Hi Everyone

We recently rolled out a new password policy which includes an account lockout after a number of failed authentications. We are experiencing a fair amount of lockouts after users change their password, but fail to update their wireless devices with the new credentials. The devices have the "old" password cached and keep trying to connect to wireless, ultimately resulting in a locked account.

We use Cisco ACS 5.5 for RADIUS against MS AD 2008R2 (PEAP w/ MS-CHAPv2). Server 2003 SP1+ has a feature called "Password history check (N-2)" that isn't supposed to increment the badPwdCount "if the password is the same as one of the last two entries that are in the password history".

(https://technet.microsoft.com/en-us/library/cc780271%28v=ws.10%29.aspx?f=255&MSPPError=-2147217396)

This works as-expected with authentications from Windows and Mac domain-joined desktops (logins, connecting to shared drives, etc.), but does NOT work with authentications coming from RADIUS.

Unfortunately there is precious little info available from MS regarding the feature (requirements and/or configuration) and cases opened with both MS and Cisco have not provided any additional information.

I'm wondering if anyone here has gotten this to work with RADIUS, Cisco ACS or otherwise, so we know if we should continue to pursue this or not?

Thanks in advance,


--
Jesse Thomas
Network & Systems Administrator
Hamilton College
315-859-4211

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to