![]() ![]() In order to understand how the bug works (or does not work!) its important to have a brief understanding of how RADIUS communicates. The NPS bug only affects Windows Sever 2019 and does not affect 2016 and below, so if you are happily running 2k16 servers (or older!) then fear not, you are OK! Not directly serious because of what it does, but rather serious due to lazy administrators not putting appropriate measures in place to circumvent it – keep reading! It seems the built-in Windows Server feature Network Policy Server (NPS) has a pretty serious known bug in it. right? Well, then this wouldn’t be a good read would it □ Recently I was tasked with setting up an Active Directory environment as the Radius authentication backend for a VPN solution, allowing users in the correct AD group to access the VPN using their AD credentials. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |