Lines Matching full:authentication

2 	  Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
109 Access Entity, and Authentication Server. Supplicant is a component in
110 a station and it performs the authentication with the Authentication
112 between a Supplicant and an Authentication Server. In addition, it has a
117 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
119 (EAPOL) and the Authenticator relays these frames to the Authentication
120 Server (and similarly, relays the messages from the Authentication
121 Server to the Supplicant). The Authentication Server can be colocated with the
124 use an external Authentication Server and encapsulate EAP frame in the
140 Authentication Server. hostapd supports RADIUS encapsulation of EAP
141 packets, so the Authentication Server should be a RADIUS server, like
143 relays the frames between the Supplicant and the Authentication
149 will first perform IEEE 802.11 authentication. This is normally done
150 with open systems authentication, so there is no security. After
155 with the Authentication Server. After this is completed successfully,
174 used to test IEEE 802.1X authentication. However, it should not be
179 An external Authentication Server (RADIUS) is configured with
182 configuration, the co-located Authentication Server is not used and EAP
185 the Authentication Server. Other than this, the functionality is similar
186 to the case with the co-located Authentication Server.
188 Authentication Server
192 Authentication Server with hostapd Authenticator. FreeRADIUS
222 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
224 - RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication
252 protection, and non-keyed authentication does not protect against bit
260 keyed packet authentication mechanism (Michael MIC).
263 an external authentication server (e.g., RADIUS) and EAP just like
287 messages in initial key handshake, pre-authentication, and PMKSA caching).
305 # RADIUS authentication server must be configured, and WPA-EAP must be included
342 # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
344 # authentication and key handshake before actually associating with a new AP.
347 # Space separated list of interfaces from which pre-authentication frames are
352 # pre-authentication is only used with APs other than the currently associated