Difference between revisions of "Captive portal"

From Free Knowledge Base- The DUCK Project: information for everyone
Jump to: navigation, search
m (Littleguy moved page Captive portals to Captive portal: not plural)
m
Line 2: Line 2:
  
 
The use of Captive Portals relates to WiFi aka Wireless Internet primarily and at publicly provided hotspots.
 
The use of Captive Portals relates to WiFi aka Wireless Internet primarily and at publicly provided hotspots.
 +
 +
EXPANDED:
 +
 +
A captive portal is a web page or set of web pages that are presented to users when they first connect to a network. It is a common method used by public Wi-Fi hotspots, hotels, airports, and other venues to control access to the internet and provide additional services or information to users.
 +
 +
The typical workflow of a captive portal involves the following steps:
 +
 +
User Connects to the Network:
 +
 +
When a user connects to a Wi-Fi network or any other network with a captive portal, they are initially granted limited access.
 +
Redirect to Captive Portal Page:
 +
 +
When the user opens a web browser and tries to access any website, the traffic is intercepted, and they are automatically redirected to a captive portal page.
 +
Authentication and Authorization:
 +
 +
The captive portal page often requires users to log in or accept terms and conditions. Some captive portals may use authentication methods such as entering a username and password or accepting terms of use.
 +
Full Access Granted:
 +
 +
Once the user completes the required actions or authentication, the captive portal grants full internet access, and the user can browse the web as usual.
 +
Captive portals serve several purposes, including:
 +
 +
Access Control: They allow administrators to control who can access the network by requiring authentication or acceptance of terms.
 +
 +
Usage Monitoring: Captive portals can be used to monitor and track user activity on the network.
 +
 +
Advertisement and Information: Organizations often use captive portals to display information, advertisements, or promotions to users during the authentication process.
 +
 +
Security Measures: By requiring authentication, captive portals add an additional layer of security to public networks.
 +
 +
It's worth noting that while captive portals are commonly used in public Wi-Fi settings, they can also be implemented in wired networks or any network where access control and user authentication are desired.
 +
 +
WEB BROWSER LIMITATION:
 +
 +
Captive portals often require the use of a web browser; users who first use an email client or other application that relies on the Internet may find the connection not working without explanation, and will then need to open a web browser to validate. This may be problematic for users who do not have any web browser installed on their operating system. It is however sometimes possible to use email and other facilities that do not rely on DNS.
 +
 +
Since HTTPS connections cannot be seamlessly redirected , a web browser that only attempts to access secure websites before being authorized by the captive portal will see those attempts fail without explanation.  This is a good example of why HTTPS only web browsers are problematic.

Revision as of 21:25, 11 January 2024

A captive portal describes the webpage that asks for authentication, payment, and/or acceptance of terms of the agreement in order to access the Internet via a public provided WiFi hotspot you might find at coffee shops, airports, business centers, or hotel lobbies. You may simply be asked to accept their terms or you might be prompted for payment.

The use of Captive Portals relates to WiFi aka Wireless Internet primarily and at publicly provided hotspots.

EXPANDED:

A captive portal is a web page or set of web pages that are presented to users when they first connect to a network. It is a common method used by public Wi-Fi hotspots, hotels, airports, and other venues to control access to the internet and provide additional services or information to users.

The typical workflow of a captive portal involves the following steps:

User Connects to the Network:

When a user connects to a Wi-Fi network or any other network with a captive portal, they are initially granted limited access. Redirect to Captive Portal Page:

When the user opens a web browser and tries to access any website, the traffic is intercepted, and they are automatically redirected to a captive portal page. Authentication and Authorization:

The captive portal page often requires users to log in or accept terms and conditions. Some captive portals may use authentication methods such as entering a username and password or accepting terms of use. Full Access Granted:

Once the user completes the required actions or authentication, the captive portal grants full internet access, and the user can browse the web as usual. Captive portals serve several purposes, including:

Access Control: They allow administrators to control who can access the network by requiring authentication or acceptance of terms.

Usage Monitoring: Captive portals can be used to monitor and track user activity on the network.

Advertisement and Information: Organizations often use captive portals to display information, advertisements, or promotions to users during the authentication process.

Security Measures: By requiring authentication, captive portals add an additional layer of security to public networks.

It's worth noting that while captive portals are commonly used in public Wi-Fi settings, they can also be implemented in wired networks or any network where access control and user authentication are desired.

WEB BROWSER LIMITATION:

Captive portals often require the use of a web browser; users who first use an email client or other application that relies on the Internet may find the connection not working without explanation, and will then need to open a web browser to validate. This may be problematic for users who do not have any web browser installed on their operating system. It is however sometimes possible to use email and other facilities that do not rely on DNS.

Since HTTPS connections cannot be seamlessly redirected , a web browser that only attempts to access secure websites before being authorized by the captive portal will see those attempts fail without explanation. This is a good example of why HTTPS only web browsers are problematic.