Extensible Authentication Protocol (EAP) for network access
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 11, Windows 10, Windows 8.1
The Extensible Authentication Protocol (EAP) is an authentication framework that allows for the use of different authentication methods for secure network access technologies. Examples of these technologies include wireless access using IEEE 802.1X, wired access using IEEE 802.1X, and Point-to-Point Protocol (PPP) connections like Virtual Private Networking (VPN). EAP isn't a specific authentication method like MS-CHAP v2, but rather a framework that enables networking vendors to develop and install new authentication methods, known as EAP methods, on the access client and authentication server.
Authentication methods
This topic contains configuration information specific to the following authentication methods in EAP.
Note
EAP authentication methods that are used within tunneled EAP methods are commonly known as inner methods or EAP types.
Protected EAP (PEAP)
This section contains configuration information for the two default inner EAP methods that are provided with PEAP.
EAP-Transport Layer Security (TLS)
Appearing as Smart Card or other Certificate (EAP-TLS) in the Windows, EAP-TLS can be deployed as an inner method for PEAP or as a standalone EAP method. If EAP-TLS is set up as an inner authentication method, it will have the same configuration settings as EAP-TLS when it's used as an outer method. The only difference is that the method will be configured to work within PEAP. For configuration details, see Smart card or other certificate properties configuration items.
EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Appearing as Secure password (EAP-MSCHAP v2) in Windows, EAP-MSCHAP v2 is an EAP type that can be used with PEAP for password-based network authentication. EAP-MSCHAP v2 can also be used as a standalone method for VPN, but only as a PEAP inner method for wireless. EAP-MSCHAP v2 is the EAP method that encapsulates the MS-CHAPv2 authentication protocol.
EAP-Tunneled Transport Layer Security (TTLS)
Encapsulates a TLS session that authenticates the server to client and authenticates the client to the server using another inner authentication mechanism such as EAP or a non-EAP protocol, such as Password Authentication Protocol (PAP). Support was added to client in Windows 8.
EAP-Subscriber Identity Module (SIM), EAP-Authentication and Key Agreement (AKA), and EAP-AKA Prime (AKA')
Enables authentication by using SIM cards, and is implemented when a customer purchases a wireless broadband service plan from a mobile network operator. As part of the plan, the customer commonly receives a wireless profile that is preconfigured for SIM authentication.
This topic provides information about the following:
Tunnel EAP (TEAP)
Standards-based tunneled EAP method that establishes a secure TLS tunnel and executes other EAP methods inside that tunnel. Supports EAP chaining - authenticating the machine and user within one authentication session. Support was added to client in Windows 10, version 2004 (Build 19041)
EAP-TLS, PEAP, and EAP-TTLS
You can access the EAP properties for 802.1X authenticated wired and wireless access in the following ways:
By configuring the Wired Network (IEEE 802.3) Policies and Wireless Network (IEEE 802.11) Policies extensions in Group Policy.
By manually configuring wired or wireless connections on client computers.
You can access the EAP properties for virtual private network (VPN) connections in the following ways:
By using Connection Manager Administration Kit (CMAK) to configure VPN connections.
By manually configuring VPN connections on client computers.
By default, you can configure EAP settings for the following network authentication methods for 802.1X authenticated wired access, 802.1X authenticated wireless access, and VPN:
- Microsoft: Smart card or other certificate (EAP-TLS)
- Microsoft: Protected EAP (PEAP)
- Microsoft: EAP-TTLS
Additionally, the MS-CHAP-V2 network authentication method is available for VPN by default.
Protected EAP Properties configuration settings
This section lists the settings that can be configured for Protected EAP.
Important
Deploying the same type of authentication method for PEAP and EAP creates a security vulnerability. When you deploy both PEAP and EAP (which isn't protected), do not use the same authentication type. For example, if you deploy PEAP-TLS, do not also deploy EAP-TLS.
Verify the server's identity by validating the certificate
This item specifies that the client verifies that server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). The default setting is "enabled." If you disable this check box, client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.
Connect to these servers
This item allows you to specify the name for Remote Authentication Dial-In User Service (RADIUS) servers that provide network authentication and authorization.
Tip
You must type the name exactly as it appears in the Subject field of each RADIUS server certificate or use regular expressions to specify the server name.
The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one *
in the string specified. For example, you can specify nps*.example.com
to specify the RADIUS server nps1.example.com
or nps2.example.com
but not nps12.example.com
.
Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Defaults:
- Wired and wireless = not enabled
- VPN = enabled
Trusted Root Certification Authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and in the user certificate stores. You can specify which trusted root CA certificates supplicants use to determine whether they trust your servers, such as your server running Network Policy Server (NPS) or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.
Note
Do not specify a trusted root CA certificate that isn't already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer. If you designate a certificate that isn't installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected
Notifications before connecting
This item specifies whether the user is notified if the server name or root certificate isn't specified, or whether the server’s identity cannot be verified.
By default, the following options are provided:
Case 1: Do not ask user to authorize new servers or trusted CAs specifies that if:
- The server name isn't in the Connect to these servers list
- or the root certificate is found but isn't selected in the list of Trusted Root Certification Authorities in PEAP Properties
- or the root certificate isn't found on the computer then the user isn't notified, and the connection attempt fails.
Case 2: Tell user if the server name or root certificate isn't specified specifies that if:
- The server name isn't in the Connect to these servers list
- or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails. In this option, if the root certificate isn't present on the computer, the user isn't notified, and the connection attempts fails.
Case 3: Tell user if the server’s identity cannot be verified specifies that if:
- The server name isn't in the Connect to these servers list
- or the root certificate is found but isn't selected in the list of Trusted Root Certification Authorities in PEAP Properties
- or the root certificate isn't found on the computer
then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails.
Select authentication method
This item allows you to select the EAP type to use with PEAP for network authentication. There are two EAP types available by default: Secure password (EAP-MSCHAP v2) and Smart card or other certificate (EAP-TLS). However, EAP is a flexible protocol that allows for the addition of other EAP methods. It's not limited to only these two types.
For more information, see:
Secure password (EAP-MSCHAP v2) properties configuration items
Smart Card or other certificate properties configuration items
Default = Secure password (EAP-MSCHAP v2)
Configure
This item provides access to property settings for the specified EAP type.
Enable fast reconnect
Enables the ability to create a new or refreshed security association more efficiently and with a smaller number of round-trips if a security association was previously established.
For VPN connections, Fast Reconnect uses IKEv2 technology to provide seamless and consistent VPN connectivity, when users temporarily lose their Internet connections. This feature is especially useful for users who connect via wireless mobile broadband.
For example, a user might be on a train and using a wireless mobile broadband card to connect to the Internet and establish a VPN connection to their corporate network.
If the train passes through a tunnel and the Internet connection is lost, the wireless mobile broadband card will automatically reconnect to the Internet when the train is back outside the tunnel.
When the Internet connection is re-established, Fast Reconnect will automatically re-establish active VPN connections. Although this process might take a few seconds, it will happen seamlessly and transparently to users.
Default = enabled
Enforce network access protection
This item specifies that before connections to a network are permitted, system health checks are performed on EAP supplicants to determine if they meet system health requirements.
Default = not enabled
Disconnect if server does not present cryptobinding TLV
This item specifies that connecting clients must end the network authentication process if the RADIUS server does not present cryptobinding Type-Length-Value (TLV). Cryptobinding TLV is a security feature that enhances the security of the TLS tunnel in PEAP. It does this by combining the inner and outer method authentications, making it difficult for attackers to perform man-in-the-middle attacks by redirecting an MS-CHAP v2 authentication through the PEAP channel.
Default = not enabled
Enable identity privacy (Windows 8 only)
Specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy and then type guest
as the anonymous identity value, the identity response for a user with identity alice@example
is guest@example
. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example
is @example
.
This setting applies only to computers running Windows 8 and earlier.
Default = not enabled
Secure password properties configuration items
Checking Automatically use my Windows logon name and password (and domain if any) specifies that the current user-based Windows sign in name and password are used as network authentication credentials.
Defaults:
- Wired and wireless = enabled
- VPN = not enabled
Smart card or other certificate properties configuration items
This section lists the items that can be configured for EAP-TLS.
Use my smart card
This item specifies that clients making authentication requests must present a smart card certificate for network authentication.
Defaults:
- Wired and wireless = not enabled
- VPN = enabled
Use a certificate on this computer
This item specifies that authenticating clients must use a certificate located in the Current User or Local Computer certificate stores.
Defaults:
- Wired and wireless = enabled
- VPN = not enabled
Use simple certificate selection (recommended)
This item specifies whether Windows filters out certificates that are unlikely to meet authentication requirements. This serves to limit the list of available certificates when prompting the user to select a certificate.
Defaults:
- Wired and wireless = enabled
- VPN = not enabled
Advanced
This item opens the Configure Certificate Selection dialog box. For more information about Configure Certificate Selection, see Configure New Certificate Selection configuration items.
Verify the server’s identity by validating the certificate
This item specifies that the client verifies that the server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). Do not disable this check box or client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.
Default = enabled
Connect to these servers
This item allows you to specify the name for RADIUS servers that provide network authentication and authorization.
Tip
You must type the name exactly as it appears in the Subject field of each RADIUS server certificate or use regular expressions to specify the server name.
The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one *
in the string that is specified. For example, you can specify nps*.example.com
to specify the RADIUS server nps1.example.com
or nps2.example.com
but not nps12.example.com
.
Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Defaults:
- Wired and wireless = not enabled
- VPN = enabled
Trusted root certification authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Do not specify a trusted root CA certificate that isn't already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.
Warning
If you designate a certificate that isn't installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected.
View certificate
This item enables you to view the properties of the selected certificate.
Do not prompt user to authorize new servers or trusted certification authorities
This item prevents the user from being prompted to trust a server certificate if that certificate is incorrectly configured, isn't already trusted, or both (if enabled). To simplify the user experience and prevent users from mistakenly trusting a server deployed by an attacker, it's recommended that you select this checkbox.
Default = not enabled
Use a different user name for the connection
This item specifies whether to use a user name for authentication that is different from the user name in the certificate.
Default = not enabled
Configure New Certificate Selection configuration items
Use New Certificate Selection to configure the criteria that client computers will use to automatically select the appropriate certificate for authentication purposes. This configuration can be provided to network client computers through the Wired Network (IEEE 802.3) Policies, the Wireless Network (IEEE 802.11) Policies, or through Connection Manager Administration Kit (CMAK) for VPN. This mean that clients will be automatically provisioned with the specified authentication criteria.
This section lists the configuration items for New Certificate Selection, along with a description of each.
Certificate Issuer
This item specifies whether Certificate Issuer filtering is enabled.
Default = not selected
Certificate Issuer list
Used to specify one or multiple certificate issuers for the certificates.
Lists the names of all of the issuers for which corresponding certification authority (CA) certificates are present in the Trusted Root Certification Authorities or Intermediate Certification Authorities certificate store of local computer account.
Includes all the root certification authorities and intermediate certification authorities.
Contains only those issuers for which there are corresponding valid certificates that are present on the computer (for example, certificates that are not expired or not revoked).
The final list of certificates that are allowed for authentication contains only those certificates that were issued by any of the issuers selected in this list.
Default = none selected
Extended Key Usage (EKU)
You can select All Purpose, Client Authentication, Any Purpose, or any combination of these. Specifies that when a combination is selected, all the certificates satisfying at least one of the three conditions are considered valid certificates for the purpose of authenticating the client to the server. If EKU filtering is enabled, one of the choices must be selected; otherwise, the OK command control is disabled.
Default = not enabled
All Purpose
When selected, this item specifies that certificates having the All Purpose EKU are considered valid certificates for the purpose of authenticating the client to the server. The Object Identifier (OID) for All Purpose is 0
or empty.
Default = selected when Extended Key Usage (EKU) is selected
Client Authentication
When selected, this item specifies that certificates having the Client Authentication EKU, and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server. The Object Identifier (OID) for Client Authentication is 1.3.6.1.5.5.7.3.2
.
Default = selected when Extended Key Usage (EKU) is selected
Any Purpose
When selected, this item specifies that all certificates having Any Purpose EKU and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server. The Object Identifier (OID) for All Purpose is 1.3.6.1.4.1.311.10.12.1
.
Default = selected when Extended Key Usage (EKU) is selected
Add
This item opens the Select EKUs dialog box, which enables you to add standard, custom, or vendor-specific EKUs to the Client Authentication or Any Purpose list.
Default = no EKUs listed
Remove
This item removes the selected EKU from the Client Authentication or Any Purpose list.
Default = N/A
Note
When both Certificate Issuer and Extended Key Usage (EKU) are enabled, only those certificates that satisfy both conditions are considered valid for the purpose of authenticating the client to the server.
Select EKUs
You can select an EKU from the list provided, or add a new EKU.
Item | Details |
---|---|
Add | Opens the Add or Edit EKU dialog box, which enables you to define and add custom EKUs. In Select the EKUs from the list below, select an EKU in the list, and then click OK to add that EKU to the Client Authentication or the Any Purpose list. |
Edit | Opens the Add or Edit EKU dialog box, and enables you to edit custom EKUs that you have added. You cannot edit the default, predefined EKUs. |
Remove | Removes the selected custom EKU from the list of EKUs in the Select EKUs dialog box. You cannot remove the default, predefined EKUs. |
Add or Edit EKU
Item | Details |
---|---|
Enter the name of the EKU | Provides a place to type the name of the custom EKU. |
Enter the EKU OID | Provides a place to type the OID for the EKU. Only numeric digits, separators, and “.” are allowed. Wild cards are permitted, in which case all of the child OIDs in the hierarchy are allowed. For example, entering 1.3.6.1.4.1.311.* allows 1.3.6.1.4.1.311.42 and 1.3.6.1.4.1.311.42.2.1 |
TTLS configuration items
EAP-TTLS is a standards-based EAP tunneling method that supports mutual authentication and provides a secure tunnel for client inclusion authentication by using EAP methods and other legacy protocols. In Windows Server 2012, the inclusion of EAP-TTLS only provides support on the client-side. This is done to enable interoperation with the most commonly deployed RADIUS servers that support EAP-TTLS.
This section lists the items that can be configured for EAP-TTLS.
Enable Identity Privacy (Windows 8 only)
This item specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy, and then type guest
as the anonymous identity value, the identity response for a user with identity alice@example
is guest@example
. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example
is @example
.
This setting applies only to computers running Windows 8.
Default = not enabled
Connect to these servers
This item enables you to specify the name for RADIUS servers that provide network authentication and authorization.
Tip
You must type the name exactly as it appears in the Subject field of each RADIUS server certificate or use regular expressions to specify the server name.
The complete syntax of the regular expression can be used to specify the server name. But to differentiate a regular expression with the literal string, you must use at least one *
in the string that is specified. For example, you can specify nps*.example.com
to specify the RADIUS server nps1.example.com
or nps2.example.com
but not nps12.example.com
.
Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Default = none
Trusted Root Certification Authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs. If selected, your root CA certificate is installed on a client computer when the computers are joined to the domain.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.
Do not specify a trusted root CA certificate that isn't already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.
Warning
If you designate a certificate that isn't installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected
Do not prompt user if unable to authorize server
This item specifies (when not selected) that if server certificate validation fails due to any of the following reasons, the user is prompted to accept or reject the server:
A root certificate for the server certificate isn't found or not selected in the Trusted Root Certification Authorities list.
One or more of the intermediate root certificates in the certificate chain isn't found.
The subject name in the server certificate does not match any of the servers that are specified in the Connect to these servers list.
Default = not selected
Select a non-EAP method for authentication
Specifies whether a non-EAP or an EAP type is used for authentication. If Select a non-EAP method for authentication is selected, then Select an EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, the following non-EAP authentication types are provided in the drop-down list:
- PAP
- CHAP
- MS-CHAP
- MS-CHAP v2
Defaults:
- Select a non-EAP method for authentication = enabled
- Non-EAP type = PAP
Automatically use my Windows logon name and password
When enabled, this item uses Windows sign in credentials. This check-box is enabled only if MS-CHAP v2 is selected in the Select a non-EAP method for authentication drop-down list. Automatically use my Windows logon name and password is disabled for PAP, CHAP, and MS-CHAP authentication types.
Select an EAP method for authentication
This item specifies whether an EAP type or a non-EAP type is used for authentication. If Select an EAP method for authentication is selected, then Select a non-EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, by default, the following non-EAP authentication types are provided in the drop-down list:
Microsoft: Smart Card or other Certificate
Microsoft: MS-CHAP v2
MS-CHAP
MS-CHAP v2
Note
The Select an EAP method for authentication drop-down list will enumerate all the EAP methods that are installed on the server, except for PEAP and FAST tunnel methods. The EAP types are listed in the order that they are discovered by the computer.
Configure
Opens the properties dialog box of the specified EAP type. For details about the default EAP types, see Smart card or other certificate properties configuration items or Secure password (EAP-MSCHAP v2) properties configuration items.
EAP-SIM configuration settings
EAP Subscriber Identity Module (SIM) is used for authentication and session key distribution for the Global System for Mobile Communications (GSM). EAP-SIM is defined in RFC 4186.
The following table lists the configuration settings for EAP-SIM.
Item | Description |
---|---|
Use strong Cipher keys | Specifies that if selected, the profile uses strong encryption. |
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user isn't revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name |
EAP-AKA configuration settings
EAP Authentication and Key Agreement (AKA) for Universal Mobile Telecommunications System (UMTS) is used for authentication and session key distribution by using the UMTS Universal Subscriber Identity Module (USIM). EAP AKA is defined in RFC 4187.
The following table lists the configuration settings for EAP-AKA.
Item | Description |
---|---|
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user isn't revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name. |
EAP-AKA' configuration settings
EAP- AKA Prime (AKA') is a modified version of EAP-AKA that is used to enable access to the 3rd-Generation Partnership Project (3GPP)-based networks by using non-3GPP standards, such as:
WiFi - sometimes referred to as wireless fidelity
Evolution-Data Optimized (EVDO)
Worldwide Interoperability for Microwave Access (WiMax)
EAP-AKA' is defined in RFC 5448.
The following table lists the configuration settings for EAP-AKA'.
Item | Description |
---|---|
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user isn't revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name. |
Ignore network name mismatch | The client compares the name of network known to it, with the name sent by the RADIUS server during authentication. If there is mismatch, it's ignored if this option is selected. If not selected, authentication fails. |
Enable Fast Reauthentication | Specifies that fast reauthentication is enabled. Fast Reauthentication is useful when SIM authentication happens frequently. The encryption keys that are derived from full authentication are reused. As a result, the SIM algorithm isn't required to run for every authentication attempt, and the number of network operations that result from frequent authentication attempts is reduced. |
Additional resources
For more information about authenticated wireless settings in Group Policy, see Managing the New Wireless Network (IEEE 802.11) Policies Settings
For more information about authenticated wired settings in Group Policy, see Managing the New Wired Network (IEEE 802.3) Policies Settings
For more information about advanced settings for authenticated wired access and authenticated wireless access, see Advanced Security Settings for Wired and Wireless Network Policies.
Feedback
Submit and view feedback for