Good day mmuser
If you’ve already double‑checked all the settings then the next place I’d dig is into the trust chain validation and the way NPS is handling machine auth specifically. Even when the cert looks perfect, NPS can still throw Reason Code 16 if it can’t validate revocation (CRL/OCSP). Try running certutil -verify on the machine cert and see if it complains about CRL distribution points or OCSP responders. That’s a sneaky one that often gets missed.
Another angle: confirm that the NPS policy condition is actually “Authentication Method = Smart Card or other certificate” and scoped to “Computer” as well as “User.” I’ve seen setups where the policy only matches user auth, so machine certs get denied even though they’re valid.
On the Aruba side, a packet capture of the RADIUS exchange can be really helpful. If the client is sending a TLS alert right away, it usually means the cert isn’t being accepted for handshake either because of EKU mismatch, trust chain, or private key access., then the next place I’d dig is into the trust chain validation and the way NPS is handling machine auth specifically. Even when the cert looks perfect, NPS can still throw Reason Code 16 if it can’t validate revocation (CRL/OCSP). Try running certutil -verify on the machine cert and see if it complains about CRL distribution points or OCSP responders. That’s a sneaky one that often gets missed.
If you’ve ruled out all of those, I’d also check Group Policy settings around “Computer Authentication” for wireless profiles. Sometimes the profile is set to use user certs only, and the machine cert never even gets presented.
So in short: verify revocation checks, confirm NPS policy scope, and make sure the wireless profile is actually configured for machine auth