Lines Matching full:phase
12 # [2] flag in the end of the line can be used to mark users for tunneled phase
14 # identity can be used in the unencrypted phase 1 and the real user identity
15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
16 # access is needed, two user entries is needed, one for phase 1 and another
17 # with the same username for phase 2.
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
28 # first matching entry is selected, so * should be used as the last phase 1
34 # is only allowed for phase 1 identities.
41 # version based on the Phase 1 identity. Without this flag, the EAP
58 # Phase 1 users
85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2