Browser-Based Authentication lets you acquire identities from unidentified users such as:
If unidentified users try to connect to resources in the network that are restricted to identified users, they are automatically sent to the Captive Portal. If Transparent Kerberos Authentication is configured, the browser will attempt to identify users that are logged into the domain using SSO before it shows the Captive Portal.
The CEO of ACME recently bought her own personal iPad. She wants to access the internal Finance Web server from her iPad. Because the iPad is not a member of the Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and then get the same access as on her office computer. Her access to resources is based on rules in the Firewall Rule Base.
To make this scenario work, the IT administrator must:
The Action Settings window opens.
The Access Role is added to the rule.
Name |
Source |
Destination |
VPN |
Service |
Action |
Track |
---|---|---|---|---|---|---|
CEO Access |
Linda Smith |
Finance_Server |
|
|
|
|
Jennifer McHanry does these steps:
The Captive Portal opens because she is not identified and therefore cannot access the Finance Server.
A Welcome to the network window opens.
The log entry in the Logs tab of the Logs & Monitor view shows how the system recognizes Daniel David from his iPad. This uses the identity acquired from Captive Portal.
Guests frequently come to the ACME company. While they visit, the CEO wants to let them access the Internet on their own laptops.
Amy, the IT administrator configures the Captive Portal to let unregistered guests log in to the portal to get network access. She makes a rule in the Rule Base to let unauthenticated guests access the Internet only.
When guests browse to the Internet, the Captive Portal opens. Guests enter their name, company, email address, and phone number in the portal. They then agree to the terms and conditions written in a network access agreement. Afterwards, they are given access to the Internet for a specified time.
To make this scenario work, the IT administrator must:
The Action Properties window opens.
From the perspective of a guest at ACME, she does these steps:
The Captive Portal opens because she is not identified and therefore cannot access the Internet.
A Welcome to the network window opens.