A flexible authentication framework utilized for network access control, primarily in wireless networks.
Description
Extensible Authentication Protocol (EAP) is an authentication framework used in network security, particularly in wireless networks and Point-to-Point connections. EAP is not a specific authentication method but rather a protocol that allows various authentication mechanisms to be used in a standardized way. This extensibility makes EAP particularly useful for Non-Human Identities (NHIs), such as devices, sensors, or IoT entities that require secure network access. With the rise of IoT and machine-to-machine communication, ensuring that these non-human entities can authenticate reliably and securely is paramount. EAP supports various authentication methods, including password-based methods, certificate-based authentication, and token-based methods, allowing for adaptability based on the requirements of the NHI. By utilizing EAP, organizations can implement robust access control strategies that accommodate a diverse range of non-human devices while maintaining security and integrity in their network environments.
Examples
- EAP-TLS: An EAP method using Transport Layer Security to provide mutual authentication via digital certificates.
- EAP-PEAP: A method that encapsulates a second EAP exchange within a secure tunnel, often using username/password for authentication.
Additional Information
- EAP is widely used in WPA/WPA2/WPA3 wireless networks for secure authentication.
- The choice of EAP method can significantly impact the security and performance of the network.
References
- RFC 5931 - Extensible Authentication Protocol ... - IETF Datatracker
- The State of Non-Human Identity Security | CSA
- What is a Non-Human Identity? - CyberArk
- A Human's Guide to Non-Human Identities (NHIs) - Aembit
- NHI Characteristics. Non-Human Identities (NHIs)… | Sep, 2024
- Shining the Spotlight on the Rising Risks of Non-Human Identities
- The Complete Guide to the Growing Impact of Non-Human Identities ...
- Security Operations for Non-Human Identities - The Hacker News