EAP

Authentication & Authorization 🔐 • Protocols 🔗 • Network Security 🌐 • Security+ 🏆 Difficulty: premium

Definition

EAP, or Extensible Authentication Protocol, is a framework that supports multiple authentication methods for controlling access to networks, especially in 802.1X, wireless, and remote access environments.

Examples

  • A company uses EAP-TLS on corporate Wi-Fi so employee laptops must present valid certificates before connecting.
  • A university wireless network uses an EAP-based login process tied to student accounts and a central authentication server.

Discover 🔎

A secure network should not let every device connect freely. Before a user or device is trusted, the network needs a way to ask, “Who are you, and how can you prove it?” EAP exists to support that process. It is widely used anywhere organizations want stronger control over who joins a network.

What makes EAP important is that it is flexible. Different organizations have different needs. Some prefer certificates, some rely on usernames and passwords, and some need methods that work well with existing identity systems. EAP gives them a common structure for authentication without forcing every environment to use the same exact method.

Remember: EAP is not one single login method. It is a framework that allows different authentication methods to be used in a consistent way.
Open the interactive lesson Browse more topics

Tip: The interactive version includes progress tracking, decks, and premium deep dives.