Reference Guide to EAP TLS 1.2
In this session, we will go into the EAP-TLS 1.2process and learn to understand what happens during the EAP-TLS setup, certificate exchange, key exchange, and the mutual authentication process, which leads to authentication of both the server and the client and derivation of the PMKused in the 4-way handshake. We will look at how the server and the client validate the received certificates, how the pre-master secret is derived and further derived to master-secret and MSK, and how signature algorithms is used for authentication with the use of ECDSA and RSA-based certificates.