SlideShare a Scribd company logo
Hotspot Authentication

Recently, Wireless coverage requirement has been extended to offer connectivity for roaming users in
new environment like hotels, airports or shopping malls In such infrastructure roaming users need to
connect to internet, either for free or after paying a fee. This also helps for increasing number of mobile
users, who tries to connect internet via Wi-Fi instead using service provider.

Requirement:
   1. Creating automatic guest users from SMS Gateway.
   2. Allowing guest users to access Internet with automatically created users on Cyberoam.
   3. Purging guest users once they are expired.

Challenges:

Such public places where such host spot authentication requires admin has to use some sort of software
to create guest users automatically and integrate with existing Access Point. Instead using that admin can
also create guest user manually. This situation leads admin to below hassles:

1. Increases cost to company as client has to go for Access point as well user creating software.
2. Admin has to delete users manually one there validity has been expired.
3. Not possible to manage in cases where number/frequency of dynamic users is too high.
Delivering the solution:

Cyberoam provides automatic creation of guest users on Cyberoam without having any external
authentication server. This can be achieved by configuring SMS gateway on Cyberoam which will wokrk
on HTTP API to send SMS. This SMS sends credentials to guest user which can be used to authenticate
them for internet accessing.

Benefits of having Cyberoam as a HotSpot:

1. Admin can provide default validity of all guest user credentials.
2. Auto purging of expired guest users helps to get better audit reports.
3. Provides an option for creating a user with user-id or cell phone number

Audit report can be generated for guest user group for reference from Iview, refer to below screenshot for
the same,




Internet activity reports for guest users,
Hotspot authentication

More Related Content

What's hot

Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management System
RITESH HELONDE
 
Wi fi hotspot solutions coworking space
Wi fi hotspot solutions   coworking spaceWi fi hotspot solutions   coworking space
Wi fi hotspot solutions coworking space
Shailendra Jain
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling Process
Saad Hussain
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
Arjun0981
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)
Vaishali Dhamale
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for Hotels
Shailendra Jain
 
Headcount Management
Headcount Management Headcount Management
Headcount Management
RITESH HELONDE
 
O N L I N E V E H I C L E R E N T A L S Y S T E M V R S
O N L I N E  V E H I C L E  R E N T A L  S Y S T E M   V R SO N L I N E  V E H I C L E  R E N T A L  S Y S T E M   V R S
O N L I N E V E H I C L E R E N T A L S Y S T E M V R S
ncct
 
Fastag
FastagFastag
FreeG WiFi Introduction
FreeG WiFi IntroductionFreeG WiFi Introduction
FreeG WiFi Introduction
Shailendra Jain
 
Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673
Mayank Jain
 
Visitor and vendor access management system
Visitor and vendor access management systemVisitor and vendor access management system
Visitor and vendor access management system
techlead-india
 
Reliance Credit Network
Reliance Credit NetworkReliance Credit Network
Reliance Credit Network
Credit Management Association
 
Traveller for ibm smart cloud
Traveller for ibm smart cloudTraveller for ibm smart cloud
Traveller for ibm smart cloud
Kanchan Roy Chowdhury
 
Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot
aniket jagtap
 

What's hot (15)

Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management System
 
Wi fi hotspot solutions coworking space
Wi fi hotspot solutions   coworking spaceWi fi hotspot solutions   coworking space
Wi fi hotspot solutions coworking space
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling Process
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
VAMS (Visitor Authentication Management System)
VAMS (Visitor Authentication  Management System)VAMS (Visitor Authentication  Management System)
VAMS (Visitor Authentication Management System)
 
FreeG WiFi PPT for Hotels
FreeG WiFi PPT for HotelsFreeG WiFi PPT for Hotels
FreeG WiFi PPT for Hotels
 
Headcount Management
Headcount Management Headcount Management
Headcount Management
 
O N L I N E V E H I C L E R E N T A L S Y S T E M V R S
O N L I N E  V E H I C L E  R E N T A L  S Y S T E M   V R SO N L I N E  V E H I C L E  R E N T A L  S Y S T E M   V R S
O N L I N E V E H I C L E R E N T A L S Y S T E M V R S
 
Fastag
FastagFastag
Fastag
 
FreeG WiFi Introduction
FreeG WiFi IntroductionFreeG WiFi Introduction
FreeG WiFi Introduction
 
Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673
 
Visitor and vendor access management system
Visitor and vendor access management systemVisitor and vendor access management system
Visitor and vendor access management system
 
Reliance Credit Network
Reliance Credit NetworkReliance Credit Network
Reliance Credit Network
 
Traveller for ibm smart cloud
Traveller for ibm smart cloudTraveller for ibm smart cloud
Traveller for ibm smart cloud
 
Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot
 

Similar to Hotspot authentication

A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
svrohith 9
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
homeworkping4
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
IRJET Journal
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET Journal
 
What’s New with AWS Mobile Services
What’s New with AWS Mobile ServicesWhat’s New with AWS Mobile Services
What’s New with AWS Mobile Services
Amazon Web Services
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET Journal
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
 
A Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill'sA Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill's
Muhammad Mohsin Naeem
 
Cybercrime
CybercrimeCybercrime
Cybercrime
deepika28g
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
Dr. Mazlan Abbas
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
eSAT Journals
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
CloudRuckus GuestManager-Datasheet-v1.5
CloudRuckus GuestManager-Datasheet-v1.5CloudRuckus GuestManager-Datasheet-v1.5
CloudRuckus GuestManager-Datasheet-v1.5
Mark Julier
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
Wavecrest Computing
 
Tamer_Mohamed
Tamer_MohamedTamer_Mohamed
Tamer_Mohamed
Tamer Mohamed
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
IRJET Journal
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
IRJET Journal
 
CFMS
CFMSCFMS
Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_DocumentationKhadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadija Mohammed
 

Similar to Hotspot authentication (20)

A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
What’s New with AWS Mobile Services
What’s New with AWS Mobile ServicesWhat’s New with AWS Mobile Services
What’s New with AWS Mobile Services
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
A Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill'sA Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill's
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
CloudRuckus GuestManager-Datasheet-v1.5
CloudRuckus GuestManager-Datasheet-v1.5CloudRuckus GuestManager-Datasheet-v1.5
CloudRuckus GuestManager-Datasheet-v1.5
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Tamer_Mohamed
Tamer_MohamedTamer_Mohamed
Tamer_Mohamed
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
CFMS
CFMSCFMS
CFMS
 
Khadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_DocumentationKhadamaty_MOI_Smart_Gov_Award_Documentation
Khadamaty_MOI_Smart_Gov_Award_Documentation
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Hotspot authentication

  • 1. Hotspot Authentication Recently, Wireless coverage requirement has been extended to offer connectivity for roaming users in new environment like hotels, airports or shopping malls In such infrastructure roaming users need to connect to internet, either for free or after paying a fee. This also helps for increasing number of mobile users, who tries to connect internet via Wi-Fi instead using service provider. Requirement: 1. Creating automatic guest users from SMS Gateway. 2. Allowing guest users to access Internet with automatically created users on Cyberoam. 3. Purging guest users once they are expired. Challenges: Such public places where such host spot authentication requires admin has to use some sort of software to create guest users automatically and integrate with existing Access Point. Instead using that admin can also create guest user manually. This situation leads admin to below hassles: 1. Increases cost to company as client has to go for Access point as well user creating software. 2. Admin has to delete users manually one there validity has been expired. 3. Not possible to manage in cases where number/frequency of dynamic users is too high.
  • 2. Delivering the solution: Cyberoam provides automatic creation of guest users on Cyberoam without having any external authentication server. This can be achieved by configuring SMS gateway on Cyberoam which will wokrk on HTTP API to send SMS. This SMS sends credentials to guest user which can be used to authenticate them for internet accessing. Benefits of having Cyberoam as a HotSpot: 1. Admin can provide default validity of all guest user credentials. 2. Auto purging of expired guest users helps to get better audit reports. 3. Provides an option for creating a user with user-id or cell phone number Audit report can be generated for guest user group for reference from Iview, refer to below screenshot for the same, Internet activity reports for guest users,