Authentication with Third-party
Credentials
Guest Registration using a third-party application has the following
advantages:
- It provides ExtremeCloud IQ
Controller with a higher level of user information by
obtaining information from the end user's third-party application account instead of
relying on information entered by the end-user.
- It provides an easier registration process for the end user. ExtremeCloud IQ
Controller retrieves the public information from the end user's third-party account and uses that
information to populate the name and email registration fields.
After you have configured a third-party application for registration, this
is how the authentication process works:
- The end user attempts to access an
external Web site. Their HTTP traffic is redirected to the captive portal.
- In the Guest Registration Portal, the end
user selects the option to register using credentials from a third-party (Facebook, Yahoo,
etc.)
- The end user is redirected to the
third-party login screen.
- If an Acceptable Use Policy option is
configured, the captive portal verifies that the AUP has been acknowledged before
redirecting the user to the third-party application.
- After logging in, the end user is
presented with the information that ExtremeCloud IQ
Controller receives from the third-party
application.
- The end user grants ExtremeCloud IQ
Controller access to the
third-party information and is redirected back to the captive portal where they see a
"Registration in Progress" message.
- The third-party application provides the
requested information to ExtremeCloud IQ
Controller, which uses it to populate the user
registration fields.
- The registration process completes and
network access is granted.