1 / 7

The Tunneled Extensible Authentication Method (TEAM)

The Tunneled Extensible Authentication Method (TEAM). Glen Zorn Network Zen. TEAM Overview. Derived from Protected Extensible Authentication Protocol (PEAP) Typical TLS-tunneled EAP protocol with a few twists TLVs including vendor-specific TLV support “Built-in” facilities

dustin
Download Presentation

The Tunneled Extensible Authentication Method (TEAM)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Tunneled Extensible Authentication Method (TEAM) Glen Zorn Network Zen

  2. TEAM Overview • Derived from Protected Extensible Authentication Protocol (PEAP) • Typical TLS-tunneled EAP protocol with a few twists • TLVs • including vendor-specific TLV support • “Built-in” facilities • Certificate installation • Plain-text password authentication & change

  3. TEAM Features • Identity protection • Ciphersuite negotiation • Mutual authentication • Replay protection • Integrity protection • Confidentiality • Secure key derivation • Dictionary attack protection

  4. TEAM Features (2) • Fast reauthentication • Cryptographic channel binding • Acknowledged success & failure indications • Session independence • Fragmentation • State synchronization • Secure initial provisioning

  5. TEAM Advantages • The TEAM is unconditionally compliant with the requirements for WLAN authentication mechanisms, as specified in RFC 4017 • As of today, TEAM fulfills 100% of the requirements specified in draft-ietf-emu-eaptunnel-req-08

  6. TEAM Advantages (2) • No issues with backward-compatibility • Zero installed base • No existing implementations • But based upon a widely available code base • Complete IETF change control • No external pressures • Known & understood technology • Secure and robust • Highly flexible

  7. Choose TEAM!

More Related