Replies: 13 comments
-
Hi,
But certificates are still rejected from domain controller: event viewer error 39. |
Beta Was this translation helpful? Give feedback.
-
I have the same problem, same topology, did you find the error? |
Beta Was this translation helpful? Give feedback.
-
Unfortunately not, I learned that 1.3.6.1.4.1.311.25.2 is not an OtherName subtype - it is an extension type, and XCA doesn't support defining custom extensions. It appears that XCA can no longer be used in the windows server environments, a pity because it is a very useful tool. |
Beta Was this translation helpful? Give feedback.
-
I don't think so.
You could create an empty template and insert the line there and apply it for each certificate Or you could use line 22 - 38 from https://bgstack15.ddns.net/blog/posts/2024/07/24/openssl-generate-csr-with-ntds-ca-security-extension/ in the "Edit" area of the "Advanced" tab, which is much more readable, especially when the sid must be modified:
|
Beta Was this translation helpful? Give feedback.
-
Hi, I have created new user cert, with:
The result is that the new cert have 1.3.6.1.4.1.311.25.2.2 field, and during connection I have no more Kerberos-Key-Distribution-Center error 39. |
Beta Was this translation helpful? Give feedback.
-
How can I make this generate via a template in the CA? I can't find where to add the field 1.3.6.1.4.1.311.25.2 (szOID_NTDS_CA_SECURITY_EXT). Do I need to apply an update to the server? |
Beta Was this translation helpful? Give feedback.
-
During a certificate creation when you fill everything, go to Advanced tab and hit at the bottom "Edit" and then paste this text from @chriss2511 post, just update with correct SID and DNS or UPN. |
Beta Was this translation helpful? Give feedback.
-
The "otherName" syntax is:
As long as there is only one URI, the |
Beta Was this translation helpful? Give feedback.
-
I understand, this might work for manual certificate requests against a template, but I have a deployment of 15,000 certificates automatically deployed by AD + CA |
Beta Was this translation helpful? Give feedback.
-
Now my certificate extension looks like"
Still no success, WiFi clients cannot connect, I have the same NPS error 6273 Reason code 16. |
Beta Was this translation helpful? Give feedback.
-
In my case, I applied this to users who were getting error code 16, using PowerShell in Active Directory: powershell |
Beta Was this translation helpful? Give feedback.
-
My UPN is correct, this is the output from the user cmd:
|
Beta Was this translation helpful? Give feedback.
-
Finally I found a solution and my wifi based on certificates are working again, this solution is for people who have only a small number of certificates, because they rely on manual mappings.
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I have such problem, I have NPS on windows 2022, It supports wifi connections in eap-tls wpa2-enerprise mode based on the certificates of a domain user these certs are created in XCA. The user has a cert set up as SAN=UPN with an RSA 2048 key generated and everything worked for me until last week. And now I'm getting an Event 6273 error Reason Code: 16 Reason: Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing user account or the password was incorrect.
On the event viewer I see in the system error ID 39 Kerberos-Key-Distribution-Center it says that certification is valid but cannot be mapped to user SID.
Do you know that error, how to fix this?
Thanks
Beta Was this translation helpful? Give feedback.
All reactions