Back to Search Start Over

Taking the Leap to PEAP for Wireless.

Authors :
Thurman, Mathias
Source :
Computerworld. 11/8/2004, Vol. 38 Issue 45, p46-46. 2/3p.
Publication Year :
2004

Abstract

Access points are proliferating but despite this growth in wireless use there are still no formal policies or standards in place. This article focuses on the deployment of Protected Extensible Authentication Protocol (PEAP) for wireless communications. The deployment of PEAP is considered to be the only way to the only way to make use of existing deployment of RSA SecureID tokens while getting two-factor authentication. With PEAP, the authentication data is transmitted after the encrypted tunnel is created.

Details

Language :
English
ISSN :
00104841
Volume :
38
Issue :
45
Database :
Academic Search Index
Journal :
Computerworld
Publication Type :
Periodical
Accession number :
15278892