Showing results for 
Search instead for 
Did you mean: 

Windows clients sending windows credentials

We're trying a number of options for a space that's almost all "guest" access, and since web portals are awful with HTTPS everywhere, we're trying 802.1x EAP auth to a radius server.

For OS-X, it's been working great.  User picks network, types in their credentials from our partner that runs the radius server, and away they go.  Windows folks though... some connect with no issues.  Others seem to be sending what appear to be their actual windows domain credentials (there are "\\" in the username, etc.) as opposed to sending the email/password that the on-site folks provide them. I am not a windows person, what is this fluke and on the AP side of things, is there any way to prevent this behavior?

RUCKUS Team Member
By default Windows will send domain credentials, if its managed by AD. You can check out this option from LAN connection properties.
Image_ images_messages_5f91c43f135b77e2479e57b3_df67224166057256a9030c3c26b7ce2b_RackMultipart201806148304v2fti-c0fb17a2-2fea-4330-a4f0-c459338c7bcd-938807775.png1528959922


New Contributor
This is not the major problem. I have the similar issue a few months ago.  The option EAP deleted always may be due to antivirus. I have managed this problem with the help of Windows 10 support numberImage_ images_messages_5f91c43b135b77e2479d2ae0_e4097781a5cf2111dea9fca7305b403c_RackMultipart201809287387416yk-1f771378-e3e2-4d84-a9bd-596c5f14aa5a-554718701.png1538128042. You may try this. 

Do NOT click on the link in the above post.  This person is posting this link on multiple Get Satisfaction forums, including the on I frequent (ViaSat), so I'm making sure to warn others to not click on that link.  It's a phishing scam.