Chaining system authentication methods

Sautron Nick sautronnick at yahoo.fr
Wed Jan 28 07:25:32 CET 2015


Hello everyone,

I wonder if it is possible to establish a chaining system authentication methods.
In my case I would need to have the peap method first and then the TTLS method.

example:
- An unauthenticated client
- The server offers to the method peap
- The method is not compatible according to the customer
- The server offers to the TTLS method
- Authenticated Client

Thank you to enlighten me about it
S.Nick



More information about the Freeradius-Users mailing list