Important:
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
A version of this page is also available for
4/8/2010

Extensible Authentication Protocol (EAP) allows third-party authentication code to interact with the implementation of the Point-to-Point Protocol (PPP) included in Remote Access Service (RAS). EAP is also used with 802.1x (EAP over LAN, EAPOL) authentication.

With EAP, you can add a wide variety of authentication extensions to your OS, and provide a standard support mechanism for authentication schemes such as token cards, Kerberos, public-key, and s-key. EAP is a critical technology for virtual private networks (VPNs) that provide industry-standard security levels. EAP helps to protect VPNs against attacks by unauthorized users, and password guessing.

EAP is only available to application developers when it is included in the OS design.

EAP improves on previous authentication protocols, such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Windows Embedded CE supports most of these earlier authentication protocols, as well.

In This Section

EAP Installation

Provides information about registry settings that the setup software must configure to install the EAP client.

EAP Implementation Details

Provides information about interactions between RAS and EAP.

Configuration User Interface

Provides information about the configuration UI for the client.

Obtaining Identity Information

Provides information about programmatically retrieving identifying information for the user who is requesting authentication.

Interactive User Interface

Provides information about the interactive UI that allows the authentication protocol to obtain additional information from the user as needed during the course of the authentication session.

EAP Authentication Protocols

Provides information about the primary authentication protocols for EAP.

See Also