Can the ZeroShell Captive Portal use a RADIUS server as an authentication source?
From the ZeroShell 1.0.beta6 version, the Captive Portal can use, other than Kerberos 5 authentication, RADIUS authentication using the local server as a proxy towards other configured RADIUS servers. • Can the ZeroShell Captive Portal simultaneously use multiple authentication sources? Yes, it can. The user must choose to which domain it belongs on the web login page. Based on this choice, the web login server can contact the correct authentication provider. The choice of domain can occur using the list box in the web login page or using a username in the format username@DOMAIN • I am afraid that an impostor, using a spoofed IP address, can replace the web login server with a fake one and trick the gateways into making them authorised clients that shouldn’t be there. Is there any danger of this for ZeroShell Captive Portals? No, there is no danger of this because the web login server and the captive gateways, which compose the same infrastructure, share a secret (a Shared Secret to be
Related Questions
- The ZeroShell Captive Portal is composed of two modules: the Web Login server and the Captive Gateway. What is the advantage of such modularity?
- What are the authentication sources used by the ZeroShell Captive Portal web login server to validate users?
- Can the ZeroShell Captive Portal simultaneously use multiple authentication sources?