• Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
    34 KB (4,172 words) - 20:50, 1 May 2025
  • Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol...
    10 KB (1,134 words) - 16:36, 5 July 2024
  • Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features...
    3 KB (273 words) - 10:50, 18 March 2022
  • Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
    7 KB (685 words) - 05:45, 17 February 2025
  • those for use with the Extensible Authentication Protocol (EAP). The name is a play on words, derived from the RADIUS protocol, which is the predecessor...
    30 KB (1,777 words) - 19:51, 28 February 2025
  • IEEE 802.1X (category Computer access control protocols)
    their servers. IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over wired IEEE 802 networks: §3.3  and over 802.11...
    26 KB (3,037 words) - 22:28, 7 February 2025
  • authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data...
    10 KB (1,192 words) - 23:19, 10 July 2024
  • In cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method. SAE is...
    6 KB (631 words) - 23:13, 2 April 2025
  • Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
    33 KB (2,792 words) - 14:22, 16 September 2024
  • Wi-Fi Protected Access (category Cryptographic protocols)
    supports various authentication methods like Extensible Authentication Protocol, which uses certificates for secure authentication, and PEAP, creating...
    40 KB (4,686 words) - 14:06, 13 May 2025
  • Thumbnail for Point-to-Point Protocol
    Authentication Protocol (PAP) is still sometimes used. Another option for authentication over PPP is Extensible Authentication Protocol (EAP) described...
    21 KB (2,284 words) - 09:40, 21 April 2025
  • Thumbnail for Wireless security
    ISBN 978-1118084922. "Extensible Authentication Protocol Overview". TechNet. 11 September 2009. Retrieved 26 May 2015. "Extensible Authentication Protocol Overview"...
    53 KB (6,903 words) - 20:58, 9 March 2025
  • Authentication Protocol. It provides an authenticator-controlled password change mechanism. It provides an authenticator-controlled authentication retry...
    5 KB (586 words) - 13:29, 2 February 2025
  • (SRP) Protocol for TLS Authentication". RFC Editor. doi:10.17487/rfc5054. RFC 5054. Harkins, D.; Zorn, G. (August 2010). "Extensible Authentication Protocol...
    17 KB (1,799 words) - 23:21, 29 December 2024
  • the Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol originally used by Point-to-Point Protocol (PPP) to validate users...
    6 KB (755 words) - 07:44, 28 May 2024
  • The Extensible Provisioning Protocol (EPP) is a flexible protocol designed for allocating objects within registries over the Internet. The motivation...
    35 KB (2,055 words) - 14:46, 12 January 2025
  • IPoE (category Link protocols)
    : 9–10  Typically, IPoE uses Dynamic Host Configuration Protocol and Extensible Authentication Protocol to provide the same functionality as PPPoE, but in...
    1 KB (120 words) - 20:03, 14 October 2021
  • primary advantages are the native support for authenticating via the Extensible Authentication Protocol (EAP) and that the tunnel can be seamlessly restored...
    33 KB (3,634 words) - 16:56, 3 May 2025
  • extended multiple times. The protocol version in common use today has extensible structure with various extensions for authentication, encryption, binary data...
    62 KB (7,390 words) - 13:47, 12 May 2025
  • WEP refers to the combination of 802.1x technology and the Extensible Authentication Protocol. Dynamic WEP changes WEP keys dynamically. It is a vendor-specific...
    23 KB (2,897 words) - 16:11, 14 May 2025
  • renegotiate its key with the RADIUS or other authentication server supporting Extensible Authentication Protocol (EAP) on every transition, a time-consuming...
    7 KB (953 words) - 01:56, 29 August 2024
  • might be an acronym or abbreviation for: Protected Extensible Authentication Protocol, a security protocol in computer security Personal Egress Air Packs...
    235 bytes (57 words) - 11:17, 8 December 2020
  • in-band signalling channel, which relies on Extensible Authentication Protocol (EAP) to perform the authentication between devices involved in a PCP negotiation...
    23 KB (2,637 words) - 05:35, 10 May 2025
  • Integration EAP—Extensible Authentication Protocol EAS—Exchange ActiveSync EBCDIC—Extended Binary Coded Decimal Interchange Code EBML—Extensible Binary Meta...
    92 KB (6,587 words) - 22:31, 24 March 2025
  • and added support for extensibility, integrated the Simple Authentication and Security Layer, and better aligned the protocol to the 1993 edition of...
    34 KB (4,752 words) - 18:15, 3 April 2025
  • Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a...
    15 KB (1,891 words) - 01:53, 12 April 2025
  • Thumbnail for XMPP
    Extensible Messaging and Presence Protocol (abbreviation XMPP, originally named Jabber) is an open communication protocol designed for instant messaging...
    35 KB (3,853 words) - 09:12, 22 April 2025
  • Enterprise with Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Cisco's Lightweight Extensible Authentication Protocol (LEAP). He...
    82 KB (7,922 words) - 08:36, 14 May 2025
  • keeps private. While authentication is based on the private key, the key is never transferred through the network during authentication. SSH only verifies...
    41 KB (4,509 words) - 00:21, 15 May 2025
  • Thumbnail for BEEP
    The Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols. BEEP includes building blocks like framing,...
    8 KB (889 words) - 10:54, 17 October 2023