Skip to content

Commit 181328f

Browse files
authored
Merge pull request #57935 from MicrosoftGuyJFlo/NPSExtenstionLogs
[Azure AD] Authentication - NPS Extension Logs Location
2 parents c2ab9e4 + 0ac5d32 commit 181328f

File tree

1 file changed

+3
-10
lines changed

1 file changed

+3
-10
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,17 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.component: authentication
88
ms.topic: conceptual
9-
ms.date: 07/11/2018
9+
ms.date: 11/13/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: mtillman
1414
ms.reviewer: michmcla
1515

1616
---
17-
1817
# Resolve error messages from the NPS extension for Azure Multi-Factor Authentication
1918

20-
If you encounter errors with the NPS extension for Azure Multi-Factor Authentication, use this article to reach a resolution faster.
19+
If you encounter errors with the NPS extension for Azure Multi-Factor Authentication, use this article to reach a resolution faster. NPS extension logs are found in Event Viewer under **Custom Views** > **Server Roles** > **Network Policy and Access Services** on the server where the NPS Extension is installed.
2120

2221
## Troubleshooting steps for common errors
2322

@@ -34,9 +33,6 @@ If you encounter errors with the NPS extension for Azure Multi-Factor Authentica
3433
| **REQUEST_MISSING_CODE** | Make sure that the password encryption protocol between the NPS and NAS servers supports the secondary authentication method that you're using. **PAP** supports all the authentication methods of Azure MFA in the cloud: phone call, one-way text message, mobile app notification, and mobile app verification code. **CHAPV2** and **EAP** support phone call and mobile app notification. |
3534
| **USERNAME_CANONICALIZATION_ERROR** | Verify that the user is present in your on-premises Active Directory instance, and that the NPS Service has permissions to access the directory. If you are using cross-forest trusts, [contact support](#contact-microsoft-support) for further help. |
3635

37-
38-
39-
4036
### Alternate login ID errors
4137

4238
| Error code | Error message | Troubleshooting steps |
@@ -45,7 +41,6 @@ If you encounter errors with the NPS extension for Azure Multi-Factor Authentica
4541
| **ALTERNATE_LOGIN_ID_ERROR** | Error: Alternate LoginId lookup failed | Verify that LDAP_ALTERNATE_LOGINID_ATTRIBUTE is set to a [valid active directory attribute](https://msdn.microsoft.com/library/ms675090(v=vs.85).aspx). <br><br> If LDAP_FORCE_GLOBAL_CATALOG is set to True, or LDAP_LOOKUP_FORESTS is configured with a non-empty value, verify that you have configured a Global Catalog and that the AlternateLoginId attribute is added to it. <br><br> If LDAP_LOOKUP_FORESTS is configured with a non-empty value, verify that the value is correct. If there is more than one forest name, the names must be separated with semi-colons, not spaces. <br><br> If these steps don't fix the problem, [contact support](#contact-microsoft-support) for more help. |
4642
| **ALTERNATE_LOGIN_ID_ERROR** | Error: Alternate LoginId value is empty | Verify that the AlternateLoginId attribute is configured for the user. |
4743

48-
4944
## Errors your users may encounter
5045

5146
| Error code | Error message | Troubleshooting steps |
@@ -95,7 +90,7 @@ If you encounter one of these errors, we recommend that you [contact support](#c
9590

9691
### Troubleshoot user accounts
9792

98-
If your users are [Having trouble with two-step verification](../user-help/multi-factor-authentication-end-user-troubleshoot.md), help them self-diagnose problems.
93+
If your users are [Having trouble with two-step verification](../user-help/multi-factor-authentication-end-user-troubleshoot.md), help them self-diagnose problems.
9994

10095
### Contact Microsoft support
10196

@@ -129,5 +124,3 @@ To collect debug logs for support diagnostics, use the following steps on the NP
129124

130125
5. Open Registry Editor and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa set **VERBOSE_LOG** to **FALSE**
131126
6. Zip the contents of the C:\NPS folder and attach the zipped file to the support case.
132-
133-

0 commit comments

Comments
 (0)