EAP

Authentication & Authorization 🔐 • Protocols 🔗 • Network Security 🌐 • Sec+ Glossary 📖 Difficulty: premium

What is EAP?

EAP, or Extensible Authentication Protocol, is a framework that supports multiple authentication methods for controlling access to networks, especially in 802.1X, wireless, and remote access environments.

Examples

  • A company uses EAP-TLS on corporate Wi-Fi so employee laptops must present valid certificates before connecting.
  • A university wireless network uses an EAP-based login process tied to student accounts and a central authentication server.

Discover 🔎

A secure network should not let every device connect freely. Before a user or device is trusted, the network needs a way to ask, “Who are you, and how can you prove it?” EAP exists to support that process. It is widely used anywhere organizations want stronger control over who joins a network.

What makes EAP important is that it is flexible. Different organizations have different needs. Some prefer certificates, some rely on usernames and passwords, and some need methods that work well with existing identity systems. EAP gives them a common structure for authentication without forcing every environment to use the same exact method.

Remember: EAP is not one single login method. It is a framework that allows different authentication methods to be used in a consistent way.

Summary 📝

EAP is a flexible authentication framework used to control access to networks. Its main value is that it supports different authentication methods while giving organizations a consistent structure for secure access decisions. In practice, it plays a major role in enterprise wireless, 802.1X, and remote access security.

Open the interactive lesson Browse more topics

Tip: The interactive version includes progress tracking, decks, and premium deep dives.