Using EAPHost
This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.
Topic | Description |
---|---|
Configuring Registry Values for EAP Methods | Describes the registry values required for EAP peer methods and EAP authentication methods. |
Enabling EAPHost Tracing | Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions. |
Implementing the EAPHost LEAP Mechanism | Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows. |
Installing an EAP Method | Details how to install a custom implementation of an EAP peer or authenticator method. |
SSO and PLAP | Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience. |
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for