SlideShare a Scribd company logo
1 of 4
Download to read offline
www.wavecrest.net
WavecrestTechBrief®
Authenticating Your Internet Users
Wavecrest Computing Authenticating Your Internet Users page 2
When users attempt to connect to the Internet, their identity usually needs to be verified to support the
company’s Acceptable Use Policy (AUP) for monitoring and policy enforcement. IT administrators can
accomplish this by employing authentication methods. There are many to choose from, and more than
one type may be configured depending on the needs of the organization. An authentication method will
authenticate the connection request before allowing or denying access to the Web site. Here, we will
discuss authentication using a captive portal and why it may be a suitable choice for your organization.
Authenticating With a Captive Portal
In this authentication method, the user’s logon credentials are used to authenticate the user. When the
user tries to visit a Web site, a captive portal redirects the user to a logon page allowing him to provide
his credentials. The user interaction with the logon page is a benefit of this authentication method. It is a
stable option in today’s modern mixed environment of devices.
After the user enters his logon information and accepts the AUP (if required), his credentials are stored,
and he will not be prompted to log on again for as long as his identity is confirmed. The user logs on once
per session. The IT administrator configures the length of time before authentication is necessary again.
Whereas NTLM supports Windows operating systems primarily, authentication with a captive portal
supports a wide range of devices, such as smartphones, tablets, and laptops as well as your employees’
workstations.
The following diagram illustrates a possible setup of devices in your corporate and guest networks with
CyBlock Software. This authentication method will also work with CyBlock Appliance and CyBlock Cloud.
Authentication Using a Captive Portal With CyBlock Software
Wavecrest Computing Authenticating Your Internet Users page 3
Customizing the Logon Page
A captive portal allows the logon page that is presented to the user to be customized to fit your company’s
needs. You can include your company logo, specify the text for the AUP check box, enter the URL of the
AUP, and change the color of the links on the logon page.
Logon Page
Conclusion
A captive portal offers an easy setup and may be a viable solution to support your organization. It works
well for users who want to access your network with devices, such as laptops, tablets, and smartphones.
That is, it can be used in a mixed environment of Windows and non-Windows based devices. It requires
users to provide credentials through a customizable logon page and accept your AUP, if configured,
before they can browse the Internet. Users only need to log on once per session, and the length of the
session is controlled by the IT administrator. Authentication using a captive portal is a reliable type of
authentication that confirms the identity of users accessing the Internet through your network.
About Wavecrest Computing
Wavecrest Computing has provided business and government clients with reliable, accurate Web-use
management products since 1996. IT specialists, HR professionals, and business managers trust
Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage – reducing liability risks,
improving productivity, saving bandwidth, and controlling costs.
Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors,
New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and
government agencies. For more information on our company, products, and partners, visit
www.wavecrest.net.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2014 Wavecrest Computing
Incorporated. All rights reserved.

More Related Content

More from Wavecrest Computing

CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
Wavecrest Computing
 

More from Wavecrest Computing (15)

Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Authentication with a Captive Portal

  • 2. Wavecrest Computing Authenticating Your Internet Users page 2 When users attempt to connect to the Internet, their identity usually needs to be verified to support the company’s Acceptable Use Policy (AUP) for monitoring and policy enforcement. IT administrators can accomplish this by employing authentication methods. There are many to choose from, and more than one type may be configured depending on the needs of the organization. An authentication method will authenticate the connection request before allowing or denying access to the Web site. Here, we will discuss authentication using a captive portal and why it may be a suitable choice for your organization. Authenticating With a Captive Portal In this authentication method, the user’s logon credentials are used to authenticate the user. When the user tries to visit a Web site, a captive portal redirects the user to a logon page allowing him to provide his credentials. The user interaction with the logon page is a benefit of this authentication method. It is a stable option in today’s modern mixed environment of devices. After the user enters his logon information and accepts the AUP (if required), his credentials are stored, and he will not be prompted to log on again for as long as his identity is confirmed. The user logs on once per session. The IT administrator configures the length of time before authentication is necessary again. Whereas NTLM supports Windows operating systems primarily, authentication with a captive portal supports a wide range of devices, such as smartphones, tablets, and laptops as well as your employees’ workstations. The following diagram illustrates a possible setup of devices in your corporate and guest networks with CyBlock Software. This authentication method will also work with CyBlock Appliance and CyBlock Cloud. Authentication Using a Captive Portal With CyBlock Software
  • 3. Wavecrest Computing Authenticating Your Internet Users page 3 Customizing the Logon Page A captive portal allows the logon page that is presented to the user to be customized to fit your company’s needs. You can include your company logo, specify the text for the AUP check box, enter the URL of the AUP, and change the color of the links on the logon page. Logon Page Conclusion A captive portal offers an easy setup and may be a viable solution to support your organization. It works well for users who want to access your network with devices, such as laptops, tablets, and smartphones. That is, it can be used in a mixed environment of Windows and non-Windows based devices. It requires users to provide credentials through a customizable logon page and accept your AUP, if configured, before they can browse the Internet. Users only need to log on once per session, and the length of the session is controlled by the IT administrator. Authentication using a captive portal is a reliable type of authentication that confirms the identity of users accessing the Internet through your network. About Wavecrest Computing Wavecrest Computing has provided business and government clients with reliable, accurate Web-use management products since 1996. IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage – reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors, New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net.
  • 4. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2014 Wavecrest Computing Incorporated. All rights reserved.