Using EAPHost
This section describes common programmatic procedures and patterns used in writing applications that call or implement the EAPHost API elements.
Topic | Description |
---|---|
Configuring Registry Values for EAP Methods | Describes the registry values required for EAP peer methods and EAP authentication methods. |
Enabling EAPHost Tracing | Details how to enable trace logs that contain debugging information that includes API calls, internal function calls, and infrastructure state transitions. |
Implementing the EAPHost LEAP Mechanism | Describes the EAPHost mechanism that allows third parties to write LEAP modules for Windows. |
Installing an EAP Method | Details how to install a custom implementation of an EAP peer or authenticator method. |
SSO and PLAP | Explains how the Single-Sign-On (SSO) APIs allow the supplicant to control the user experience. |