Chaining system authentication methods

Sautron Nick sautronnick at
Wed Jan 28 07:25:32 CET 2015

Hello everyone,

I wonder if it is possible to establish a chaining system authentication methods.
In my case I would need to have the peap method first and then the TTLS method.

- An unauthenticated client
- The server offers to the method peap
- The method is not compatible according to the customer
- The server offers to the TTLS method
- Authenticated Client

Thank you to enlighten me about it

More information about the Freeradius-Users mailing list