EAP is an authentication framework, not a specific authentication mechanism. It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in IETF RFCs include EAP-MD5, EAP-OTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA and EAP-AKA', and in addition a number of vendor specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in RFC 4017.
The standard also describes the conditions under which the AAA key management requirements described in RFC 4962 can be satisfied.
Read more about this topic: EAP-AKA
Other articles related to "methods, method":
... Its focus is not only on methods of promoting economic growth and structural change but also on improving the potential for the mass of the population, for example, through health and education ... Development economics involves the creation of theories and methods that aid in the determination of policies and practices and can be implemented at either the domestic or ... restructuring market incentives or using mathematical methods like inter-temporal optimization for project analysis, or it may involve a mixture of quantitative and qualitative methods ...
... was kept a secret to the grave and his methods were not widely copied ... Contemporary embalming methods advanced markedly during the height of the British Empire and the American Civil War, which once again involved many foreign officials ... preservative properties were soon discovered and which became the foundation for modern methods of embalming, replacing previous methods based on alcohol and the use of ...
... Researchers have developed training-methods for artificial-intelligence devices as well ... Evolutionary algorithms, including genetic programming and other methods of machine learning, use a system of feedback based on "fitness functions" to allow computer programs ... The methods construct a series of programs, known as a “population” of programs, and then automatically test them for "fitness", observing how well they perform the intended task ...
... A method based on proximity matrices is one where the data is presented to the algorithm in the form of a similarity matrix or a distance matrix ... These methods all fall under the broader class of metric multidimensional scaling ... examples of metric multidimensional scaling methods ...
... Fly fishing for trout is a very popular sport, which can be done using any of the various methods and any of the general types of flies ... Many of the techniques and presentations of fly fishing were first developed in fishing for trout ...
Famous quotes containing the word methods:
“All men are equally proud. The only difference is that not all take the same methods of showing it.”
—François, Duc De La Rochefoucauld (16131680)
“There are souls that are incurable and lost to the rest of society. Deprive them of one means of folly, they will invent ten thousand others. They will create subtler, wilder methods, methods that are absolutely DESPERATE. Nature herself is fundamentally antisocial, it is only by a usurpation of powers that the organized body of society opposes the natural inclination of humanity.”
—Antonin Artaud (18961948)
“How can you tell if you discipline effectively? Ask yourself if your disciplinary methods generally produce lasting results in a manner you find acceptable. Whether your philosophy is democratic or autocratic, whatever techniques you usereasoning, a star chart, time-outs, or spankingif it doesnt work, its not effective.”
—Stanley Turecki (20th century)