Overview #
The Self-Provisioning via Email module allows guests and BYOD (Bring Your Own Device) users to securely onboard themselves to the network without IT intervention. By entering their email address and verifying their identity through an email confirmation process, users can gain network access while administrators maintain control over session duration, device quotas, and access policies.
1. User Login Process #
- The user selects the Guest WiFi network.
- They are redirected to the Captive Portal, where they enter their email address.
- Before proceeding, the user must accept the Terms and Conditions and acknowledge the Privacy Policy.
- A temporary access window is granted while a verification email is sent.
- The user must verify their email within 10 minutes by clicking the link in the email.
- Upon successful verification, the user is granted extended access according to the configured access policy settings.
2. Configuration & Customization #
Administrators can configure the Self-Provisioning via Email module through the Admin Portal with the following options:
πΉ Viewing & Managing Email Logins #
π Sign In Administration β Sign In Modules β Self-Provisioning Logins
- View user login history, including timestamps, email verification status, and connected devices.
- Manage active sessions and revoke access when needed.
πΉ Configuring Captive Portal UI & Enabling Marketing Features #
π Sign In Administration β Login Portal β Portal Configurations β Email Access Settings
- Customize the login page text, including instructions and branding.
- Enable newsletter subscription opt-in during login to collect email addresses.
- Export collected emails from the Admin Dashboard for marketing and analytics.
πΉ Configuring Terms and Conditions & Privacy Policy Acceptance #
π Organization β Compliance β Terms and Conditions & Privacy Policy
- Define and update Terms and Conditions and Privacy Policy that users must accept before authentication.
- Ensure compliance with regulatory and corporate policies by enforcing acceptance before granting access.
πΉ Configuring Access Policies #
π Sign In Administration β Access Policies
- Session Duration β Define how long access is granted after verification.
- Device Quotas β Set limits on the number of devices a user can connect with the same email.
- If a user exceeds their device quota, the system automatically disconnects the device that was last seen online and allows the new device to connect.
- Domain Filtering β Restrict access to users from specific organizations (e.g., only corporate email domains).
- Newsletter Subscription β Enable an opt-in checkbox to collect email addresses for marketing purposes.
- Redirection URL β Configure the page users are redirected to after a successful login.
- Real-Time Event API β Send login events via webhooks to external systems for automation and reporting.
3. Security & Compliance Considerations #
- Users must explicitly accept the Terms and Conditions before gaining access.
- The Admin Portal allows fine-tuning of email validation rules and session timeouts.
- Device Quota Management prevents abuse by limiting the number of connected devices per email.
- Audit Logs track all login attempts, verified emails, and device connections for security and compliance.
- Users exceeding the device quota receive an email notification and must revoke an existing device to connect a new one.
Benefits of Self-Provisioning via Email #
β User-Friendly & Secure β Easy email-based login without IT intervention.
β Flexible Access Control β Configurable session durations, device quotas, and domain restrictions.
β Marketing & Data Collection β Collect and export email addresses for analytics and marketing.
β Compliance & Security β Logs, quotas, and validation settings provide full control over guest and BYOD access.