It's not clear to me: Does that mean when deploying 802.1x, we can use EAP-MD5, EAP-TLs, token cards, Kerberors,...
one-time passwords, or certificates as the authentication method? (Some others even call these "authentication types" and make it even more confusing). Or do EAP-MD5, EAP-TLs, etc. and token cards, Kerberors, etc. actually play different roles in 802.1x and EAP infrastructure?
Please help me to clarify this issue and thanks in advance.
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.