1. Overview #
- Introduction to the guest network and its features
- General architecture and components
- How the guest network integrates with existing systems
2. Captive Portal #
-
What is a captive portal?
-
Available authentication methods:
- Meeting Host – Authentication through a host for meetings
- Conference ID – Login using a conference-specific code
- Self Provisioning Email – Login via an email-based verification flow
- Self Provisioning SMS – Login via SMS-based verification
- Self Provisioning SAML – Login via external SAML authentication
- Password Subscription – Temporary access via a password with different retention periods (day, week, month)
- Username/Password – Standard login with manually created credentials
- Click to Connect – Instant access without authentication
- Username/Password with RADIUS backend authentication – Login validated against a RADIUS server
- Event Access – Direct redirection to an event site without displaying the Captive Portal first
- MAC Address Whitelisting via Self-Service – Bypass Captive Portal by registering the device’s MAC address
-
Customization of the portal (branding, messages, policies)
-
User authentication flows for different login methods
-
Example login scenarios
3. Admin Portal #
- Access and permissions
- Configuring authentication methods
- Managing access time policies
- Redirects and policy management
- Monitoring and logs
- Troubleshooting common issues
- SAML authentication support for admin login
Note: The Admin Portal is only available in English.
4. Self-Service Portal #
- Purpose and user roles
- Features for employees and sponsors
- Generating conference access codes
- Whitelisting devices (bypassing Captive Portal)
- Managing guest accounts
- SAML authentication support for Self-Service login
- BYOD management (viewing personal registered devices via email flow or SAML authentication)
Note: The Self-Service Portal supports 13 languages.
5. User Scenarios & Use Cases #
- Guest login via SMS/email
- Conference attendees accessing with a code
- Employees creating temporary guest accounts
- Access management for recurring visitors
- BYOD users managing their own registered devices
6. Technical Implementation & Integrations #
- Network requirements and design
- Backend systems and APIs
- Integration with identity providers (SAML, LDAP, AD)
- Logging & monitoring (Syslog, SIEM integration)
7. Troubleshooting & Common Issues #
- Common login issues and solutions
- Debugging Captive Portal authentication
- Logs and analysis tools
- FAQ and best practices
8. Security & Compliance #
- GDPR and data retention policies
- Access controls and security settings
- Recommended security policies
9. Frequently Asked Questions (FAQ) #
- How long is a device’s access retained?
- What happens if a user forgets their password?
- How can I see which devices I have registered?