Spring special offer:

Get OFF

Spring Offer: Get OFF Claim Now!

Claim Now!
Get Plan

45-day money-back guarantee

Extensible Authentication Protocol

Extensible Authentication Protocol Definition

The Extensible Authentication Protocol (EAP) is a network authentication framework that allows different methods to be used within an authentication process. These can include passwords, digital certificates, hardware tokens, or other identity verification methods.

Rather than acting as an authentication method itself, EAP defines how authentication information is exchanged between systems. It’s commonly used in network access control systems, including secure Wi-Fi networks and remote access protocols.

Extensible Authentication Protocol Roles

EAP defines the communication between the three roles in the authentication process:

How the Extensible Authentication Protocol Works

EAP includes various authentication mechanisms and implementation methods. The specific steps and technical details vary greatly, but the EAP authentication process generally goes like this:

  1. The supplicant establishes a connection and requests access.
  2. The authenticator uses EAP to request the supplicant’s credentials, such as passwords or security tokens.
  3. The supplicant responds with the requested credentials.
  4. The authenticator sends them to the authentication server.
  5. The authentication server checks the credentials.
  6. The authentication server allows the supplicant access, rejects it, or requests another authentication method, and may repeat the process if needed.

Extensible Authentication Protocol Pros

Extensible Authentication Protocol Cons

Read More

FAQ

EAP allows a network to choose between several authentication methods. This gives a network the ability to implement different security levels and control user access in a modular way.

No, EAP is a framework that defines how to request and transmit authentication data. It enables secure communication between the supplicant, authenticator, and authentication server, but it doesn't perform the authentication itself.

EAP can be used on practically any network that requires authentication — it’s compatible with wired, wireless, and remote connections. It’s commonly deployed in enterprise Wi-Fi networks (such as WPA2-Enterprise and WPA3-Enterprise), VPN connections, and network access control systems.

Some EAP varieties are considered standards for popular operating systems, including EAP-TLS, PEAP, and EAP-TTLS. In practice, PEAP and EAP-TTLS are often used because they support password-based authentication, while EAP-TLS is increasingly adopted in modern environments due to its stronger, certificate-based security.

×

DON'T MISS THIS DEAL

OFF

Pro-grade privacy — for a limited time only

undefined45-Day Money-Back Guarantee