{"id":1212,"date":"2026-04-13T21:01:09","date_gmt":"2026-04-14T01:01:09","guid":{"rendered":"https:\/\/casioaktech.com\/?p=1212"},"modified":"2026-04-14T14:06:41","modified_gmt":"2026-04-14T18:06:41","slug":"extensible-authentication-protocol-eap-quick-reference-guide","status":"publish","type":"post","link":"https:\/\/casioaktech.com\/index.php\/2026\/04\/13\/extensible-authentication-protocol-eap-quick-reference-guide\/","title":{"rendered":"Extensible Authentication Protocol (EAP) Quick Reference Guide"},"content":{"rendered":"\n<p>In this guide I want to break down the different Extensible Authentication Protocol (EAP) methods, and their use cases. This guide isn&#8217;t a deep dive into the framework itself, but rather a quick way to understand which method best fits your current situation. Let&#8217;s have a quick introduction to the protocol.<br><br><br><strong>Extensible Authentication Protocol<\/strong><br><br>EAP is a framework of the authentication process, it allows the authentication server to select an authentication method supported by the <em>Supplicant<\/em>. This includes transporting the challenges, responses, and messages, which may include or protect credentials depending on the method used.<\/p>\n\n\n\n<p><br>The supplicant is client software running on a device that provides user or device credentials, this may be built into the operating system itself, or 3rd party. The authentication server is most commonly a Remote Authentication Dial-In User Service (RADIUS) server. A RADIUS server is used for Authentication, Authorization, and Accounting (AAA).<br><br><strong><em>Authentication<\/em><\/strong> &#8211; Confirms who the device\/user is using a username\/password or certificate. <br><em><strong>Authorization<\/strong><\/em> &#8211; Determines what that device\/user can access.<br><em><strong>Accounting<\/strong><\/em> &#8211; Logging\/Tracking activity (logon\/logoff times, duration, etc.) <br> <br> EAP does <em><strong><span style=\"text-decoration: underline;\">NOT<\/span><\/strong><\/em> verify the identity of the supplicant. The authentication is completed through one of the methods carried inside this protocol. The goal of this guide is to help you understand which best fits different situations, and the pros and cons of the most widely adopted methods. <br><\/p>\n\n\n\n<p><br><em>***I won&#8217;t go into much detail to avoid confusion with terms, But it is important to note that the Supplicant does not communicate directly to the authentication server. These messages are relayed by the <strong>Authenticator<\/strong> at layer 2 such as a switch or access point using Extensible Authentication Protocol over LAN (EAPoL) over both wired and wireless networks. These messages are then forwarded to the authentication server using RADIUS at layer 3.***<\/em><br><br><em>DISCLAIMER: <strong>This is <span style=\"text-decoration: underline;\">NOT<\/span> a complete list of all EAP methods!!!<\/strong><\/em><\/p>\n\n\n\n<p><strong>Common EAP Methods<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">EAP-TLS (Transport Layer Security)<\/h2>\n\n\n\n<p>This method uses two certificates, one for the supplicant, the other for the authentication server; both of which need to be valid and trusted.  <br>This is the most secure method in common use today as it uses TLS to create an encrypted tunnel and removes the need for username\/password authentication used in other methods like (PEAP &amp; EAP-TTLS) altogether.  <\/p>\n\n\n\n<p><br><em>Why would you want to use a certificate instead of a password?<\/em><\/p>\n\n\n\n<p>Stubby Answer: To reduce the available attack surface.<\/p>\n\n\n\n<p>Not So Stubby Answer:  Even though TLS creates an encrypted tunnel, password-based authentication methods still rely on shared secrets and credential-derived exchanges.  Even when this data is encrypted there are still ways of capturing the authentication exchange with Man in the Middle or On Path attacks.  This occurs when sensitive data between two devices is intercepted in the middle, captured and sent on as if nothing has happened.<br>Your next thought might be.. &#8220;Why is this a big deal?  Isn&#8217;t the data encrypted with TLS?&#8221; <\/p>\n\n\n\n<p>Yes it is. However the attacker now has a copy of the authentication exchange. This can then be subjected to offline brute-force or dictionary attacks using commonly available tools such as Hashcat or John the Ripper. <br>This risk is especially relevant if the client does not properly validate the authentication server\u2019s certificate, allowing an attacker to impersonate a legitimate network.<br>EAP-TLS eliminates this concern by not relying on password based authentication at all with the use of a certificate to authenticate the supplicant.<br><br> This is by far the most secure EAP method in use today; and should be your first choice if adoption is possible in your environment.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"705\" height=\"355\" src=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman.jpg\" alt=\"\" class=\"wp-image-1214\" srcset=\"https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman.jpg 705w, https:\/\/casioaktech.com\/wp-content\/uploads\/2026\/04\/EAP-TLS-Spiderman-300x151.jpg 300w\" sizes=\"(max-width: 705px) 100vw, 705px\" \/><\/figure>\n\n\n\n<p><br><br>The increased security comes at a significant cost though; This means every device you want to access your network will need a certificate issued to it. This can be a challenge to implement when you have thousands of devices. This can be managed with your preferred Mobile Device Management (MDM) software for your Microsoft, Apple, and Google devices. I won&#8217;t get into specific MDM tools in this article for brevity; But the key to making this method viable is a centralized tool that allows you to install valid certificates on the supplicant devices. <br>Although being able to deploy a certificate to your favorite WiFi enabled smart toilets, or Becky from finance&#8217;s macbook she got for Christmas last year isn&#8217;t exactly an easy process without centralized management tools.<br><br>What is EAP-TLS not ideal for?<br><br>Internet of Things (IoT) devices like your smart toilet that often lack good security practices; and likely won&#8217;t even support this method of authentication. <br>Bring Your Own Devices (BYOD) such as personal laptops, smartphones, tablets, etc. People don&#8217;t appreciate the IT department touching their personal devices; and it is not an effective use of IT resources.<\/p>\n\n\n\n<p><strong>Primary Use Case:<\/strong><br>Centrally managed devices that support supplicant certificates.<br>Windows PCs, Apple devices &amp; Chromebooks<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Pros<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The highest level of security in common use<\/li>\n\n\n\n<li>Reduced attack surface due to supplicant certificates<\/li>\n\n\n\n<li>Zero-Trust Friendly<\/li>\n\n\n\n<li>I used a spiderman meme<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Cons<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Can involve complex PKI setup<\/li>\n\n\n\n<li>Deploying\/Managing certificates<\/li>\n\n\n\n<li>Lack of support from most IoT devices<\/li>\n\n\n\n<li>BYOD complications<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>EAP-TTLS (Tunneled Transport Layer Security)<\/h2>\n\n\n\n<p>Similar to EAP-TLS the authentication server will need a valid certificate; but this time the supplicant will not. The use of this server certificate is to create a TLS tunnel, inside the tunnel the client will authenticate with another method (PAP, CHAP, MS-CHAPV2) <em>(These are the most common, but there are more).<\/em> <\/p>\n\n\n\n<p>This method is great for compatibility with many devices, including Android and Linux, which have native support built into their operating systems.<br>Now we don&#8217;t have to deploy all of these certificates to our IoT devices.<\/p>\n\n\n\n<p>One downside with this is the use of passwords to authenticate in the inner method; this can open up room for attacks I mentioned in the previous section. This method with MSCHAPv2 is a compatibility concern for devices with Credential Guard enabled by default with the release of Windows 11 (22H2 and later).<br><br><strong><em>What is Credential Guard, and why does it break certain EAP methods that rely on MSCHAPv2?<\/em><\/strong><\/p>\n\n\n\n<p>Credential Guard is a security feature in Windows that uses virtualization based security to isolate and protect user credentials. It prevents sensitive information which in this case is password hashes &amp; other credential material from being accessed or extracted by other processes. EAP-TTLS &amp; PEAP both rely on password based mechanisms (when using protocols like MS-CHAPv2) to authenticate the supplicant. Credential Guard is doing exactly what it is supposed to do (protect credentials), even if that means breaking older authentication methods that depend on access to them.<br><\/p>\n\n\n\n<p>As much as I would love to complain about the many hours of headaches that Credential Guard has caused myself and others throughout the years, I feel that it would be unjustified. At the end of the day, it is a great step forward for the security of devices. <br>MS-CHAPv2 was released in 1999, and the NTLM hashes it depends on are several years older. To say that the security landscape has changed significantly since then would be an understatement. <br><br><strong><em>***This only applies when EAP-TTLS is configured with MSCHAPv2; other inner authentication methods may not be affected.<\/em>***<\/strong><br>(<em>More information available here: <\/em><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/credential-guard\/\">https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/credential-guard\/<\/a>)<\/p>\n\n\n\n<p><strong><strong>Primary Use Case:<\/strong><br><\/strong>BYOD<br>Android, Apple &amp; Linux devices that are not centrally managed<br>IoT<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Pros<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ease of setup<\/li>\n\n\n\n<li>Secured with TLS<\/li>\n\n\n\n<li>Android &amp; Linux compatibility<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Cons<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Password attacks still possible if the inner method is weak<\/li>\n\n\n\n<li>Credential Guard Compatibility<\/li>\n\n\n\n<li>Not Zero-Trust Friendly<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>PEAP (Protected Extensible Authentication Protocol)<\/h2>\n\n\n\n<p>Like EAP-TTLS, PEAP will create a TLS encrypted tunnel utilizing a server certificate on the authentication server. Again, with this method you will also not require a certificate on your supplicant; and the user is authenticated inside the tunnel using a username\/password. On the surface this seems to be the same thing as the last method we discussed, but there is an important difference. Unlike the granularity provided with the inner protocols of the last method, PEAP almost exclusively uses MS-CHAPv2. This method sees heavy adoption in Windows Active Directory (AD) environments.<br><br><em>***For accuracy I will mention that this method can also utilize Generic Token Card (EAP-GTC). A method that utilizes token based authentication such as one-time passwords or hardware tokens; but the adoption of this method is far less common<\/em>.***<br><br><br>This does mean that this method carries the same risk for attacks as EAP-TTLS if server certificate validation isn&#8217;t enforced; and faces the same compatibility complications with Credential Guard on Windows devices.<\/p>\n\n\n\n<p><br><strong>Primary Use Case:<\/strong><br>Windows PCs in legacy Active Directory environments<br>Supplicant devices that still support MS-CHAPv2<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Pros<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Works great with Active Directory<\/li>\n\n\n\n<li>Secured with TLS<\/li>\n\n\n\n<li>No Supplicant Certificates Necessary<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Cons<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Password attacks still possible if the inner method is weak<\/li>\n\n\n\n<li>Credential Guard Compatibility<\/li>\n\n\n\n<li>Not Zero-Trust Friendly<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>EAP-FAST (Cisco)<\/h2>\n\n\n\n<p>EAP-FAST is a Cisco designed method that works similar to both the previous methods by creating a tunnel; But differs in its use of a shared secret called a Protected Access Credential (PAC), which replaces the need for traditional certificate based trust. Although in more secure deployments, certificates may still be used during PAC provisioning to prevent man in the middle attacks.<br>The process uses three phases to complete authentication, starting with Phase 0.<\/p>\n\n\n\n<p><strong>Phase 0:<\/strong> PAC provisioning; The supplicant device receives a PAC from the authentication server. This can be configured to occur automatically, Or the file can be pre installed on the supplicant.<br><br><strong>Phase 1: <\/strong>TLS tunnel establishment; A TLS tunnel is constructed using the PAC from phase 0. <br><br><strong>Phase 2: <\/strong>Inner authentication; Authentication is completed using MS-CHAPv2 or EAP-GTC.  <br><br><strong>Why EAP-FAST?<\/strong><br>It was designed as a middle ground between the strong security of EAP-TLS and the easier deployment of PEAP\/EAP-TTLS, replacing certificates with PACs while still using tunneled authentication.  In practice it solved a very specific problem, reducing PKI &amp; certificate overhead.  <br><br><strong>Why not?<\/strong><br>Unfortunately this method inherits the same limitations as the other tunneled password based methods if secure certificate authentication is not used for PAC provisioning.<br><\/p>\n\n\n\n<p><strong>Primary Use Case:<\/strong><br>Enterprise Cisco environments<br>Any supplicant device that supports a PAC<br><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Pros<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>No PKI &amp; Certificate overhead is optional due to PAC<\/li>\n\n\n\n<li>PAC reuse allows quick reconnects<\/li>\n\n\n\n<li>Secured with TLS<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Cons<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cisco centric design, Limited adoption from outside vendors<\/li>\n\n\n\n<li>Credential Guard Compatibility<\/li>\n\n\n\n<li>Password attacks still possible if the inner method is weak<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><br><strong>TLDR:<\/strong><\/p>\n\n\n\n<p>If you can deploy certificates: EAP-TLS<br>If you can\u2019t and need flexibility: EAP-TTLS<br>If you\u2019re still in a Windows heavy legacy environment, and can&#8217;t deploy supplicant certificates: PEAP<br>If you\u2019re in a Cisco environment avoiding PKI: EAP-FAST<\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<p><strong>What is next?<\/strong><br><br>You now know the basics of the commonly used EAP methods, Congratulations. However, Authentication is only a small piece of the much larger pie that is securing an enterprise network environment. The reality is that not all devices and users should have or even need the same level of access to the network. Granularity is imperative, and manually assigning access to every resource or VLAN is not realistic in an environment with thousands of devices &amp; users. Network Access Control (NAC)is the next step in this adventure. There are several flavors of NAC out there, and this is a rabbit hole I&#8217;ll be jumping down in another post if people find this guide helpful. <br><br><br><strong>Additional Resources<\/strong><br><br>I tried to keep this guide vendor neutral to help people learn the basics. However, I want to give some helpful links to more vendor specific resources soon. I&#8217;m thankful to the time others with far more in depth knowledge on this subject spent helping me keep things accurate and informative. <br><br><br><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guide I want to break down the different Extensible Authentication Protocol (EAP) methods, and their use cases. This guide isn&#8217;t a deep dive into the framework itself, but rather a quick way to understand which method best fits your current situation. Let&#8217;s have a quick introduction to the protocol. Extensible Authentication Protocol EAP [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4,16,6],"tags":[],"class_list":["post-1212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-guides","category-study"],"acf":[],"_links":{"self":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/posts\/1212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/comments?post=1212"}],"version-history":[{"count":7,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/posts\/1212\/revisions"}],"predecessor-version":[{"id":1232,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/posts\/1212\/revisions\/1232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/media\/1217"}],"wp:attachment":[{"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/media?parent=1212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/categories?post=1212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/casioaktech.com\/index.php\/wp-json\/wp\/v2\/tags?post=1212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}