EAPHost components applicable to the ECP program include the following:

  • EAP peer methods – client side EAP methods used to authenticate to a network.
  • EAP peer tunneling methods - client side EAP methods used to authenticate to a network which establish an encryption tunnel to facilitate secure information exchange for authentication and authorization.
  • EAP authenticator methods – server side EAP methods used to terminate a network authentication on Microsoft’s RADIUS and network policy server (NPS).
  • EAP authenticator tunneling methods - server side EAP methods used to terminate a network authentication on Microsoft’s RADIUS and network policy server (NPS) which establish an encryption tunnel to facilitate secure information exchange for authentication and authorization.
  • IP based network supplicants with EAP authentication support using EAPHost.