Extensible Authentication Protocol: Difference between revisions

Content deleted Content added
Undid revision 996660584 by 176.54.24.240 (talk)
Tag: Reverted
Line 5:
 
==Methods==
EAP is an authentication framework, not a specific authentication mechanism.<ref name="rfc3748_sec1">RFC 3748, § 1</ref> It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in [[IETF]] RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, [[Lightweight Extensible Authentication Protocol|LEAP]] and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in RFC 4017. The list of type and packets codes used in EAP is available from the IANA EAP Registry.
 
The standard also describes the conditions under which the AAA key management requirements described in RFC 4962 can be satisfied.