This section contains five files that serve as an example of how to build an External Captive Portal that makes use of the controller‘s Firewall-Friendly External Captive Portal Interface. The files presented are:
Receives redirected requests from browsers trying to access web sites, verifies that the redirect was sent from the controller and if so, displays a suitable login page.
This script gets invoked as a consequence of a browser submitting the login form created by net-auth.php. The script authenticates the station in whatever way it likes. If the station is authorized, the script selects a maximum session duration and an access control role for the station. It then redirects the station‘s browser back to a web server on the controller, using a URI that contains the access control role, the maximum session duration, other data required by the controller, and a signature.
This file contains the code that verifies the signatures on received URLs and that signs the URLs that redirect the station back to the controller.
Utilities used by various ECP scripts.
Contains the main statically configured parameters that the application uses to verify signed URLs and to create signed URLs.