I am configuring our Captive Portal and was wondering how other sites are using Captive Portal?
We have 2 primary use cases -
- Shared Workstations
- Unidentified Devices (Macs, Mobile Devices)
How successful has your Captive Portal implementation been?
We are using captive portal to identify internal users using devices that do not log into the domain. This is for two purposes: one to identify individuals on the network and secondly to provide access to resources that we control via AD group membership. We also use captive portal externally to force an AD authentication before an internet based user is allowed to connect to specific resources we host on our public internet presence. We have been quite successfully doing this for quite some time. Pay attention to the Captive Portal settings to ensure they are appropriate for your use case. For internal use don't set an expiry time greater than your DHCP lease period or you may have the incorrect person mapped to the user identified.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!