Using EAPHost
This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.
| Topic | Description |
|---|---|
| Configuring Registry Values for EAP Methods | Describes the registry values required for EAP peer methods and EAP authentication methods. |
| Enabling EAPHost Tracing | Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions. |
| Implementing the EAPHost LEAP Mechanism | Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows. |
| Installing an EAP Method | Details how to install a custom implementation of an EAP peer or authenticator method. |
| SSO and PLAP | Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience. |
Community Additions
ADD
Show: