Share:
Notifications
Clear all

Guest Authentication process in Aruba

2 Posts
2 Users
0 Likes
47 Views
kajal
(@kajal)
Posts: 48
Eminent Member
Topic starter
 

What is the authentication process of Guest in in Aruba

 
Posted : 15/04/2024 8:01 pm
Ivan Lon
(@ivan)
Posts: 27
Eminent Member
 

Aruba wireless networks typically employ a Guest Access solution for providing network access to guests, visitors, or temporary users. The authentication process for guest access in Aruba wireless networks generally involves the following steps:

  1. Captive Portal: When a guest attempts to connect to the Aruba wireless network, they are typically redirected to a captive portal page. This page can be customized to display the organization's branding and any required terms of service or acceptable use policies.

  2. User Registration: On the captive portal page, guests are often required to register by providing some basic information such as their name, email address, phone number, or any other relevant details. This registration process helps the organization collect necessary information for access control and auditing purposes.

  3. Authentication Options:

    • Self-Registration: Guests may be allowed to self-register by providing their details directly on the captive portal page.

    • Sponsor-Based Registration: In some cases, guests may require sponsorship from an employee or host within the organization. The sponsor typically initiates the registration process on behalf of the guest, providing their contact information and any necessary details.

  4. Authentication Methods:

    • Pre-Shared Key (PSK): Guests may be provided with a temporary pre-shared key to access the wireless network. This key can be distributed manually or automatically generated by the system.

    • Voucher-Based Authentication: Guests may receive a voucher or coupon code that grants them access to the network for a specified duration.

    • SMS-Based Authentication: Guests may receive a one-time password (OTP) via SMS to authenticate their access.

    • Social Media Authentication: Guests may have the option to authenticate using their social media accounts such as Facebook or LinkedIn.

  5. Access Control: Once authenticated, guests are granted access to the network according to the policies configured by the network administrator. Access can be restricted based on factors such as time of day, duration of access, bandwidth limitations, and permitted network resources.

  6. Guest Provisioning: The guest's device is provisioned with the necessary network settings, including SSID and security parameters, to enable connectivity to the wireless network.

  7. Monitoring and Reporting: The Aruba wireless system typically provides monitoring and reporting capabilities, allowing administrators to track guest usage, enforce policies, and generate audit reports for compliance purposes.

 
Posted : 26/04/2024 10:07 am
Share: