EAP blog

All about EAP methods, Microsoft EAPHost and ECP

Browse by Tags

Tagged Content List
  • Blog Post: PEAP Phase 2 fragmentation support

    The Extensible Authentication Protocol (EAP) does not support fragmentation and reassembly. Hence EAP authentication methods generating payloads larger than then minimum EAP MTU need to provide fragmentation support. MS-PEAP is a tunnelling method comprising of multiple phases. The purpose of the first...
  • Blog Post: PEAP Identity Privacy Support in Windows7

    Summary EAP identity privacy is provided by certain EAP methods where an empty or an anonymous identity (different from the actual identity) is sent in response to the EAP identity request. PEAP method sends the identity twice during the authentication. In the 1 st phase the identity is sent in plain...
Page 1 of 1 (2 items)