Protected Extensible Authentication Protocol information
Protocol that encapsulates Extensible Authentication Protocol
PEAP is also an acronym for Personal Egress Air Packs.
TheProtected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.[1][2][3][4] The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided.[5]
PEAP was jointly developed by Cisco Systems, Microsoft, and RSA Security. PEAPv0 was the version included with Microsoft Windows XP and was nominally defined in draft-kamath-pppext-peapv0-00. PEAPv1 and PEAPv2 were defined in different versions of draft-josefsson-pppext-eap-tls-eap. PEAPv1 was defined in draft-josefsson-pppext-eap-tls-eap-00 through draft-josefsson-pppext-eap-tls-eap-05,[6] and PEAPv2 was defined in versions beginning with draft-josefsson-pppext-eap-tls-eap-06.[7]
The protocol only specifies chaining multiple EAP mechanisms and not any specific method.[3][8] However, use of the EAP-MSCHAPv2 and EAP-GTC methods are the most commonly supported.[citation needed]
^"Understanding the updated WPA and WPA2 standards". ZDNet. 2005-06-02. Retrieved 2012-07-17.
^Microsoft's PEAP version 0, draft-kamath-pppext-peapv0-00, §1.1
^ abProtected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-10, abstract
^Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-10, §1
^Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-07, §1
Packs. The ProtectedExtensibleAuthenticationProtocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication...
ExtensibleAuthenticationProtocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
Lightweight ExtensibleAuthenticationProtocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features...
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
In cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method. SAE is...
extended multiple times. The protocol version in common use today has extensible structure with various extensions for authentication, encryption, binary data...
might be an acronym or abbreviation for: ProtectedExtensibleAuthenticationProtocol, a security protocol in computer security Personal Egress Air Packs...
by a client to provide authentication information. The authentication mechanisms described above belong to the HTTP protocol and are managed by client...
end-user privacy and the extensibility of the protocol. If some portion of the wire image is not cryptographically authenticated, it is subject to modification...
and added support for extensibility, integrated the Simple Authentication and Security Layer, and better aligned the protocol to the 1993 edition of...
ISBN 978-1118084922. "ExtensibleAuthenticationProtocol Overview". TechNet. 11 September 2009. Retrieved 26 May 2015. "ExtensibleAuthenticationProtocol Overview"...
Extensible Messaging and Presence Protocol (XMPP), the Extensible Messaging and Presence Protocol. MQTT, a lightweight publish-subscribe protocol. OpenWire...
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation...
Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a...
(January 1985). Authentication Server. IETF. p. 1. doi:10.17487/RFC0931. RFC 931. Retrieved 2016-10-17. ... The Authentication Server Protocol provides a means...
Protocol ossification is the loss of flexibility, extensibility and evolvability of network protocols. This is largely due to middleboxes that are sensitive...
WEP refers to the combination of 802.1x technology and the ExtensibleAuthenticationProtocol. Dynamic WEP changes WEP keys dynamically. It is a vendor-specific...
specify the method of authentication at the identity provider. The IdP may use a username and password, or some other form of authentication, including multi-factor...
and authentication work, allowing OpenVPN to use all the ciphers available in the OpenSSL package. It can also use the HMAC packet authentication feature...
the SMTP protocol. The email client which uses the SMTP protocol creates an authentication extension, which the mail server uses to authenticate the sender...
authorization protocol, rather than an authenticationprotocol. Using OAuth on its own as an authentication method may be referred to as pseudo-authentication. The...