A method is disclosed for determining the authentication capabilities of a
supplicant before initiating an authentication conversation with a
client, for example, using Extensible Authentication Protocol (EAP). In
one aspect, the method provides for sending, to a supplicant that is
requesting access to a computer network subject to authentication of a
user of the supplicant, a list of first authentication methods that are
supported by an authentication server; receiving, from the supplicant, a
counter-list of second authentication methods that are supported by the
supplicant; determining how many second authentication methods in the
counter-list match the first authentication methods; and performing an
authentication policy action based on how many of the second
authentication methods match the first authentication methods. Policy
actions can include blocking access, re-directing to sources of
acceptable authentication methods, granting one of several levels of
network access, etc.