May 2022 KB5013943: Certificate Mapping Breaks NPS and RADIUS on DCs

  • Thread Author
Microsoft’s May 2022 cumulative update KB5013943 introduced a certificate-mapping change that briefly broke certificate-based authentication on domain controllers, disrupting Network Policy Server (NPS), RADIUS, RRAS, EAP/PEAP flows and leaving administrators scrambling for workarounds until Microsoft shipped out-of-band fixes days later.

Neon isometric diagram of a Windows server with NPS, RADIUS, EAP/PEAP and ObjectSID.Background​

The May 10, 2022 Patch Tuesday roll included a set of cumulative updates intended to address a variety of stability and security issues across Windows client and server platforms. Shortly after release, Microsoft updated its release notes to warn that the update family (identified by KB5013943 on Windows 11 and companion KBs for Windows 10/Server builds) contained a change to how domain controllers map TLS/client certificates to machine accounts. The change could cause authentication failures for services that rely on certificate-based authentication, most visibly NPS and RADIUS systems used for 802.1X Wi‑Fi and VPN authentication. That advisory emphasized a critical boundary: the problem was observed when the May 10 updates were installed on servers acting as domain controllers. Client endpoints and non-domain-controller servers were not expected to be directly impacted by the certificate-mapping regression. Microsoft’s guidance at the time singled out manual certificate-to-machine mapping as the preferred mitigation and pointed administrators to a separate, more detailed guidance article about certificate-based authentication changes on domain controllers.

What went wrong: certificate mapping and the security hardening change​

How Windows maps certificates to accounts​

Historically, Windows supported multiple methods for mapping a client’s certificate to a Windows account. These included:
  • Subject/Issuer or Issuer-based mappings (weak)
  • UPN mapping (weak)
  • S4U2Self and explicit S4U2Self mappings (strong)
  • Newer ObjectSID / SID extension-based mappings introduced as part of hardening efforts
Weak mappings have been convenient because they permitted legacy certificate deployments to work without re-issuing certificates. Strong mappings — particularly S4U2Self and ObjectSID/SID-extension mappings — are cryptographically stronger and unambiguous, and therefore preferred from a security standpoint.

The May 10 change and why it mattered​

The May 2022 updates introduced protections that began enforcing stricter certificate-to-account mapping checks on domain controllers. That change was intended to close gaps that could allow impersonation when weak mappings were used. However, the enforcement surfaced edge cases where an existing certificate could no longer be mapped to a machine account in the same way, and authentication attempts failed at the KDC (Key Distribution Center) or in services that forward client certificates to DCs for verification. The error surface included authentication failures for NPS, RRAS, RADIUS, EAP and PEAP-based workflows. Microsoft’s follow-up guidance made it clear this was not a simple client-side problem — the domain controller’s mapping logic had changed, and that change was the root cause, not the services consuming authentication. While the hardening was justified from a security posture perspective, the abrupt behavioral change broke real-world deployments that relied on legacy mapping approaches.

Platforms and scope of the issue​

Microsoft listed a broad set of affected platform versions in its advisories. The symptom — authentication failures — was specifically tied to the installation of the May 10, 2022 updates on domain controllers for:
  • Windows Server platforms from Server 2008 R2 SP1 through Windows Server 2022, including in-place branch and LTSC variants.
  • Client OS families (Windows 11 21H2 and many Windows 10 branches) were included in the release notes for the update family, but the actual authentication failures were limited to domain controllers (i.e., servers acting as KDCs/account authorities) when those servers had the May updates applied.
Real-world reports from multiple IT and vendor communities documented a range of symptoms: broken 802.1X Wi‑Fi connections, RADIUS authentication errors, and NPS rejections that stopped devices from onboarding until administrators either removed the update or applied the recommended mitigations. These reports underscore that the issue was operationally significant for enterprises relying on certificate-based network authentication.

Microsoft’s response and the out-of-band fixes​

Microsoft moved quickly after the issue was identified. The company released out-of-band updates on May 19, 2022 targeted at domain controllers and intermediary servers that pass authentication certificates (for example, NPS, RADIUS proxies, and web servers that forward client certificates to authenticating DCs). These updates were intended to restore expected authentication behavior while preserving the longer-term security hardening roadmap. Microsoft advised administrators that if they had applied temporary mitigations (such as registry rollbacks), those changes should be removed once the out-of-band updates were applied. Community feedback indicated mixed results during the remediation window: some administrators reported immediate restoration of service after applying the fixes, while others encountered residual issues — particularly in environments with heterogeneous CA infrastructures or intermediary appliances that did not pass the certificate metadata expected by the hardened mapping logic. Those environments required additional troubleshooting or temporary rollback of registry-based mitigations while working with certificate authorities or vendors to implement more compatible certificate mappings.

Deep dive: registry keys, modes, and the path to full enforcement​

Microsoft’s broader certificate-mapping changes are documented in KB5014754, which outlines the new behavior, available registry keys, and a multi-stage timeline for moving from Compatibility mode to Full Enforcement.

The three enforcement modes​

  • Compatibility mode (default immediately after the May 10, 2022 updates): Allows weak mappings for now while logging warnings. Administrators are encouraged to use this period to identify certificates that would fail strong mapping.
  • Full Enforcement (planned in stages): At Full Enforcement, KDCs deny authentication attempts that can’t be strongly mapped. Microsoft set a schedule that would eventually switch systems to Full Enforcement unless administrators explicitly adjusted registry settings.
  • Disabled mode (temporary legacy escape hatch): Microsoft warns this lowers security and planned to remove the Disabled mode option during subsequent updates.

Key registry toggles (what admins need to know)​

  • StrongCertificateBindingEnforcement (KDC) — HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Kdc
  • Value 0 = disable checks (not recommended)
  • Value 1 = Compatibility mode (checks + allow fallback under conditions)
  • Value 2 = Enforcement (deny when strong mapping cannot be established)
  • CertificateMappingMethods (Schannel) — HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\Schannel
  • Bitmask that controls which mapping methods Schannel will try: the older default (0x1F) allowed weak mappings; the hardened default reduces that to favor strong mappings (0x18). Temporarily restoring 0x1F can get legacy Schannel-based services working, but it re-enables weaker, less-secure mappings.
  • CertificateBackdatingCompensation (KDC) — Allows compensation for certificates that appear older than the corresponding AD account (e.g., when certificates predate user/machine account creation). This is explicitly a security-reducing workaround and should be used with caution.
These registry-based mitigations are workarounds, not long-term solutions. Microsoft’s documentation explicitly warns against permanent reliance on these settings because they reduce the hardening improvements that the security updates were designed to deliver. Administrators should use them only as a stopgap while migrating to strong mappings or reissuing certificates that support the newer mapping mechanisms (for example, using the SID-extension/objectSID mapping supported by updated CA templates).

Operational impact: symptoms, event logs and troubleshooting signs​

When certificate mapping fails, symptoms appear in several places:
  • NPS and RADIUS logs: Repeated authentication rejections (e.g., EAP/PEAP failures) where the client certificate is not successfully bound to a domain account.
  • Windows Event Logs on DCs: Specific events related to KDC failures and mapping issues will be logged; Microsoft added new audit events to help identify certificates that are incompatible with Full Enforcement.
  • Network-wide impact: In enterprises using centralized 802.1X authentication for Wi‑Fi or wired 802.1X port access, a broken certificate map can prevent large numbers of endpoints from joining the network, creating immediate business disruption.
Administrators reported that rolling back the May 10 updates on affected domain controllers often restored connectivity, but that approach increases exposure to the original issues the update sought to fix. Applying the out-of-band May 19 updates on both domain controllers and intermediary authentication servers was the recommended fix; where that was not immediately possible, targeted mapping remediation (manual mapping in AD) or temporary registry adjustments were used.

Practical remediation checklist (step-by-step)​

  • Inventory and isolate: Identify which servers act as domain controllers and which servers serve as NPS/RADIUS, CA, or web front-ends that forward client certificates. Prioritize systems that process certificate authentication.
  • Check update status: Determine whether the May 10, 2022 cumulative updates were applied and whether the May 19, 2022 out-of-band fixes have been installed on your domain controllers and intermediary servers. If the out-of-band fixes are missing, obtain the standalone package from the Microsoft Update Catalog and schedule the patching.
  • Review event logs: On affected DCs, review System and Security logs for the new auditing events introduced by the May updates. These messages help identify certificates that will fail under Full Enforcement.
  • Preferred mitigation — manual mapping: If you cannot immediately patch, perform manual certificate-to-machine account mappings in Active Directory for impacted machines/services. This is the less invasive fallback that preserves the security posture more than changing global Schannel settings.
  • Temporary registry options (last resort): Only if manual mapping is infeasible, consider temporarily setting Schannel’s CertificateMappingMethods back to 0x1F or using CertificateBackdatingCompensation. Document and schedule removal of these changes after deploying the official fix. Microsoft explicitly warns these settings reduce security and should be temporary.
  • Test and monitor: After remediation, validate authentication flows from representative client types (laptops, iPads, phones) and monitor logs for residual warnings or denials. If issues persist in mixed-CA environments, coordinate with the CA vendor or re-issue certificates with appropriate extensions (e.g., SID extension) as required.

Strategic implications and longer-term planning​

This incident highlights several broader points every Windows administrator should consider:
  • Security hardening sometimes breaks legacy assumptions. The move toward stronger certificate bindings is technically justifiable; it reduces attack surface for certificate-based impersonation. But it requires coordinated CA, certificate template, and client lifecycle planning.
  • Testing updates on domain controllers is essential. Domain controllers play a critical, high-risk role. Enterprises should stage updates in a lab or pilot ring before wide deployment — especially for updates that change authentication behavior.
  • Avoid permanent rollback workarounds. Tracing and reverting registry-based security mitigations should be a strictly temporary measure. Each rollback degrades security posture and creates technical debt that will be harder to resolve later.
  • Plan certificate lifecycle and CA compatibility. The path to Full Enforcement will involve ensuring certificates support strong mapping mechanisms (for example, SID extension / ObjectSID). Organizations that operate non‑Microsoft CA solutions may have to work with vendors to enable the necessary extensions or reconfigure certificate templates. Microsoft’s guidance explicitly notes that some non‑Microsoft CA deployments will need vendor coordination.
Microsoft documented a timeline for enforcement: after installation of the May 10, 2022 updates, devices initially enter Compatibility mode. Microsoft planned phased enforcement, including automatic movement to Full Enforcement when later security updates are installed (with dates and details provided in KB5014754). Administrators should treat those timelines as planning deadlines for moving their environments to strong mappings.

What went well and what went poorly — a critical assessment​

Strengths​

  • Microsoft detected and documented the issue quickly. The company rapidly published advisory notes, detailed mitigation guidance, and a specific KB (KB5014754) to explain the hardening. The decision to ship targeted out-of-band updates within nine days shows critical incident responsiveness.
  • The hardening improves long-term security. Moving away from weak mapping methods reduces risk of certificate misuse and aligns Windows authentication with stronger cryptographic bindings.
  • Documentation provided actionable mitigations. Microsoft enumerated registry keys, described their effects, and recommended a preferred mitigation (manual certificate mapping) that avoids security rollback when possible.

Weaknesses and risks​

  • Insufficient rollout safeguards for DC-impacting changes. A security hardening that changes KDC behavior arguably merited more conservative rollout controls, clearer pre-release warnings to enterprises, or an update mechanism that delayed enforcement until after broader CA and ecosystem compatibility checks. The result was tangible operational pain for many organizations.
  • Operational complexity in mixed environments. Organizations using non‑Microsoft CAs, third‑party network appliances, or BYOD clients faced complex compatibility issues. Some reported that even the out-of-band fixes did not immediately restore connectivity without additional vendor coordination.
  • Potential for administrators to weaken security. Registry workarounds such as resetting Schannel to previous defaults or enabling backdating compensation are effective but reduce protection. There is a real risk organizations will leave those mitigations in place, sacrificing long-term security for short-term convenience.

Recommendations for Windows administrators​

  • Treat domain controllers as high-risk update targets. Always test cumulative updates that could affect authentication in a lab or pilot cohort before broad deployment.
  • Apply the May 19, 2022 out-of-band updates to all domain controllers and intermediary authentication servers as soon as possible — this was Microsoft’s remediation and should be prioritized where not yet applied.
  • Use manual AD certificate mapping where practical as the preferred near-term mitigation rather than regressing global Schannel behavior.
  • If temporary registry changes are used, document and schedule their removal. Track them in change control and set reminders to revert once the official fixes are deployed.
  • Audit certificates and CA templates. Identify certificates that rely on weak mappings; plan certificate re-issuance or CA template updates to include strong mapping extensions where possible.
  • Engage vendors early. If you operate third-party RADIUS appliances, network controllers, or non-Microsoft CAs, coordinate with vendors for any required firmware/configuration changes.

Closing analysis​

The KB5013943 incident was a textbook example of the tension between security hardening and operational compatibility. Microsoft’s intentions — to strengthen certificate-to-account mapping and reduce weak-binding vulnerabilities — were technically defensible. However, the real-world impacts on certificate-reliant authentication services exposed a gap in the update rollout and ecosystem preparedness. The rapid issuance of out-of-band fixes helped, but not all environments were fully compatible afterwards; some required manual mapping or vendor coordination.
The incident should be a wake-up call for administrators: authentication changes are high-stakes. Domain controllers deserve staged testing, coordinated certificate lifecycle planning, and proactive vendor engagement. As Microsoft’s long-term enforcement timeline progresses, organizations that have deferred migration to strong certificate mappings must make that work a priority — otherwise future security updates will enforce behavior that could produce similar outages unless corrective action has already been taken.
Appendix — Quick reference (actionable items)
  • Inventory DCs and NPS/RADIUS servers.
  • Confirm whether May 10, 2022 updates were applied; if so, ensure May 19, 2022 out-of-band fixes are also applied to DCs and any intermediary authentication servers.
  • If immediate patching is impossible, perform manual certificate-to-machine mapping in AD as the preferred temporary mitigation.
  • Only use Schannel or KDC registry workarounds as last-resort stopgaps; plan to remove them after patching.
  • Audit event logs to find certificates that will fail under Full Enforcement and plan certificate re-issuance or CA/template updates accordingly.
The lessons from KB5013943 are straightforward: stronger authentication is the right goal, but operational success requires careful staging, clear communication, and coordination across certificate authorities, device vendors, and enterprise IT teams.

Source: BetaNews Microsoft warns that KB5013943 update is causing authentication failures in Windows 11, Windows Server and more
 

Back
Top