Automatically re-authenticating a computing device seeking access to a
network or a resource. A method comprises forwarding a request received
from the computing device to an authentication device to enable the
authentication device to authenticate the computing device using a
full-authentication mechanism. State information related to
authenticating the computing device is created from authenticating the
computing device. The state information is received and stored. For
example, an authenticator device that forwarded the initial
authentication request from the computing device to the authentication
device receives and stores the state information. The computing device is
re-authenticated using the stored state information without again
contacting the authentication device.