Always On VPN Authentication Failure with Azure Conditional Access

Always On VPN Clients Prompted for Authentication when Accessing Internal Resources

Integrating Microsoft Azure Conditional Access with Windows 10 Always On VPN has several important benefits. The most important is that it allows administrators to improve their security posture by enforcing access polices that can be dynamically applied. For example, requiring multifactor authentication (MFA) for privileged users (e.g., administrators) or sign-ins that appear to be risky, the type of device they are connecting with, the health of the endpoint, and much more.

Authentication Failure

When configuring Always On VPN to support Azure Conditional Access, administrators may expeirence a failed authentication during preliminary testing. Specifically, an event ID 20227 from the RasClient source may be encountered with the following error message.

“The user <username> dialed a connection named <connection name> which has failed. The error code returned on failure is 812.”

Looking at the event logs on the Network Policy Server (NPS) server reveals an event ID 6273 from the Microsoft Windows security auditing source with Reason Code 258 and the following Reason.

“The revocation function was unable to check revocation for the certificate.”

Root Cause

When Azure Conditional Access is configured for Always On VPN, a short-lived certificate (1 hour lifetime) is provisioned by Azure. This certificate does not include revocation information because, by design, a short-lived certificate does not need to be revoked. However, by default NPS always checks revocation when client authentication certificates are used for authentication. Since the certificate does not include this information, certificate revocation fails.


The way to resolve this issue is to disable certificate revocation checking for Protected Extensible Authentication Protocol (PEAP) authentication requests. To do this, open an elevated PowerShell window on the NPS server and run the following command.

New-ItemProperty -Path ‘HKLM:\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\13\’ -Name IgnoreNoRevocationCheck -PropertyType DWORD -Value 1 -Force

Once complete, restart the NPS server for the changes to take effect.

Additional Information

Windows 10 Always On VPN Network Policy Server (NPS) Load Balancing

Windows 10 Always On VPN Network Policy Server (NPS) Server 2019 Bug

Leave a comment


  1. Ed Morgan

     /  August 31, 2021

    Hi Richard, isn’t disabling revocation checks a bit of a security breach? If we’re using device tunnels and want to revoke the device certificate, how would we do that?

    • Normally, yes! However, in this specific instance, it is recommended (and in fact required) because the certificate is only valid for one hour. We have to disable it because the certificate is issued without any revocation URL, which would cause the NPS authentication process to fail.

      To be clear, disabling revocation checking should only be done in this specific scenario where short-lived certificates are issued by Azure Conditional Access. Otherwise, certificate revocation should absolutely not be disabled.

  2. Hi Richard, thanks for your blog! I have as reason code 300.
    -> “No credentials are available in the security package”
    Is this a user cert issue?

    • Quite possibly. Make sure the certificate is installed on the NPS server correctly and that it has a private key. Make sure it is valid (not expired) and not revoked. Also, ensure the subject name on the certificate matches the hostname of the server.


Leave a Reply

%d bloggers like this: