<DIV>Thanks Jouni for such a quick reply.</DIV>
<DIV> </DIV>
<DIV>For EAP-TLS, I think two certicates are required; one for Server validation and the other one for Client validation. Could you please tell me the steps to generates certificates (both for Server & Client) using the Certificate Service on IAS server?</DIV>
<DIV> </DIV>
<DIV>Thanks & Best Regards,</DIV>
<DIV>JMI<BR><BR><B><I>Jouni Malinen <jkmaline@cc.hut.fi></I></B> wrote:</DIV>
<BLOCKQUOTE class=replbq style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px solid">On Mon, Apr 11, 2005 at 07:08:18AM -0700, J I wrote:<BR><BR>> Is wpa supplicant interoperable with IAS Server for EAP-TLS?<BR><BR>Yes,<BR><BR>> If yes, <BR>> then how is the client certificate loaded in the IAS Server?<BR><BR>It is not; TLS uses CA certificate to verify certificates and client<BR>certificates are not loaded in the authentication server. To be more<BR>exact, the certificate is sent during the EAP-TLS handshake, but that<BR>happens automatically as part of the TLS handshake.<BR><BR>-- <BR>Jouni Malinen PGP id EFC895FA<BR>_______________________________________________<BR>HostAP mailing list<BR>HostAP@shmoo.com<BR>http://lists.shmoo.com/mailman/listinfo/hostap<BR></BLOCKQUOTE><p>__________________________________________________<br>Do You Yahoo!?<br>Tired of spam? Yahoo! Mail has the best spam protection around <br>http://mail.yahoo.com