Event ID 5142 represents a successful network access authorization event generated by the Network Policy Server role in Windows Server. When NPS receives a RADIUS Access-Request from a network access server (like a wireless access point, VPN server, or switch), it evaluates the request against configured connection request policies and network policies.
The event contains detailed information about the authentication session, including the user account, client machine, authentication method (such as PEAP-MS-CHAPv2, EAP-TLS, or PAP), and the network policy that granted access. This information proves invaluable for security auditing, troubleshooting authentication issues, and ensuring compliance with organizational access policies.
NPS logs this event after successful policy evaluation, meaning the user met all conditions specified in the matching network policy. The event includes session identifiers that correlate with other network infrastructure logs, enabling comprehensive analysis of user network access patterns. In 2026 environments, this event is particularly important for Zero Trust network architectures where every access request requires verification.