Hotspot authentication

1,566 views
1,317 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,566
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hotspot authentication

  1. 1. Hotspot AuthenticationRecently, Wireless coverage requirement has been extended to offer connectivity for roaming users innew environment like hotels, airports or shopping malls In such infrastructure roaming users need toconnect to internet, either for free or after paying a fee. This also helps for increasing number of mobileusers, who tries to connect internet via Wi-Fi instead using service provider.Requirement: 1. Creating automatic guest users from SMS Gateway. 2. Allowing guest users to access Internet with automatically created users on Cyberoam. 3. Purging guest users once they are expired.Challenges:Such public places where such host spot authentication requires admin has to use some sort of softwareto create guest users automatically and integrate with existing Access Point. Instead using that admin canalso create guest user manually. This situation leads admin to below hassles:1. Increases cost to company as client has to go for Access point as well user creating software.2. Admin has to delete users manually one there validity has been expired.3. Not possible to manage in cases where number/frequency of dynamic users is too high.
  2. 2. Delivering the solution:Cyberoam provides automatic creation of guest users on Cyberoam without having any externalauthentication server. This can be achieved by configuring SMS gateway on Cyberoam which will wokrkon HTTP API to send SMS. This SMS sends credentials to guest user which can be used to authenticatethem for internet accessing.Benefits of having Cyberoam as a HotSpot:1. Admin can provide default validity of all guest user credentials.2. Auto purging of expired guest users helps to get better audit reports.3. Provides an option for creating a user with user-id or cell phone numberAudit report can be generated for guest user group for reference from Iview, refer to below screenshot forthe same,Internet activity reports for guest users,

×