Wednesday, December 19, 2007

EPAHost | The Cable Guy: EAPHost in Windows -- TechNet Magazine, May 2007

The Cable Guy: EAPHost in Windows -- TechNet Magazine, May 2007
When an access client connects to a protected network, it must use a negotiated authentication method to verify itself to an authentication server. For example, the access client and authentication server may agree to use a specific password authentication protocol, such as Microsoft Challenge Handshake Authentication