Protected Extensible Authentication Protocol: Difference between revisions

Content deleted Content added
Marudubshinki (talk | contribs)
m Robot: Removing selflinks
Line 5:
PEAP uses only [[server-side]] [[public key certificate]]s to authenticate clients by creating an [[encryption|encrypted]] [[Secure Sockets Layer|SSL]]/[[Transport Layer Security|TLS]] [[Tunneling protocol|tunnel]] between the client and the authentication server, which protects the ensuing exchange of authentication information from casual inspection.
 
'''[[Protected Extensible Authentication Protocol|PEAP]]''' is a joint proposal by [[Cisco Systems]], [[Microsoft]] and [[RSA Security]] as an open standard. It is already widely available in products, and provides very good security. It is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication.
 
As of May of 2005, there were two PEAP sub-types certified for the updated WPA and WPA2 standard. They are: