- Extensible Authentication Protocol (EAP) for network access
- Authentication methods
- EAP-TLS, PEAP, and EAP-TTLS
- Protected EAP Properties configuration settings
- Verify the server’s identity by validating the certificate
- Connect to these servers
- Trusted Root Certification Authorities
- Notifications before connecting
- Select authentication method
- Configure
- Enable fast reconnect
- Enforce network access protection
- Disconnect if server does not present cryptobinding TLV
- Enable identity privacy (Windows 8 only)
- Secure password properties configuration items
- Smart card or other certificate properties configuration items
- Use my smart card
- Use a certificate on this computer
- Use simple certificate selection (recommended)
- Advanced
- Verify the server’s identity by validating the certificate
- Connect to these servers
- Trusted root certification authorities
- View certificate
- Do not prompt user to authorize new servers or trusted certification authorities
- Use a different user name for the connection
- Configure New Certificate Selection configuration items
- Certificate Issuer
- Certificate Issuer list
- Extended Key Usage (EKU)
- All Purpose
- Client Authentication
- Any Purpose
- Remove
- Select EKUs
- Add or Edit EKU
- TTLS configuration items
- Enable Identity Privacy (Windows 8 only)
- Connect to these servers
- Trusted Root Certification Authorities
- Do not prompt user if unable to authorize server
- Select a non-EAP method for authentication
- Automatically use my Windows logon name and password
- Select an EAP method for authentication
- Configure
- EAP-SIM configuration settings
- EAP-AKA configuration settings
- EAP-AKA’ configuration settings
- Additional resources
Extensible Authentication Protocol (EAP) for network access
Applies to: Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 8.1
The Extensible Authentication Protocol (EAP) is an architectural framework that provides extensibility for authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and Point-to-Point Protocol (PPP) connections such as Virtual Private Networking (VPN). EAP is not an authentication method like MS-CHAP v2, but rather a framework on the access client and authentication server that allows networking vendors to develop and easily install new authentication methods known as EAP methods.
Authentication methods
This topic contains configuration information specific to the following authentication methods in EAP. Note that EAP authentication methods that are used within tunneled EAP methods are commonly known as inner methods or EAP types.
Protected EAP (PEAP)
This section contains configuration information for the two default inner EAP methods that are provided with PEAP.
EAP-Transport Layer Security (TLS)
Appearing as Smart Card or other Certificate Properties in the operating system, EAP-TLS can be deployed as an inner method for PEAP or as a standalone EAP method. When it is configured as an inner authentication method, the configuration settings for EAP-TLS are identical to the settings that are used to deploy EAP-TLS as an outer method, except that it is configured to operate within PEAP. For configuration details, see Smart card or other certificate properties configuration items.
EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Secure password EAP-MS-CHAP v2 is an EAP type that can be used with PEAP for password-based network authentication. EAP-MsCHAP v2 can also be used as a standalone method for VPN, but only as a PEAP inner method for wireless.
EAP-Tunneled Transport Layer Security (TTLS)
EAP-Subscriber Identity Module (SIM), EAP-Authentication and Key Agreement (AKA), and EAP-AKA Prime (AKA’)
Enables authentication by using SIM cards, and is implemented when a customer purchases a wireless broadband service plan from a mobile network operator. As part of the plan, the customer commonly receives a wireless profile that is preconfigured for SIM authentication.
This topic provides information about the following:
EAP-TLS, PEAP, and EAP-TTLS
You can access the EAP properties for 802.1X authenticated wired and wireless access in the following ways:
By configuring the Wired Network (IEEE 802.3) Policies and Wireless Network (IEEE 802.11) Policies extensions in Group Policy.
By manually configuring wired or wireless connections on client computers.
You can access the EAP properties for virtual private network (VPN) connections in the following ways:
By using Connection Manager Administration Kit (CMAK) to configure VPN connections.
By manually configuring VPN connections on client computers.
By default, you can configure EAP settings for the following network authentication methods for 802.1X authenticated wired access, 802.1X authenticated wireless access, and VPN:
- Microsoft: Smart card or other certificate (EAP-TLS)
- Microsoft: Protected EAP (PEAP)
- Microsoft: EAP-TTLS
Additionally, the MS-CHAP-V2 network authentication method is available for VPN by default.
Protected EAP Properties configuration settings
This section lists the settings that can be configured for Protected EAP.
Deploying the same type of authentication method for PEAP and EAP creates a security vulnerability. When you deploy both PEAP and EAP (which is not protected), do not use the same authentication type. For example, if you deploy PEAP-TLS, do not also deploy EAP-TLS.
Verify the server’s identity by validating the certificate
This item specifies that the client verifies that server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). The default setting is «enabled.» If you disable this check box, client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.
Connect to these servers
This item allows you to specify the name for Remote Authentication Dial-In User Service (RADIUS) servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one «» in the string specified. For example, you can specify nps.example.com to specify the RADIUS server nps1.example.com or nps2.example.com.
Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
- Wired and wireless = not enabled
- VPN = enabled
Trusted Root Certification Authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and in the user certificate stores. You can specify which trusted root CA certificates supplicants use to determine whether they trust your servers, such as your server running Network Policy Server (NPS) or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.
Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer. If you designate a certificate that is not installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected
Notifications before connecting
This item specifies whether the user is notified if the server name or root certificate is not specified, or whether the server’s identity cannot be verified.
By default, the following options are provided:
Case 1: Do not ask user to authorize new servers or trusted CAs specifies that if:
- The server name is not in the Connect to these servers list
- or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
- or the root certificate is not found on the computer
then the user is not notified, and the connection attempt fails.
Case 2: Tell user if the server name or root certificate is not specified specifies that if:
- The server name is not in the Connect to these servers list
- or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails. In this option, if the root certificate is not present on the computer, the user is not notified, and the connection attempts fails.
Case 3: Tell user if the server’s identity cannot be verified specifies that if:
- The server name is not in the Connect to these servers list
- or the root certificate is found but is not selected in the list of Trusted Root Certification Authorities in PEAP Properties
- or the root certificate is not found on the computer
then the user is prompted whether to accept the root certificate. If the user accepts the certificate, authentication proceeds. If the user rejects the certificate, the connection attempt fails.
Select authentication method
This item allows you to select the EAP type to use with PEAP for network authentication. By default, two EAP types are available, Secure password (EAP-MSCHAP v2) and Smart card or other certificate (EAP-TLS). However, EAP is a flexible protocol that allows inclusion of additional EAP methods, and it is not restricted to these two types.
For more information, see:
Default = Secure password (EAP-MSCHAP v2)
Configure
This item provides access to property settings for the specified EAP type.
Enable fast reconnect
Enables the ability to create a new or refreshed security association more efficiently or in a smaller number of round-trips, in the case where a security association was previously established.
For VPN connections, Fast Reconnect uses IKEv2 technology to provide seamless and consistent VPN connectivity, when users temporarily lose their Internet connections. Users who connect by using wireless mobile broadband will benefit most from this capability.
An example of this benefit is a common scenario in which a user is traveling on a train, uses a wireless mobile broadband card to connect to the Internet, and then establishes a VPN connection to the corporate network.
As the train passes through a tunnel, the Internet connection is lost. When the train is outside the tunnel, the wireless mobile broadband card automatically reconnects to the Internet.
Fast Reconnect automatically re-establishes active VPN connections when internet connectivity is re-established. Although the reconnection might take several seconds to occur, it is performed transparently to users.
Enforce network access protection
This item specifies that before connections to a network are permitted, system health checks are performed on EAP supplicants to determine if they meet system health requirements.
Default = not enabled
Disconnect if server does not present cryptobinding TLV
This item specifies that connecting clients must end the network authentication process if the RADIUS server does not present cryptobinding Type-Length-Value (TLV). Cryptobinding TLV increases the security of the TLS tunnel in PEAP by combining the inner method and the outer method authentications together so that attackers cannot perform man-in-the-middle attacks by redirecting an MS-CHAP v2 authentication by using the PEAP channel.
Default = not enabled
Enable identity privacy (Windows 8 only)
Specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy and then type “guest” as the anonymous identity value, the identity response for a user with identity alice@example is guest@example. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example is @example.
This setting applies only to computers running Windows 8 and earlier.
Default = not enabled
Secure password properties configuration items
Checking Automatically use my Windows logon name and password (and domain if any) specifies that the current user-based Windows sign in name and password are used as network authentication credentials.
- Wired and wireless = enabled
- VPN = not enabled
Smart card or other certificate properties configuration items
This section lists the items that can be configured for EAP-TLS.
Use my smart card
This item specifies that clients making authentication requests must present a smart card certificate for network authentication.
- Wired and wireless = not enabled
- VPN = enabled
Use a certificate on this computer
This item specifies that authenticating clients must use a certificate located in the Current User or Local Computer certificate stores.
- Wired and wireless = enabled
- VPN = not enabled
Use simple certificate selection (recommended)
This item specifies whether Windows filters out certificates that are unlikely to meet authentication requirements. This serves to limit the list of available certificates when prompting the user to select a certificate.
- Wired and wireless = enabled
- VPN = not enabled
Advanced
This item opens the Configure Certificate Selection dialog box. For more information about Configure Certificate Selection, see Configure New Certificate Selection configuration items.
Verify the server’s identity by validating the certificate
This item specifies that the client verifies that the server certificates presented to the client computer have the correct signatures, have not expired, and were issued by a trusted root certification authority (CA). Do not disable this check box or client computers cannot verify the identity of your servers during the authentication process. If server authentication does not occur, users are exposed to severe security risks, including the possibility that users might unknowingly connect to a rogue network.
Connect to these servers
This item allows you to specify the name for RADIUS servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name, but to differentiate a regular expression with the literal string, you must use at least one «» in the string that is specified. For example, you can specify nps.example.com to specify the RADIUS server nps1.example.com or nps2.example.com.
Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
- Wired and wireless = not enabled
- VPN = enabled
Trusted root certification authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.
If you designate a certificate that is not installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected.
View certificate
This item enables you to view the properties of the selected certificate.
Do not prompt user to authorize new servers or trusted certification authorities
This item prevents the user from being prompted to trust a server certificate if that certificate is incorrectly configured, is not already trusted, or both (if enabled). It is recommended that you select this check box to simplify the user experience and to prevent users from inadvertently choosing to trust a server that is deployed by an attacker.
Default = not enabled
Use a different user name for the connection
This item specifies whether to use a user name for authentication that is different from the user name in the certificate.
Default = not enabled
Configure New Certificate Selection configuration items
Use New Certificate Selection to configure the criteria that client computers use to automatically select the right certificate on the client computer for the purpose of authentication. When the configuration is provided to network client computers through the Wired Network (IEEE 802.3) Policies, the Wireless Network (IEEE 802.11) Policies, or through Connection Manager Administration Kit (CMAK) for VPN, clients are automatically provisioned with the specified authentication criteria.
This section lists the configuration items for New Certificate Selection, along with a description of each.
Certificate Issuer
This item specifies whether Certificate Issuer filtering is enabled.
Default = not selected
Certificate Issuer list
Used to specify one or multiple certificate issuers for the certificates.
Lists the names of all of the issuers for which corresponding certification authority (CA) certificates are present in the Trusted Root Certification Authorities or Intermediate Certification Authorities certificate store of local computer account.
Includes all the root certification authorities and intermediate certification authorities.
Contains only those issuers for which there are corresponding valid certificates that are present on the computer (for example, certificates that are not expired or not revoked).
The final list of certificates that are allowed for authentication contains only those certificates that were issued by any of the issuers selected in this list.
Default = none selected
Extended Key Usage (EKU)
You can select All Purpose, Client Authentication, Any Purpose, or any combination of these. Specifies that when a combination is selected, all the certificates satisfying at least one of the three conditions are considered valid certificates for the purpose of authenticating the client to the server. If EKU filtering is enabled, one of the choices must be selected; otherwise, the OK command control is disabled.
Default = not enabled
All Purpose
When selected, this item specifies that certificates having the All Purpose EKU are considered valid certificates for the purpose of authenticating the client to the server.
Default = selected when Extended Key Usage (EKU) is selected
Client Authentication
When selected, this item specifies that certificates having the Client Authentication EKU, and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server.
Default = selected when Extended Key Usage (EKU) is selected
Any Purpose
When selected, this item specifies that all certificates having Any Purpose EKU and the specified list of EKUs are considered valid certificates for the purpose of authenticating the client to the server.
Default = selected when Extended Key Usage (EKU) is selected
This item opens the Select EKUs dialog box, which enables you to add standard, custom, or vendor-specific EKUs to the Client Authentication or Any Purpose list.
Default = no EKUs listed
Remove
This item removes the selected EKU from the Client Authentication or Any Purpose list.
When both Certificate Issuer and Extended Key Usage (EKU) are enabled, only those certificates that satisfy both conditions are considered valid for the purpose of authenticating the client to the server.
Select EKUs
You can select an EKU from the list provided, or add a new EKU.
Item | Details |
---|---|
Add | Opens the Add or Edit EKU dialog box, which enables you to define and add custom EKUs. In Select the EKUs from the list below, select an EKU in the list, and then click OK to add that EKU to the Client Authentication or the Any Purpose list. |
Edit | Opens the Add or Edit EKU dialog box, and enables you to edit custom EKUs that you have added. You cannot edit the default, predefined EKUs. |
Remove | Removes the selected custom EKU from the list of EKUs in the Select EKUs dialog box. You cannot remove the default, predefined EKUs. |
Add or Edit EKU
Item | Details |
---|---|
Enter the name of the EKU | Provides a place to type the name of the custom EKU. |
Enter the EKU OID | Provides a place to type the OID for the EKU. Only numeric digits, separators, and “.” are allowed. Wild cards are permitted, in which case all of the child OIDs in the hierarchy are allowed. For example, entering 1.3.6.1.4.1.311.* allows 1.3.6.1.4.1.311.42 and 1.3.6.1.4.1.311.42.2.1 |
TTLS configuration items
EAP-TTLS is a standards-based EAP tunneling method that supports mutual authentication and provides a secure tunnel for client inclusion authentication by using EAP methods and other legacy protocols. The addition of EAP-TTLS in Windows Server 2012 provides only client-side support, for the purpose of supporting interoperation with the most commonly-deployed RADIUS servers that support EAP-TTLS.
This section lists the items that can be configured for EAP-TTLS.
Enable Identity Privacy (Windows 8 only)
This item specifies that clients are configured so that they cannot send their identity before the client has authenticated the RADIUS server, and optionally, provides a place to type an anonymous identity value. For example, if you select Enable Identity Privacy, and then type “guest” as the anonymous identity value, the identity response for a user with identity alice@example is guest@example. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response for the user alice@example is @example.
This setting applies only to computers running Windows 8.
Default = not enabled
Connect to these servers
This item enables you to specify the name for RADIUS servers that provide network authentication and authorization. Note that you must type the name exactly as it appears in the Subject field of each RADIUS server certificate, or use regular expressions to specify the server name. The complete syntax of the regular expression can be used to specify the server name. But to differentiate a regular expression with the literal string, you must use at least one * in the string specified. For example, you can specify nps*.example.com to specify the RADIUS server nps1.example.com or nps2.example.com. Even if no RADIUS servers are specified, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
Trusted Root Certification Authorities
This item lists the trusted root certification authorities. The list is built from the trusted root CAs that are installed in the computer and user certificate stores. You can specify which trusted root CA certificates that supplicants use to determine whether they trust your servers, such as your server running NPS or your provisioning server. If no trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by an installed trusted root CA. If one or multiple trusted root CAs are selected, the 802.1X client verifies that the computer certificate of the RADIUS server was issued by a selected trusted root CA. Even if no trusted root CAs are selected, the client will verify that the RADIUS server certificate was issued by a trusted root CA.
If you have a public key infrastructure (PKI) on your network, and you use your CA to issue certificates to your RADIUS servers, your CA certificate is automatically added to the list of trusted root CAs. If selected, your root CA certificate is installed on a client computer when the computers are joined to the domain.
You can also purchase a CA certificate from a non-Microsoft vendor. Some non-Microsoft trusted root CAs provide software with your purchased certificate that automatically installs the purchased certificate into the Trusted Root Certification Authorities certificate store. In this case, the trusted root CA automatically appears in the list of trusted root CAs.
Do not specify a trusted root CA certificate that is not already listed in client computers’ Trusted Root Certification Authorities certificate stores for Current User and Local Computer.
If you designate a certificate that is not installed on client computers, authentication will fail.
Default = not enabled, no trusted root CAs selected
Do not prompt user if unable to authorize server
This item specifies (when not selected) that if server certificate validation fails due to any of the following reasons, the user is prompted to accept or reject the server:
- A root certificate for the server certificate is not found or not selected in the Trusted Root Certification Authorities list.
- One or more of the intermediate root certificates in the certificate chain is not found.
- The subject name in the server certificate does not match any of the servers that are specified in the Connect to these servers list.
Default = not selected
Select a non-EAP method for authentication
Specifies whether a non-EAP or an EAP type is used for authentication. If Select a non-EAP method for authentication is selected, then Select an EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, the following non-EAP authentication types are provided in the drop-down list:
- Select a non-EAP method for authentication = enabled
- Non-EAP type = PAP
Automatically use my Windows logon name and password
When enabled, this item uses Windows sign in credentials. This check-box is enabled only if MS-CHAP v2 is selected in the Select a non-EAP method for authentication drop-down list. Automatically use my Windows logon name and password is disabled for PAP, CHAP, and MS-CHAP authentication types.
Select an EAP method for authentication
This item specifies whether an EAP type or a non-EAP type is used for authentication. If Select an EAP method for authentication is selected, then Select a non-EAP method for authentication is disabled. If Select a non-EAP method for authentication is selected, by default, the following non-EAP authentication types are provided in the drop-down list:
Microsoft: Smart Card or other Certificate
Microsoft: MS-CHAP v2
The Select an EAP method for authentication drop-down list will enumerate all the EAP methods that are installed on the server, except for PEAP and FAST tunnel methods. The EAP types are listed in the order that they are discovered by the computer.
Configure
Opens the properties dialog box of the specified EAP type. For details about the default EAP types, see Smart card or other certificate properties configuration items or Secure password (EAP-MSCHAP v2) properties configuration items.
EAP-SIM configuration settings
EAP Subscriber Identity Module (SIM) is used for authentication and session key distribution for the Global System for Mobile Communications (GSM). EAP-SIM is defined in RFC 4186.
The following table lists the configuration settings for EAP-SIM.
Item | Description |
---|---|
Use strong Cipher keys | Specifies that if selected, the profile uses strong encryption. |
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name |
EAP-AKA configuration settings
EAP Authentication and Key Agreement (AKA) for Universal Mobile Telecommunications System (UMTS) is used for authentication and session key distribution by using the UMTS Universal Subscriber Identity Module (USIM). EAP AKA is defined in RFC 4187.
The following table lists the configuration settings for EAP-AKA.
Item | Description |
---|---|
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name. |
EAP-AKA’ configuration settings
EAP- AKA Prime (AKA’) is a modified version of EAP-AKA that is used to enable access to the 3rd-Generation Partnership Project (3GPP)-based networks by using non-3GPP standards, such as:
WiFi — sometimes referred to as wireless fidelity
Evolution-Data Optimized (EVDO)
Worldwide Interoperability for Microwave Access (WiMax)
EAP-AKA’ is defined in RFC 5448.
The following table lists the configuration settings for EAP-AKA’.
Item | Description |
---|---|
Do not reveal real identity to server when pseudonym identity is available | When enabled, forces the client to fail the authentication if server requests for permanent identity though the client have a pseudonym identity with it. Pseudonym identities are used for identity privacy so that the actual or permanent identity of a user is not revealed during authentication. |
Enable usage of realms | Provides a place to type the realm name. If this field is left blank with Enable usage of realms selected, the realm is derived from the International Mobile Subscriber Identity (IMSI) using the realm 3gpp.org, as described in the 3rd Generation Partnership Project (3GPP) standard 23.003 V6.8.0. |
Specify a realm | Provides a place to type the realm name. |
Ignore network name mismatch | The client compares the name of network known to it, with the name sent by the RADIUS server during authentication. If there is mismatch, it is ignored if this option is selected. If not selected, authentication fails. |
Enable Fast Reauthentication | Specifies that fast reauthentication is enabled. Fast Reauthentication is useful when SIM authentication happens frequently. The encryption keys that are derived from full authentication are reused. As a result, the SIM algorithm is not required to run for every authentication attempt, and the number of network operations that result from frequent authentication attempts is reduced. |
Additional resources
For additional information about authenticated wireless settings in Group Policy, see Managing the New Wireless Network (IEEE 802.11) Policies Settings
For additional information about authenticated wired settings in Group Policy, see Managing the New Wired Network (IEEE 802.3) Policies Settings
For information about advanced settings for authenticated wired access and authenticated wireless access, see Advanced Security Settings for Wired and Wireless Network Policies.