You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
your proposal under "Control RADIUS clients that require MFA" to spin up a second NPS does not scale up. Imagine big companies with multiple sites and VPN gateways (as ours).
I have worked with SMSPasscode in the past and know that it is also developed as an NPS extension but is capable of excluding NPS policies from its scope.
Please consult the developers of your extension. I'm sure that they have an undocumented registry key for that.
Thank you in advance!
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
ID: a61a7e9a-44bf-7bdc-f810-87e2fd6792e1
Version Independent ID: 71d11105-b83e-952e-d107-1ff9a7c8d107
"At this time, we do not have any regkey with this functionality. We do have a regkey where if the user isn't proofed up for Azure MFA, it will bypass MFA and allow the user to login, but if the user is registered for MFA, it will call them. If they have an application they don't want to have MFA on it, or it's not supported, they'll need to point traffic to an NPS Server that doesn't have the Extension. NPS Extension is basically an on & off switched when installed.
Dear Microsoft colleagues,
your proposal under "Control RADIUS clients that require MFA" to spin up a second NPS does not scale up. Imagine big companies with multiple sites and VPN gateways (as ours).
I have worked with SMSPasscode in the past and know that it is also developed as an NPS extension but is capable of excluding NPS policies from its scope.
Please consult the developers of your extension. I'm sure that they have an undocumented registry key for that.
Thank you in advance!
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
The text was updated successfully, but these errors were encountered: