Consider the following scenario:
In this scenario, the user might be locked out from the Active Directory domain controller before he or she is locked out on the NPS server. However, expected behavior is that the NPS server locks the user for a specific time after the number of tries that are set in the MaxDenials entry to prevent the user account lockout.
- You configure a Windows Server 2008 R2-based computer that is running Network Policy Server (NPS) as the Remote Authentication Dial-In User Service (RADIUS) server to perform authentication for RADIUS clients.
- You enable remote access account lockout and set the MaxDenials entry to 3.
- You set the Active Directory account lockout policy for wrong passwords to 4.
- The password of a user expires, and the user changes the password on their desktop computer.
- Devices such as mobile phones or tablets try to authenticate with the server repeatedly by using the old password quickly.
- There are small communication latencies between the computer that is running NPS and the Active Directory domain controller.
In this scenario, the user might be locked out from the Active Directory domain controller before he or she is locked out on the NPS server. However, expected behavior is that the NPS server locks the user for a specific time after the number of tries that are set in the MaxDenials entry to prevent the user account lockout.