SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
www.wavecrest.net
WavecrestTechBrief®
Authenticating Your Internet Users
Wavecrest Computing Authenticating Your Internet Users page 2
When users attempt to connect to the Internet, their identity usually needs to be verified to support the
company’s Acceptable Use Policy (AUP) for monitoring and policy enforcement. IT administrators can
accomplish this by employing authentication methods. There are many to choose from, and more than
one type may be configured depending on the needs of the organization. An authentication method will
authenticate the connection request before allowing or denying access to the Web site. Here, we will
discuss authentication using a captive portal and why it may be a suitable choice for your organization.
Authenticating With a Captive Portal
In this authentication method, the user’s logon credentials are used to authenticate the user. When the
user tries to visit a Web site, a captive portal redirects the user to a logon page allowing him to provide
his credentials. The user interaction with the logon page is a benefit of this authentication method. It is a
stable option in today’s modern mixed environment of devices.
After the user enters his logon information and accepts the AUP (if required), his credentials are stored,
and he will not be prompted to log on again for as long as his identity is confirmed. The user logs on once
per session. The IT administrator configures the length of time before authentication is necessary again.
Whereas NTLM supports Windows operating systems primarily, authentication with a captive portal
supports a wide range of devices, such as smartphones, tablets, and laptops as well as your employees’
workstations.
The following diagram illustrates a possible setup of devices in your corporate and guest networks with
CyBlock Software. This authentication method will also work with CyBlock Appliance and CyBlock Cloud.
Authentication Using a Captive Portal With CyBlock Software
Wavecrest Computing Authenticating Your Internet Users page 3
Customizing the Logon Page
A captive portal allows the logon page that is presented to the user to be customized to fit your company’s
needs. You can include your company logo, specify the text for the AUP check box, enter the URL of the
AUP, and change the color of the links on the logon page.
Logon Page
Conclusion
A captive portal offers an easy setup and may be a viable solution to support your organization. It works
well for users who want to access your network with devices, such as laptops, tablets, and smartphones.
That is, it can be used in a mixed environment of Windows and non-Windows based devices. It requires
users to provide credentials through a customizable logon page and accept your AUP, if configured,
before they can browse the Internet. Users only need to log on once per session, and the length of the
session is controlled by the IT administrator. Authentication using a captive portal is a reliable type of
authentication that confirms the identity of users accessing the Internet through your network.
About Wavecrest Computing
Wavecrest Computing has provided business and government clients with reliable, accurate Web-use
management products since 1996. IT specialists, HR professionals, and business managers trust
Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage – reducing liability risks,
improving productivity, saving bandwidth, and controlling costs.
Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors,
New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and
government agencies. For more information on our company, products, and partners, visit
www.wavecrest.net.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2014 Wavecrest Computing
Incorporated. All rights reserved.

Más contenido relacionado

Más de Wavecrest Computing

Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsWavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefWavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Wavecrest Computing
 

Más de Wavecrest Computing (15)

Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 
Cyblock Client Datasheet
Cyblock Client DatasheetCyblock Client Datasheet
Cyblock Client Datasheet
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Authentication with a Captive Portal

  • 2. Wavecrest Computing Authenticating Your Internet Users page 2 When users attempt to connect to the Internet, their identity usually needs to be verified to support the company’s Acceptable Use Policy (AUP) for monitoring and policy enforcement. IT administrators can accomplish this by employing authentication methods. There are many to choose from, and more than one type may be configured depending on the needs of the organization. An authentication method will authenticate the connection request before allowing or denying access to the Web site. Here, we will discuss authentication using a captive portal and why it may be a suitable choice for your organization. Authenticating With a Captive Portal In this authentication method, the user’s logon credentials are used to authenticate the user. When the user tries to visit a Web site, a captive portal redirects the user to a logon page allowing him to provide his credentials. The user interaction with the logon page is a benefit of this authentication method. It is a stable option in today’s modern mixed environment of devices. After the user enters his logon information and accepts the AUP (if required), his credentials are stored, and he will not be prompted to log on again for as long as his identity is confirmed. The user logs on once per session. The IT administrator configures the length of time before authentication is necessary again. Whereas NTLM supports Windows operating systems primarily, authentication with a captive portal supports a wide range of devices, such as smartphones, tablets, and laptops as well as your employees’ workstations. The following diagram illustrates a possible setup of devices in your corporate and guest networks with CyBlock Software. This authentication method will also work with CyBlock Appliance and CyBlock Cloud. Authentication Using a Captive Portal With CyBlock Software
  • 3. Wavecrest Computing Authenticating Your Internet Users page 3 Customizing the Logon Page A captive portal allows the logon page that is presented to the user to be customized to fit your company’s needs. You can include your company logo, specify the text for the AUP check box, enter the URL of the AUP, and change the color of the links on the logon page. Logon Page Conclusion A captive portal offers an easy setup and may be a viable solution to support your organization. It works well for users who want to access your network with devices, such as laptops, tablets, and smartphones. That is, it can be used in a mixed environment of Windows and non-Windows based devices. It requires users to provide credentials through a customizable logon page and accept your AUP, if configured, before they can browse the Internet. Users only need to log on once per session, and the length of the session is controlled by the IT administrator. Authentication using a captive portal is a reliable type of authentication that confirms the identity of users accessing the Internet through your network. About Wavecrest Computing Wavecrest Computing has provided business and government clients with reliable, accurate Web-use management products since 1996. IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage – reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Edward Jones, General Electric, IBM, MillerCoors, New York City Dept. of Transportation, Rolex, Siemens, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net.
  • 4. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2014 Wavecrest Computing Incorporated. All rights reserved.