Chaining system authentication methods
Sautron Nick
sautronnick at yahoo.fr
Wed Jan 28 07:25:32 CET 2015
Hello everyone,
I wonder if it is possible to establish a chaining system authentication methods.
In my case I would need to have the peap method first and then the TTLS method.
example:
- An unauthenticated client
- The server offers to the method peap
- The method is not compatible according to the customer
- The server offers to the TTLS method
- Authenticated Client
Thank you to enlighten me about it
S.Nick
More information about the Freeradius-Users
mailing list