Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Tunneled Extensible Authentication Method (TEAM)

Similar presentations


Presentation on theme: "The Tunneled Extensible Authentication Method (TEAM)"— Presentation transcript:

1 The Tunneled Extensible Authentication Method (TEAM)
Glen Zorn Network Zen

2 TEAM Overview Derived from Protected Extensible Authentication Protocol (PEAP) Typical TLS-tunneled EAP protocol with a few twists TLVs including vendor-specific TLV support “Built-in” facilities Certificate installation Plain-text password authentication & change

3 TEAM Features Identity protection Ciphersuite negotiation
Mutual authentication Replay protection Integrity protection Confidentiality Secure key derivation Dictionary attack protection

4 TEAM Features (2) Fast reauthentication Cryptographic channel binding
Acknowledged success & failure indications Session independence Fragmentation State synchronization Secure initial provisioning

5 TEAM Advantages The TEAM is unconditionally compliant with the requirements for WLAN authentication mechanisms, as specified in RFC 4017 As of today, TEAM fulfills 100% of the requirements specified in draft-ietf-emu-eaptunnel-req-08

6 TEAM Advantages (2) No issues with backward-compatibility
Zero installed base No existing implementations But based upon a widely available code base Complete IETF change control No external pressures Known & understood technology Secure and robust Highly flexible

7 Choose TEAM!


Download ppt "The Tunneled Extensible Authentication Method (TEAM)"

Similar presentations


Ads by Google