CHAPTER 19Implementing 802.1X Authentication Solutions

In this chapter, you will

• Review authentication systems

• Understand the 802.1X/EAP solutions for wireless networks

• Discover the different EAP types and their features and attributes

One of the important components of a security strategy is an identity management system. An identity management system provides a storage location for identity objects, usually called user accounts, and one or more methods for connecting to the storage location and proving identity ownership—a process known as authentication. User accounts are objects that identify and are owned by users. These objects provide properties for use by authentication systems and network operating systems. In addition to user ...

Get CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.