Supplicant (computer)

But saying "user" or "client" overgeneralizes; in reality, the interaction takes place through a personal computer, an Internet Protocol (IP) phone, or similar network device.

Businesses, campuses, governments and all other social entities across-the-board in need of security may resort to the use of IEEE 802.1X authentication to regulate users access to their corresponding network infrastructure.

And to enable this, client devices need to meet supplicant definition in order to gain access.

For a supplicant-capable device to gain access to the secured resources on a network, some preconditions should be observed and a context that will make this feasible.

[5] This is the most important single step a user will need to make in order for one's network device to act as a supplicant.

IEEE 802.1x network-diagram example. The hub is optional; the supplicant can connect straight to the authenticator itself. In a hub or an unmanaged switch, the uplink port (the port to which the hub is connected) should be set in multi-session mode.
Here is a list of authenticated users as displayed in Linksys LGS528P Switch. In this case, the LGS528P is acting as the Authenticator
This is a screenshot of the Network Interface Card properties window to enable or disable support for IEEE 802.1x authentication. Many other options can be adjusted as seen fit.