Perimeter 2min de Leitura - 25 de August de 2020

Benefits of Captive Portal for authentication management

Pessoa tocando tela de tablet com o indicador

This post is also available in: English Português Español

The internet has evolved steadily in recent decades, becoming a democratic environment, increasingly accessible to people and businesses. This democratization is enhanced by the spread of wireless networks in public and private places, such as shopping malls, shops, airports that offer their customers Internet access, ensuring greater convenience.

It is fundamental, therefore, that organizations that provide access to the Internet are able to identify these users, ensuring the possibility of tracking in cases of fraud and illegal procedures. Understand the benefits of captive portalas well as its working characteristics by reading this post.

What is the Captive Portal?

The Captive Portal is an application that facilitates the management of access by users in the wireless network, be it public or private. Through the captive portal, it is possible to collect user identification data, such as name, e-mail, CPF, among others, before allowing the user to browse the Internet. The application works from the automatic redirection of the first traffic to a connection validation page, where there is a form for collecting the registration data. After registration, the access is released to the requester, allowing Internet browsing.

Benefits of Captive Portal

User Identification

Collecting user data for easy identification or for commercial use is one of the great benefits of captive portal. Companies can request customer / user data as a bargaining chip to allow free access to the internet. With these data, the company can develop directed capitation actions, and from a security point of view, it will be easier to identify the users that used the network, in case of tracking of illicit accesses.

Registration and traceability

Internet access through the organization’s hotspot is stored, allowing the identification of those responsible for illegal activities or fraud. The storage of records must be specified in the term of use of the hotspot, and demonstrates the compliance and commitment of the company regarding the use of its network and the legal determinations.

Application versatility

The application can be used not only in public environments to control user access, but also in companies, as a way to manage the access of visitors and employees to the corporate network. Also, for the management of Wi-Fi access at events. The Captive Portal is an excellent solution, ensuring the security of this resource, often essential to the event.

It is interesting that the adoption of the Captive Portal, as a tool for identification and authentication of users of a network, be accompanied by the legal sector of the company, ensuring that an environment is created and configured in accordance with the Civil Framework. The internet presents a plethora of advantages and positive factors for society, and it is important that, when offering access to it, security issues are assessed, avoiding problems for the company.

Do you already know the benefits of the Captive Portal? Share your experiences with us in the comments!

This post is also available in: English Português Español