π ~1 min read
Table of contents
Symptom & Impact
VPN users fail MFA challenge and cannot authenticate through NPS RADIUS, causing remote access outages.
Environment & Reproduction
Often introduced after certificate expiry, outbound proxy changes, or MFA extension configuration drift.
Get-Service IAS
Get-WinEvent -LogName Security -MaxEvents 50 | Where-Object {$_.Message -match 'NPS|RADIUS'}
Get-WinEvent -LogName Application -MaxEvents 50 | Where-Object {$_.Message -match 'MFA|NPS Extension'}
Root Cause Analysis
MFA extension cannot complete token validation due to cert issues, cloud endpoint reachability failures, or tenant/app registration mismatch.
Quick Triage
Check NPS service, cert validity, and outbound TLS connectivity to identity endpoints.
Get-ChildItem Cert:/LocalMachine/My | Select Subject,Thumbprint,NotAfter
Test-NetConnection -ComputerName login.microsoftonline.com -Port 443
Restart-Service IAS
Step-by-Step Diagnosis
Inspect extension logs, registry config, and RADIUS policies to isolate whether failure is pre-auth or challenge phase.
Get-ItemProperty 'HKLM:/SOFTWARE/Microsoft/AzureMfa' -ErrorAction SilentlyContinue
Get-WinEvent -LogName 'Microsoft-AzureMfa/AuthZ/AuthZAdminCh' -MaxEvents 50 -ErrorAction SilentlyContinue
netsh nps show config

Solution β Primary Fix
Repair extension registration/certificate and restart IAS after validating outbound identity service access.
Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.
Restart-Service IAS -Force
# Re-run extension setup script with current tenant values if needed
# Verify cert mapping and app registration
Get-Service IAS

Solution β Alternative Approaches
Temporarily bypass MFA for emergency admin groups via constrained NPS policy while root cause is remediated.
netsh nps show np
# Update policy order in NPS console with strict scope and short TTL
Verification & Acceptance Criteria
Test user receives and completes MFA challenge successfully and NPS logs return Access-Accept for expected conditions.
Get-WinEvent -LogName Security -MaxEvents 40 | Where-Object {$_.Message -match 'Network Policy Server granted access'}
Get-Service IAS
Rollback Plan
If updated extension config breaks auth further, restore previous extension config backup and restart NPS.
reg import C:/Temp/nps-mfa-backup.reg
Restart-Service IAS
Prevention & Hardening
Monitor cert expiry and outbound connectivity dependencies, and routinely test MFA transaction paths from each VPN profile.
Get-ChildItem Cert:/LocalMachine/My | Where-Object {$_.NotAfter -lt (Get-Date).AddDays(45)}
Test-NetConnection -ComputerName graph.microsoft.com -Port 443
Related Errors & Cross-Refs
Related to RADIUS timeout, NPS policy mismatch, and extension registration drift after tenant or cert lifecycle changes.
View all Windows Server 2022 tutorials on the Tutorials Hub β
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
Microsoft NPS extension for MFA deployment docs and RADIUS policy troubleshooting guidance for Windows Server 2022.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β we respond within one business day.