Configure Wired Clients to Use EAP-TLS
Applies To: Windows Server 2008, Windows Server 2008 R2
This procedure provides the steps that are required to configure a wired access connection profile for Extensible Authentication Protocol – Transport Layer Security (PEAP-TLS) for authentication by using smart cards or user and computer digital certificates.
Membership in Domain Admins, or equivalent, is the minimum requirement to complete this procedure.
For more information about individual controls on any active dialog box in Wired Network (IEEE 802.3) Policies, press F1 while viewing that dialog box.
To configure a wired connection profile for EAP-TLS
If you have not already done so, open the Windows Vista Wired Network (IEEE 802.3) Policies properties page.
In Windows Vista Wired Network (IEEE 802.3) Policies Properties, on the General tab, in Policy Name, type a name for your network policy, or leave the default name New Wired Network Policy.
In Description, type a description for your network policy.
Select Use Windows Wired Auto Config service for clients to specify that Wired AutoConfig is used to configure wired network adapter settings.
Click the Security tab, click Advanced, and then configure the following:
To configure advanced 802.1X settings, in IEEE 802.1X, select Enforce advanced 802.1X settings.
When the advanced 802.1X settings are enforced, the default values for Max Eapol-Start Msgs, Held Period, Start Period, and Auth Period are sufficient for most wired access deployments.
To enable Single Sign On, select Enable Single Sign On for this network.
The remaining default values in Single Sign On are sufficient for typical wired access deployments.
Click OK to return to the Security tab. In the Select Authentication Method list, select Smart Card or other certificate, and then click Properties. The Smart Card or other Certificate Properties dialog box opens.
In the Smart Card or other Certificate Properties dialog box, in When connecting, for smart card deployments, select Use my smart card. Otherwise, for computer and user digital certificate deployments, select Use a certificate on this computer.
Verify that Validate server certificate is selected.
In Trusted Root Certification Authorities, select the trusted root certification authority (CA) that issued the server certificate to your computer running Network Policy Server (NPS).
Select Do not prompt user to authorize new servers or trusted certification authorities.
Click OK. The Smart Card or other Certificate Properties dialog box closes, returning you to the Security tab.
Click OK to close the Security tab, and then click OK again to close the Windows VistaWired (IEEE 802.3) Network Policy.