How Can I Prevent AD Account Lockouts from Failed WiFi Logins?

0
15
Asked By CuriousCat42 On

I'm a network engineer dealing with a frustrating problem. Our users are seeing their Active Directory accounts getting locked out when they try to connect to WiFi using RADIUS authentication. This seems to happen mostly to users who haven't been in the office for a while, leading me to believe it might be due to cached passwords. Despite having tried to replicate the issue myself, I haven't succeeded. Currently, we're using user credentials for RADIUS authentication and haven't implemented machine certificates yet. How can I stop these failed WiFi login attempts from causing account lockouts?

5 Answers

Answered By TechieTommy On

I've noticed similar issues when users have their cell phones connected. Typically, if they had logged into the WiFi before, their devices save the password. Deleting the saved network from those devices often resolves the lockout problem. Be sure to check on that!

GadgetsGuru33 -

Yeah, we've seen this quite a bit with iPhones since they save passwords in the keychain. It's a common culprit!

HelpdeskHero98 -

That's accurate. I’d recommend disabling MSCHAP and PEAP for now and switching to certificates when you can. It avoids the hassle of failed authentications altogether.

Answered By WiFiWhiz On

We've encouraged users to log in at the office at least once a week to help mitigate this issue. Even biweekly might be enough to keep credentials fresh and avoid problems.

Answered By NetworkingNerd On

While you can set up an external identity provider to prevent AD from noting authentication attempts, that's probably not the best route. Try adjusting your Wi-Fi Group Policy to limit the number of authentication attempts to two, and set your password lockout policy to triple that. It minimizes issues with RADIUS. Seriously consider moving to user and machine certificates instead; relying on passwords can lead to a lot of headaches.

Answered By LoggerRick On

Make sure to check the logs; they can offer good insights into what's going on. Moreover, if you're using internal WiFi, consider shifting to machine certificates. It helps prevent machine attempts from locking out user accounts.

Answered By AdminAndy On

It's usually an old password being stored on some other device like a phone or tablet. We don’t even look into it anymore; we just tell users to remove WiFi from all their portable devices and unlock their account, which works every time. Those devices often use randomized MACs, so tracking them down is pointless.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.