Mike,

I have been following the Kerberos discussion for a while and 
this was exactly wat I was thinking.

But where to start? What is required for Kerberos authentication? 

Tom

> -----Original Message-----
> From: Michael Griego [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, April 07, 2004 8:02 PM
> To: [EMAIL PROTECTED]
> Subject: RE: PEAP w/MS-CHAPv2:: Wireless Authentication against
> WindowsAD as user profile storage
> 
> 
> On Wed, 2004-04-07 at 11:57, Steve OBrien wrote:
> > Does anyone know if you can use Kerberos for user authentication for
> > PEAP?
> 
> Not unless there's an EAP-Kerberos (EAP-KRB?) to be used for the
> inside-tunnel authentication.  I, however, never heard of any 
> work being
> done on an EAP-Kerberos method.  Perhaps you could start your 
> own draft
> with the IETF? :)
> 
> -- 
> 
> --Mike
> 
> -----------------------------------
> Michael Griego
> Wireless LAN Project Manager
> The University of Texas at Dallas
> 
> 
> 
> - 
> List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> 

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to