Using EAPHost

This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.

Topic Description
Configuring Registry Values for EAP Methods Describes the registry values required for EAP peer methods and EAP authentication methods.
Enabling EAPHost Tracing Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions.
Implementing the EAPHost LEAP Mechanism Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows.
Installing an EAP Method Details how to install a custom implementation of an EAP peer or authenticator method.
SSO and PLAP Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience.