Content deleted Content added
Tag: Reverted |
Undid revision 1012847151 by 67.176.123.117 (talk) There are two separate but related standards, AKA and AKA' and both are in an RFC. So the original text was correct. |
||
Line 5:
==Methods==
EAP is an authentication framework, not a specific authentication mechanism.<ref name="rfc3748_sec1">RFC 3748, § 1</ref> It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in [[IETF]] RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, [[Lightweight Extensible Authentication Protocol|LEAP]] and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in RFC 4017. The list of type and packets codes used in EAP is available from the IANA EAP Registry.
The standard also describes the conditions under which the AAA key management requirements described in RFC 4962 can be satisfied.
|