This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.
|Configuring Registry Values for EAP Methods||Describes the registry values required for EAP peer methods and EAP authentication methods.|
|Enabling EAPHost Tracing||Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions.|
|Implementing the EAPHost LEAP Mechanism||Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows.|
|Installing an EAP Method||Details how to install a custom implementation of an EAP peer or authenticator method.|
|SSO and PLAP||Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience.|