Global Information Lookup Global Information

Protected Extensible Authentication Protocol information


PEAP is also an acronym for Personal Egress Air Packs.

The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.[1][2][3][4] The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided.[5]

PEAP was jointly developed by Cisco Systems, Microsoft, and RSA Security. PEAPv0 was the version included with Microsoft Windows XP and was nominally defined in draft-kamath-pppext-peapv0-00. PEAPv1 and PEAPv2 were defined in different versions of draft-josefsson-pppext-eap-tls-eap. PEAPv1 was defined in draft-josefsson-pppext-eap-tls-eap-00 through draft-josefsson-pppext-eap-tls-eap-05,[6] and PEAPv2 was defined in versions beginning with draft-josefsson-pppext-eap-tls-eap-06.[7]

The protocol only specifies chaining multiple EAP mechanisms and not any specific method.[3][8] However, use of the EAP-MSCHAPv2 and EAP-GTC methods are the most commonly supported.[citation needed]

  1. ^ "Understanding the updated WPA and WPA2 standards". ZDNet. 2005-06-02. Retrieved 2012-07-17.
  2. ^ Microsoft's PEAP version 0, draft-kamath-pppext-peapv0-00, §1.1
  3. ^ a b Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-10, abstract
  4. ^ Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-10, §1
  5. ^ Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-07, §1
  6. ^ Protected EAP Protocol (PEAP), draft-josefsson-pppext-eap-tls-eap-05, §2.3
  7. ^ Protected EAP Protocol (PEAP), draft-josefsson-pppext-eap-tls-eap-06, §2.3
  8. ^ Protected EAP Protocol (PEAP) Version 2, draft-josefsson-pppext-eap-tls-eap-10, §2

and 24 Related for: Protected Extensible Authentication Protocol information

Request time (Page generated in 1.2205 seconds.)

Protected Extensible Authentication Protocol

Last Update:

Packs. The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication...

Word Count : 1134

Extensible Authentication Protocol

Last Update:

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...

Word Count : 4172

Lightweight Extensible Authentication Protocol

Last Update:

Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features...

Word Count : 273

RADIUS

Last Update:

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...

Word Count : 2725

Simultaneous Authentication of Equals

Last Update:

In cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method. SAE is...

Word Count : 628

Simple Mail Transfer Protocol

Last Update:

extended multiple times. The protocol version in common use today has extensible structure with various extensions for authentication, encryption, binary data...

Word Count : 7177

PEAP

Last Update:

might be an acronym or abbreviation for: Protected Extensible Authentication Protocol, a security protocol in computer security Personal Egress Air Packs...

Word Count : 57

HTTP

Last Update:

by a client to provide authentication information. The authentication mechanisms described above belong to the HTTP protocol and are managed by client...

Word Count : 7790

Communication protocol

Last Update:

end-user privacy and the extensibility of the protocol. If some portion of the wire image is not cryptographically authenticated, it is subject to modification...

Word Count : 8206

Lightweight Directory Access Protocol

Last Update:

and added support for extensibility, integrated the Simple Authentication and Security Layer, and better aligned the protocol to the 1993 edition of...

Word Count : 4669

Wireless security

Last Update:

ISBN 978-1118084922. "Extensible Authentication Protocol Overview". TechNet. 11 September 2009. Retrieved 26 May 2015. "Extensible Authentication Protocol Overview"...

Word Count : 6899

WorldLink Communications

Last Update:

access points for its customers with IEEE 802.1X and Protected Extensible Authentication Protocol, which allow users to connect to the hotspot without...

Word Count : 1220

Advanced Message Queuing Protocol

Last Update:

Extensible Messaging and Presence Protocol (XMPP), the Extensible Messaging and Presence Protocol. MQTT, a lightweight publish-subscribe protocol. OpenWire...

Word Count : 2671

Transmission Control Protocol

Last Update:

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation...

Word Count : 12507

Salted Challenge Response Authentication Mechanism

Last Update:

Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a...

Word Count : 1892

Index of cryptography articles

Last Update:

encryption • Product cipher • Proof-of-work system • Protected Extensible Authentication Protocol • Provable security • Provably secure cryptographic hash...

Word Count : 2943

List of computing and IT abbreviations

Last Update:

Integration EAP—Extensible Authentication Protocol EAS—Exchange ActiveSync EBCDIC—Extended Binary Coded Decimal Interchange Code EBML—Extensible Binary Meta...

Word Count : 6615

List of TCP and UDP port numbers

Last Update:

(January 1985). Authentication Server. IETF. p. 1. doi:10.17487/RFC0931. RFC 931. Retrieved 2016-10-17. ... The Authentication Server Protocol provides a means...

Word Count : 12679

Protocol ossification

Last Update:

Protocol ossification is the loss of flexibility, extensibility and evolvability of network protocols. This is largely due to middleboxes that are sensitive...

Word Count : 2129

Wired Equivalent Privacy

Last Update:

WEP refers to the combination of 802.1x technology and the Extensible Authentication Protocol. Dynamic WEP changes WEP keys dynamically. It is a vendor-specific...

Word Count : 2879

Security Assertion Markup Language

Last Update:

specify the method of authentication at the identity provider. The IdP may use a username and password, or some other form of authentication, including multi-factor...

Word Count : 3182

OpenVPN

Last Update:

and authentication work, allowing OpenVPN to use all the ciphers available in the OpenSSL package. It can also use the HMAC packet authentication feature...

Word Count : 1965

Email client

Last Update:

the SMTP protocol. The email client which uses the SMTP protocol creates an authentication extension, which the mail server uses to authenticate the sender...

Word Count : 2651

OAuth

Last Update:

authorization protocol, rather than an authentication protocol. Using OAuth on its own as an authentication method may be referred to as pseudo-authentication. The...

Word Count : 2738

PDF Search Engine © AllGlobal.net