Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
34 KB (4,172 words) - 20:50, 1 May 2025
Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol...
10 KB (1,134 words) - 16:36, 5 July 2024
Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features...
3 KB (273 words) - 10:50, 18 March 2022
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
7 KB (685 words) - 05:45, 17 February 2025
IEEE 802.1X (category Computer access control protocols)
their servers. IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over wired IEEE 802 networks: §3.3 and over 802.11...
26 KB (3,037 words) - 22:28, 7 February 2025
those for use with the Extensible Authentication Protocol (EAP). The name is a play on words, derived from the RADIUS protocol, which is the predecessor...
30 KB (1,777 words) - 19:51, 28 February 2025
authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data...
10 KB (1,192 words) - 23:19, 10 July 2024
In cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method. SAE is...
6 KB (631 words) - 23:13, 2 April 2025
Wi-Fi Protected Access (category Cryptographic protocols)
supports various authentication methods like Extensible Authentication Protocol, which uses certificates for secure authentication, and PEAP, creating...
40 KB (4,686 words) - 14:06, 13 May 2025
Authentication Protocol (PAP) is still sometimes used. Another option for authentication over PPP is Extensible Authentication Protocol (EAP) described...
21 KB (2,284 words) - 09:40, 21 April 2025
RADIUS (redirect from Remote Authentication Dial In User Service)
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
33 KB (2,792 words) - 14:22, 16 September 2024
ISBN 978-1118084922. "Extensible Authentication Protocol Overview". TechNet. 11 September 2009. Retrieved 26 May 2015. "Extensible Authentication Protocol Overview"...
53 KB (6,903 words) - 20:58, 9 March 2025
MS-CHAP (redirect from Microsoft Challenge Handshake Authentication Protocol)
Authentication Protocol. It provides an authenticator-controlled password change mechanism. It provides an authenticator-controlled authentication retry...
5 KB (586 words) - 13:29, 2 February 2025
(SRP) Protocol for TLS Authentication". RFC Editor. doi:10.17487/rfc5054. RFC 5054. Harkins, D.; Zorn, G. (August 2010). "Extensible Authentication Protocol...
17 KB (1,799 words) - 23:21, 29 December 2024
the Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol originally used by Point-to-Point Protocol (PPP) to validate users...
6 KB (755 words) - 07:44, 28 May 2024
The Extensible Provisioning Protocol (EPP) is a flexible protocol designed for allocating objects within registries over the Internet. The motivation...
35 KB (2,055 words) - 14:46, 12 January 2025
Virtual private network (section Authentication)
primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored...
33 KB (3,634 words) - 16:56, 3 May 2025
IPoE (category Link protocols)
: 9–10 Typically, IPoE uses Dynamic Host Configuration Protocol and Extensible Authentication Protocol to provide the same functionality as PPPoE, but in...
1 KB (120 words) - 20:03, 14 October 2021
extended multiple times. The protocol version in common use today has extensible structure with various extensions for authentication, encryption, binary data...
62 KB (7,390 words) - 13:47, 12 May 2025
might be an acronym or abbreviation for: Protected Extensible Authentication Protocol, a security protocol in computer security Personal Egress Air Packs...
235 bytes (57 words) - 11:17, 8 December 2020
IEEE 802.11r-2008 (section Protocol operation)
renegotiate its key with the RADIUS or other authentication server supporting Extensible Authentication Protocol (EAP) on every transition, a time-consuming...
7 KB (953 words) - 01:56, 29 August 2024
Wired Equivalent Privacy (redirect from Wireless Equivalent Protocol)
WEP refers to the combination of 802.1x technology and the Extensible Authentication Protocol. Dynamic WEP changes WEP keys dynamically. It is a vendor-specific...
23 KB (2,897 words) - 16:11, 14 May 2025
in-band signalling channel, which relies on Extensible Authentication Protocol (EAP) to perform the authentication between devices involved in a PCP negotiation...
23 KB (2,637 words) - 05:35, 10 May 2025
Integration EAP—Extensible Authentication Protocol EAS—Exchange ActiveSync EBCDIC—Extended Binary Coded Decimal Interchange Code EBML—Extensible Binary Meta...
92 KB (6,587 words) - 22:31, 24 March 2025
Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a...
15 KB (1,891 words) - 01:53, 12 April 2025
and added support for extensibility, integrated the Simple Authentication and Security Layer, and better aligned the protocol to the 1993 edition of...
34 KB (4,752 words) - 18:15, 3 April 2025
XMPP (redirect from Extensible messaging and presence protocol)
Extensible Messaging and Presence Protocol (abbreviation XMPP, originally named Jabber) is an open communication protocol designed for instant messaging...
35 KB (3,853 words) - 09:12, 22 April 2025
Enterprise with Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Cisco's Lightweight Extensible Authentication Protocol (LEAP). He...
82 KB (7,922 words) - 08:36, 14 May 2025
Secure Shell (redirect from Secure Shell Protocol)
keeps private. While authentication is based on the private key, the key is never transferred through the network during authentication. SSH only verifies...
41 KB (4,509 words) - 00:21, 15 May 2025
HTTP (redirect from Http protocol)
by a client to provide authentication information. The authentication mechanisms described above belong to the HTTP protocol and are managed by client...
61 KB (7,773 words) - 16:25, 14 May 2025