It's not clear to me: Does that mean when deploying 802.1x, we can use EAP-MD5, EAP-TLs, token cards, Kerberors, one-time passwords, or certificates as the authentication method? (Some others even call these "authentication types" and make it even more confusing). Or do EAP-MD5, EAP-TLs, etc. and token cards, Kerberors, etc. actually play different roles in 802.1x and EAP infrastructure?
Please help me to clarify this issue and thanks in advance.
Dig Deeper on Mobile Device Security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.