Using EAPHost
This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.
Topic | Description |
---|---|
Configuring Registry Values for EAP Methods | Describes the registry values required for EAP peer methods and EAP authentication methods. |
Enabling EAPHost Tracing | Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions. |
Implementing the EAPHost LEAP Mechanism | Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows. |
Installing an EAP Method | Details how to install a custom implementation of an EAP peer or authenticator method. |
SSO and PLAP | Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience. |
Tilbakemeldinger
https://aka.ms/ContentUserFeedback.
Kommer snart: Gjennom 2024 faser vi ut GitHub Issues som tilbakemeldingsmekanisme for innhold, og erstatter det med et nytt system for tilbakemeldinger. Hvis du vil ha mer informasjon, kan du se:Send inn og vis tilbakemelding for