Extensible Authentication Protocol
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. Defined by the Internet Engineering Task Force (IETF), EAP is not a specific authentication mechanism but a framework that supports multiple authentication methods.
Overview[edit | edit source]
EAP is used in various network access technologies, including IEEE 802.11 (Wi-Fi), IEEE 802.3 (Ethernet), and PPP (Point-to-Point Protocol). It provides a standard mechanism for supporting multiple authentication methods, such as token cards, smart cards, certificates, and public key encryption.
EAP Methods[edit | edit source]
EAP supports a wide range of authentication methods, including but not limited to:
- EAP-TLS (Transport Layer Security)
- EAP-TTLS (Tunneled Transport Layer Security)
- PEAP (Protected Extensible Authentication Protocol)
- EAP-MD5 (Message Digest 5)
- EAP-SIM (Subscriber Identity Module)
- EAP-AKA (Authentication and Key Agreement)
Each method provides different levels of security and is suitable for different types of network environments.
EAP in Wireless Networks[edit | edit source]
EAP is widely used in wireless networks, particularly in Wi-Fi networks that require strong authentication mechanisms. The IEEE 802.1X standard, which is used for port-based network access control, relies on EAP to provide secure authentication.
EAP Architecture[edit | edit source]
The EAP architecture consists of three main components:
- Supplicant: The client device that requests access to the network.
- Authenticator: The network device that controls access to the network.
- Authentication Server: The server that validates the credentials of the supplicant.
The communication between these components is typically carried out using the RADIUS (Remote Authentication Dial-In User Service) protocol.
Security Considerations[edit | edit source]
EAP provides a flexible framework for authentication, but the security of the overall system depends on the specific EAP method used. Methods like EAP-TLS and PEAP provide strong security by using certificates and encrypted tunnels, while methods like EAP-MD5 are considered less secure.
Related Pages[edit | edit source]
See Also[edit | edit source]
References[edit | edit source]
External Links[edit | edit source]
Search WikiMD
Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD
WikiMD's Wellness Encyclopedia |
Let Food Be Thy Medicine Medicine Thy Food - Hippocrates |
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian
WikiMD is not a substitute for professional medical advice. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.
Contributors: Prab R. Tumpati, MD