[smartslider3 slider=”51″]
The captive portal would allow any device to be authenticated and authorized whenever they connect to your internal network.Captive Portals provide an unobtrusive and secure way for you to authenticate users and keep your network secure.A captive portal allows you to redirect a previously unauthorized user to a web based form where they can be authenticated before they are given complete access to your network’s full range of features.
We here at miniOrange pride ourselves for providing the most comprehensive and secure Single Sign On and IDP solutions across the industry. Using this expertise with Authentication, we enhance the typical Captive Portal in its ability to support multiple authentication methods, while still providing the highest levels of security. The entire workflow moves according to the flowchart below:
A large number of varying authentication methods are supported. From OTP over SMS to Active Directory Authentication and many others.
The Captive Portal implementation is made completely secure, to protect your network and users from any malicious actors.
Allows you to authenticate and group users based on existing groups that they may be a part of. While also allowing you to give vaying
You would have the ability to set time limits, setting restrictions on how exactly how long users would have access to the services
Each user’s identity is authenticated through the authentication method set, otherwise the user is barred from accessing the services.
You would als be able to set data limits on the internet activity of each individual user.
The captive portal is presented to the client and is stored either at the gateway or on a web server hosting the web page. After authentication the clients MAC address is stored, as a form of verification.Depending on the feature set of the gateway, websites or TCP ports can be white-listed so that the user would not have to interact with the captive portal in order to use them.
Keeping guests in a separate network group prevents malicious usage of network resources. We help you by creating these separate guest networks with reduced privileges and permissions, helping you keep your internal network secure.
Repeat customers, length of stays, and demographics are all categories of data that can be collected through the captive portal. This would allow your business to collect and analyse a variety of user information as per your needs.
When a user connects to a guest network via the captive portal, they are required to agree to a terms and agreement and an acceptable usage policy. These outline what the user is and is not allowed to do on the network and state that legal repercussions.
[smartslider3 slider=”51″]