<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows 11 EAP-TEAP &amp;quot;Action Needed&amp;quot; to Sign in in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5304869#M597056</link>
    <description>&lt;P&gt;We have been struggling with Windows 11 also, from my testing, it doesn't seem to trust my ISE cert, even thought the system has the root and sub certs as trusted. We have even set it in the security setting to trust the root cert where is use to by default being domain joined. Right now in testing all I have been able to do is add the ISE server name to the list of servers to connect to to loose the prompt.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jul 2025 13:28:48 GMT</pubDate>
    <dc:creator>Dustin Anderson</dc:creator>
    <dc:date>2025-07-02T13:28:48Z</dc:date>
    <item>
      <title>Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5302092#M596910</link>
      <description>&lt;DIV&gt;I know this might be a windows issue but I figured I'd ask in case anyone has had this experience.&lt;BR /&gt;&lt;BR /&gt;Main Issue:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Using EAP-TEAP GPO (Windows Server 2022) for Windows 11 devices, clients are able to use the machine cert to auth with no issues. Once the user logs into windows, the user gets a notification that "Network Action needed'. That action basically requires you to navigate to settings &amp;gt; Network &amp;amp; Internet &amp;gt; Ethernet &amp;gt; Click the Sign on button. Once you do that, windows prompt for a pin (because it's using your external smart card user cert). Once the pin is good, the device is able to do all the stuff and things and is happily connected to the network using the machine/user cert. The big deal is that action of 'action needed' and requiring users to auth to the network instead of it just prompting for a pin. This happens with both wired and wireless. Pics will be attached of the prompt and where the sign in button is located.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;However, when we did this with a windows 10 machine, the user logs into windows, and after a minute they just get a pin prompt, then they are able to connect to the network (using EAP-TEAP machine&amp;amp;user cert)&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I can't figure out how to make this stupid action prompt go away and just connect without having the user to do the whole settings, ethernet, click sign in. I just want a pin prompt and connect.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Main GPO Setting details:&lt;/DIV&gt;&lt;DIV&gt;Computer configuration &amp;gt; Policies &amp;gt; Windows Settings &amp;gt; Security Settings &amp;gt; Wired Network&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Using IEEE 802.1x auth for network access&lt;/DIV&gt;&lt;DIV&gt;Netowrk Auth Method: 'EAP TEAP'&lt;/DIV&gt;&lt;DIV&gt;Auth mode: 'User or Computer auth'&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Inner Method: Primary Auth&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; EAP-TLS (smartcard or other certificate)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Use my smart card&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;use simple cert selection&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;certificate must contain Smart Card Logon&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Validate ISE Server cert with our dc ca cert&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Inner Method: Secondary Auth&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; EAP-TLS (smartcard or other certificate)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Use a cert on this compute&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;use simple cert selection&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Cert must be issues by our dc02 cert (EKU all purpose and client auth)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Validate ISE Server cert with our dc ca cert&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Advanced Settings:&lt;/DIV&gt;&lt;DIV&gt;Enforce advanced 802.1x settings&lt;/DIV&gt;&lt;DIV&gt;transmit per IEEE 802.1x&lt;/DIV&gt;&lt;DIV&gt;Enable Single Sign On for this network&lt;/DIV&gt;&lt;DIV&gt;Perform immediately before User logon&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;***There is also a wireless GPO and pretty much is the same as wired just has the BSSID and always connect to this network&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Machine cert is issued from Active Directory We are using a physical smart card that has 4 certs, 1 is for user smart card login. does require a pin Login to windows/workstation requires to have a smart card, using that same cert i want to user for 802.1x eap-teap.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Workstation is a Windows 11 version 23H2&lt;BR /&gt;Domian is a windows server 2022, that's where the GPO was configured.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I've seen things about credential guard, making sure the CA certs are selected, I've tried with and without the trusted server FQDN (with case matching). I saw something about win10 vs 10 eap-teap profile .xml sha hash, but to me that's with trusted the radius server and that's not an issue. Everything works, cert auto select works, just i have to sign in to the network each time through that prompt and going into settings, ethernet sign in. and for some reason any command with netsh does not run. could be some policy issue but i do see our computers complete eap-teap in ISE of course after i do the whole prompt sign in process.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="popup_signin.png" style="width: 368px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/246913i6211BDAF5937BCFA/image-size/large?v=v2&amp;amp;px=999" role="button" title="popup_signin.png" alt="popup_signin.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Setting_action_signin_d.png" style="width: 883px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/246912i18C69D1F465FE02F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Setting_action_signin_d.png" alt="Setting_action_signin_d.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks for your time, I'll try to keep update things i have done as well as any possible suggestions i receive.&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 24 Jun 2025 17:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5302092#M596910</guid>
      <dc:creator>tcebak</dc:creator>
      <dc:date>2025-06-24T17:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5304866#M597055</link>
      <description>&lt;P&gt;Same problem. Have you solved this? Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 13:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5304866#M597055</guid>
      <dc:creator>Anton Abik</dc:creator>
      <dc:date>2025-07-02T13:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5304869#M597056</link>
      <description>&lt;P&gt;We have been struggling with Windows 11 also, from my testing, it doesn't seem to trust my ISE cert, even thought the system has the root and sub certs as trusted. We have even set it in the security setting to trust the root cert where is use to by default being domain joined. Right now in testing all I have been able to do is add the ISE server name to the list of servers to connect to to loose the prompt.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 13:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5304869#M597056</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2025-07-02T13:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5305059#M597067</link>
      <description>&lt;P&gt;I have seen the same behaviour. If the supplicant configuration for 'Connect to these servers...' is not defined (or is misconfigured), the Win11 supplicant will throw this error.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-07-03 at 12.26.26 pm.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/247483iFF281785A13C8BF0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-07-03 at 12.26.26 pm.png" alt="Screenshot 2025-07-03 at 12.26.26 pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 02:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5305059#M597067</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-07-03T02:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315406#M597525</link>
      <description>&lt;P&gt;Sorry for the super late reply, Somehow i used my 'other' account to open this and didn't see any notifications. However, per you comment, i did see several people have the same issue. however it has no effect for me. I've copied the server FQDN how it is exactly displayed in the certificate, which is all capital letters. I even tried it with all lower case for fun and didn't notice any difference in behavior which i though i would actually get a reject but i didn't&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 18:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315406#M597525</guid>
      <dc:creator>tcebak</dc:creator>
      <dc:date>2025-07-29T18:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315417#M597528</link>
      <description>&lt;P&gt;I know this is a bit late, but one thing i've noticed is, if the user certificate is a AD created user cert. It has zero issues.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Something about the smart card and/or needing the pin (even though it was just used to log into the machine) is causing issues. Which I'm fine with getting a pin prompt, instead of this action needed / Sign in prompt. it just seems like it's forcing the user to actually start the .1x process by doing the whole settings&amp;gt;ethernet&amp;gt;sign in method. And when i do that process, it selects the correct cert and prompts for the pin. Just can't get it to do that instead of forcing the user to start that action. (feel like i'm taking crazy pills)&lt;BR /&gt;&lt;BR /&gt;I'm starting to think it's just something that is set in stone with windows 11, since windows 10 does not have this issue.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks everyone!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 19:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315417#M597528</guid>
      <dc:creator>tcebak</dc:creator>
      <dc:date>2025-07-29T19:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315757#M597549</link>
      <description>&lt;P&gt;Based on a lot of testing there doesn't seem to be any sort of built in SSO for smartcards on Win 11, it would always require users to input their smartcard credentials even if they use it to log on to windows.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We only tested with wireless connections but there weren't as many hoops to jump through just a popup on initial logon that said additional actions are required to connect but it would immediately bring up the smartcard prompt when clicking that popup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ended up cutting user certs from our CA that issues our machine certs though since we have users that work on multiple machines. Having the network auth tied to smartcards was never going to work for us anyway. With the non smartcard user certs we have users connecting automatically without additional dialogs using TEAP with EAP chaining to do machine and user auth.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 18:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5315757#M597549</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2025-07-30T18:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5374836#M599984</link>
      <description>&lt;P&gt;I had the same issue. It was resolved by selecting all the CAs in the certificate chain of RADIUS server, including the root CA&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2026 19:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5374836#M599984</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2026-03-05T19:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5375115#M599994</link>
      <description>&lt;P&gt;I'm late to this discussion but we are also look at moving from PEAP to EAP-TEAP as we move from Win 10 to Win 11.&amp;nbsp; I had to play around with the order of the primary EAP and secondary EAP to get the results we were looking for in the radius live logs.&amp;nbsp; Have to tried switch the order of the primary EAP and secondary EAP methods to see if that has an effect on the network login prompt.&amp;nbsp; Switch the order of the primary and secondary EAP authentication methods and making sure we had the Root CA plus the Root certificate of the CA that signed our ISE EAP certificate made the network login prompt go away.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2026 21:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5375115#M599994</guid>
      <dc:creator>Louis Gonzales</dc:creator>
      <dc:date>2026-03-06T21:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 11 EAP-TEAP "Action Needed" to Sign in</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5542025#M600143</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Not sure if we can bring this thread back to life but I made some interesting findings, perhaps obvious to someone but I think it might still be worth sharing.&lt;BR /&gt;&lt;BR /&gt;We have been doing IBNS2.0 sequential dot1x in closed mode. I.e. we do not perform MAB and dot1x at the same time. From time to time I've seen issues with the Action Required but not some frequent.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This week however I've been working on a concurrent closed mode design where we do MAB and dot1x at the same time. During testing I set the periodic reauth on the switch to a rather extreme 30 seconds (normally we do 1h reauth sent down from the ISE). Testing with a windows device running TEAP I noticed that during each reauth I got the action required notification.&amp;nbsp;&lt;BR /&gt;However if I made sure to setup a class for MAB_FAILED and used that with the authentication-failure event that terminates MAB and continue with dot1x instead I stopped getting the action required.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I did a capture and it seems that if I didn't terminate MAB the switch would send a&amp;nbsp; EAPOL failure to the client and that seems to be the trigger for windows.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here is a snippet from my policy-maps, one with a dedicated handler for MAB failed and one that is more generic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;With handling for MAB aka class MAB_FAILED:&lt;/P&gt;
&lt;PRE&gt;&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;10 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;20 class ISEDOWN do-until-failure&lt;BR /&gt;10 clear-authenticated-data-hosts-on-port&lt;BR /&gt;20 activate service-template ISEDOWN_ACCESS&lt;BR /&gt;30 activate service-template ISEDOWN_VOICE&lt;BR /&gt;40 authorize&lt;BR /&gt;50 pause reauthentication&lt;BR /&gt;30 class AAA_DOWN_AUTH_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;40 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;50 class DOT1X_TIMEOUT do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;55 class MAB_FAILED do-until-failure&lt;BR /&gt;10 terminate mab&lt;BR /&gt;20 authenticate using dot1x priority 10&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;Without handling for MAB:&lt;/P&gt;
&lt;PRE&gt;&amp;nbsp;&lt;BR /&gt;event authentication-failure match-first&lt;BR /&gt;10 class DOT1X_FAILED do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;20 class ISEDOWN do-until-failure&lt;BR /&gt;10 clear-authenticated-data-hosts-on-port&lt;BR /&gt;20 activate service-template ISEDOWN_ACCESS&lt;BR /&gt;30 activate service-template ISEDOWN_VOICE&lt;BR /&gt;40 authorize&lt;BR /&gt;50 pause reauthentication&lt;BR /&gt;30 class AAA_DOWN_AUTH_HOST do-until-failure&lt;BR /&gt;10 pause reauthentication&lt;BR /&gt;20 authorize&lt;BR /&gt;40 class DOT1X_NO_RESP do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;50 class DOT1X_TIMEOUT do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 authenticate using mab priority 20&lt;BR /&gt;60 class always do-until-failure&lt;BR /&gt;10 terminate dot1x&lt;BR /&gt;20 terminate mab&lt;BR /&gt;30 authentication-restart 60&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 12:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-11-eap-teap-quot-action-needed-quot-to-sign-in/m-p/5542025#M600143</guid>
      <dc:creator>Simon Parlsjo</dc:creator>
      <dc:date>2026-04-01T12:42:38Z</dc:date>
    </item>
  </channel>
</rss>

