The method for roaming in a network environment utilizes a token created
by a first bridge device. The token comprises an identity of a context
associated with the mobile device. The first bridge device creates the
token and securely provides it to the mobile device. When the mobile
device roams to a second bridge device in the network, the token is
securely provided to the second bridge device. The second bridge device
uses the token to establish to the first bridge device that it is a
genuine agent of the mobile device. Once the first bridge authenticates
the second bridge device's authority, it securely sends the context
associated with the mobile device to the second bridge device. The second
bridge device uses the context to properly connect the mobile device to
the network. In this manner, secure roaming within a bridged network is
provided.