How to find NPS client Radius Shared Secret Key

Overtime we forget things, especially Shared secret radius keys. This is pretty common, and I run into it a lot. For example – lets say a you setup NPS (Network Policy Server) and a Wireless controller for 802.1x auth, or a ASA doing radius authentication years ago. Some how or another that key was lost – no worries, you can get that back from the NPS server itself.

In just a few simple steps you can get that key back. So lets start by opening up NPS and then selecting “Radius Clients and Servers” and dropping down “Radius Clients”


In this example I am using a Ruckus Smartzone – lets say I forget the password. I can just right click on the client and select “Save and apply as Template.


Next we can create a new radius client by right clicking on “Radius Clients” and once the client info pops up to fill in, we will select to create it from the template, and select the template we made.



To see the *** Password, uncheck the box “Select and existing template” and then select the “Generate” Radio button – and bam! there is the PSK.


7 responses to “How to find NPS client Radius Shared Secret Key

  1. Erick Aguirre March 22, 2021 at 10:38 pm

    When I uncheck the “Select an existing template” box the Generate button stays grayed out. I guess Microsoft has released an update to fix this as a security flaw?

  2. Sebastian March 25, 2021 at 1:01 pm

    You sir are genius, thank you very much 🙂

  3. Randolf October 28, 2021 at 8:23 am

    Wooohooo, Thank you very much. This saved my Day. I can confirm (at least on Windows Server 2012):

    When Using the Template, then de-selecting it and Choosing to generate a Shared Secred, the used one in the Template is revealed.

    Great Post =D

  4. JettJungle February 24, 2022 at 3:13 am

    Or you can just export the configuration and find the key strings for each Radius client in the xml file

  5. akbaraji March 16, 2022 at 3:15 am

    i can still using this guide on March 2022, thank you very much

  6. MainMan October 21, 2022 at 3:40 am

    WOW… Thank you Sir

Leave a Reply