Abstract

Central web authentication (CWA) is widely deployed for guest user authentication in environments that include a Remote Authentication Dial-In User (RADIUS) server. The various CWA flows work well with existing security policy management platforms without any security concerns, but potentially there could be security issues while working with third-party RADIUS servers. To address these types of challenges, techniques are presented herein that support, among other things, enhanced CWA flows to work with untrusted RADIUS servers and selectively extending Layer 3 (L3) authentication timeouts for high-profile customers.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS