对EAP协议中经常出现的几个身份术语也是理解的,但总感觉不能正确对外表达,今天读此文时看到了对这几个常用术语的解释,感觉比较权威,特对此进行注记。
authenticator
The end of the link initiating EAP authentication. The term authenticator is used in [IEEE802.1X], and authenticator has thesame meaning in this document.
鉴权者 发起认证过程的一端
peer
The end of the link that responds to the authenticator. In [IEEE802.1X], this end is known as the supplicant.
对端设备 对鉴权者进行响应的一方
Supplicant
The end of the link that responds to the authenticator in [IEEE802.1X].
这个单词是恳求者祈求者的意思,802.11引其入计算机领域表示对鉴权者请求进行响应的实体,一般指装在peer上的软件。 802.1X中也代指peer。
关于Supplicant (computer)[Wikipedia, the free encyclopedia]的解释[Supplicant]为:
The term supplicant is used in the IEEE 802.1X standard, where the supplicant is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link. In practice, a supplicant is a software application installed on an end-user's computer. The user invokes the supplicant and submits credentials to connect the computer to a secure network. If the authentication is successful, the authenticator typically allows the computer to connect to the network.
supplicant 指位于p2p lan网络中希望得到位于另一端的鉴权者认证的实体。一般指安装在终端用户计算机上的应用程序,用户调用/启动supplicant并提交其用户凭证使其计算机连接到一个安全网络,认证过程中通过选择合适的认证方法,supplicant也可对authenticator进行认证。如果认证通过则鉴权者允许peer接入网络。
backend authentication server
A backend authentication server is an entity that provides an authentication service to an authenticator. When used, this server typically executes EAP methods for the authenticator. This terminology is also used in [IEEE802.1X].
后端鉴权服务器指为鉴权者提供认证服务的实体,该服务器代替鉴权者执行EAP认证。
EAP server
The entity that terminates the EAP authentication method with the peer. In the case where no backend authentication server is used, the EAP server is part of the authenticator. In the case where the authenticator operates in pass-through mode, the EAP server is located on the backend authentication server.
执行EAP认证的两方中的服务一方。对于没有后端鉴权服务器的情况下,EAP Server通常做为鉴权者的一部分,如果鉴权者只充当透传角色,则eap server一般位于backend authentication server内。
Master Session Key (MSK)
Keying material that is derived between the EAP peer and server and exported by the EAP method. The MSK is at least 64 octets in length. In existing implementations, an AAA server acting as an EAP server transports the MSK to the authenticator. Extended Master Session Key (EMSK) Additional keying material derived between the EAP client and server that is exported by the EAP method. The EMSK is at least 64 octets in length. The EMSK is not shared with the authenticator or any other third party. The EMSK is reserved for future uses that are not yet defined.