2TP/IPSec. Other
kinds of certificates work well, too.
So, the fundamental confusion usually arises here between TYPES of
certificates and WHERE you store them. You can put any kind of certificate
in any kind of store. You seem to have no usable certificates in the
Personal store of the currently logged on user. This is just like the
difference between HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE.
There are lots of ways to import the cert into the user's store - one way is
to open MMC, add certificates snapin, choose to connect to the current
user's store (NOT the local machine store). Choose to import a certificate
and browse to the certificate. If you import a machine's certificate into
the user store, you will not get your desired results because the fields in
the certificate do not represent a user. Check the alt subject name on the
certificate - it should be something like myuser@mydomain and it should
match a user account.
Personally, I use either automatic certificate distribution through group
policy or web-based certificate enrollment. If you are a domain member, you
can request a certificate thru the certificate's MMC. EAP-TLS is designed to
work in a domain context, using the User Principal Name (UPN) form of the
username, so requesting a certificate through the snapin is conceivably
something that users would be allowed to do from their domain-joined
machines.
The certificate will not be found under the following additional conditions:
Certificate is invalid due to time restrictions (expired, not yet valid).
Certificate fails to have a trusted root (cert is untrusted - you need the
root certificates to validate the cert chain).
--
Carl DaVault (MS)
This posting is provided "AS IS" with no warranties, and confers no rights.
"Ghenov Sergiu" <Serg...@xnet.ro> wrote in message
news:O3Ht66nzCHA.2288@TK2MSFTNGP09...
Here's the error, and again, I ask for your kindness and your help. This
error us generated on the Remote Server, which is an ISA Server:
"The user myu...@mydomain.com connected from {IP Address} but failed an
authentication attempt due to the following reason: The user attempted to
use an unauthorized authentication method."
I can mention that in the security tab, at Routing and Remote Access
service, I enabled EAP authentication protocol, and my dial in permissions
are OK.
Could you help me once again? Thanks a lot!!!
"Carl DaVault [MS]" <car...@spambegone.microsoft.com> wrote in message
news:OnxT94ozCHA.2600@TK2MSFTNGP11...
The RAS service negotiates the PPP settings.
The IAS service verivies the PPP settings and continues along with the
authentication process.
Even if you are using Windows Authentication, IAS is still there doing the
authentication work - it just communicates directly with RRAS instead of
using the RADIUS protocol.
--
Carl DaVault (MS)
This posting is provided "AS IS" with no warranties, and confers no rights.
"Ghenov Sergiu" <Serg...@xnet.ro> wrote in message
news:#JV0xcqzCHA.1576@TK2MSFTNGP12...
Thank you again for your kindness.
PS: I read that VPN's made of L2TP cannot be used with the option "Log in
using dial up connection".
Is it true?
"Carl DaVault [MS]" <car...@spambegone.microsoft.com> wrote in message
news:uhxtcytzCHA.2648@TK2MSFTNGP11...
Using Windows Authentication, it looks like RRAS, but it's actually IAS that
needs the certificate in the machine store - there is no real "user" for the
server side so the machine store is used.
Yeah, there is common confusion about this
L2TP can deal with a "client authentication" usage. The certs go in the
machine store.
EAP clients need a "client authentication" usage. The certs go in the user's
personal store.
EAP servers need a "server authentication" usage. The certs go in the
machine store since IAS is a service and doesn't really have an associated
"user".
You can build a cert just about any way you want, but the usual way is by
using templates. Each template has different "usages" and other properties,
so the key to getting the right cert is to request it using a compatible
template then store it in the proper store.
--
Carl DaVault (MS)
This posting is provided "AS IS" with no warranties, and confers no rights.
"Ghenov Sergiu" <Serg...@xnet.ro> wrote in message
news:O$Qmfea0CHA.2904@TK2MSFTNGP09...