Captive portal register access
![captive portal register access captive portal register access](https://forum.netgate.com/assets/uploads/files/1550484144182-e675cc2b-c826-4831-ac8b-8995ea484623-image.png)
There are many possibilities for deployment, but the basic operation consists in redirecting the first traffic, after joining the wireless network, to an identification page in order to collect the minimum information of that user who seeks to use the service. In most of the solutions, there is a monitoring of user activity, so that the session is properly expired, either by inactivity, or by exceeding the configured time. Once the identification is successfully performed, the user is then redirected automatically (in most cases) to the website previously entered. The captive portal works without the need for user intervention when connecting to the wireless network (and this can be used in wired networks as well), once the user connects, or attempts to make their first access to a website, it is done an automatic redirection to a connection validation page, which usually aims to authenticate/identify the user. The captive portal allows administrators to provide access to the internet by passing on information that allows user identification, such as name, e-mail, Social Security number, or authentication by using a voucher. Captive portals are commonly used in open access networks, available in stores, malls, clinics, airports, supermarkets, and corporate networks, for visitor access management. The captive portal is an application responsible for controlling and managing the access of users to public and private networks in an automated way. Enjoy the reading! The captive portal and its importance
![captive portal register access captive portal register access](http://1.bp.blogspot.com/-NOnbNH0ddbs/Tjmw3qbX_KI/AAAAAAAAAfc/F2rwZ64OvAE/s1600/PacketFenceUnreg.png)
In this post, understand how applying a captive portal can help you keep your business in line with legal requirements, as well as good security practices, regarding the provision of Internet access to users through hotspots.
![captive portal register access captive portal register access](https://support.edge-core.com/hc/article_attachments/360039352754/Q14-3.png)
#Captive portal register access series
The provision of free Internet access in public and private environments should follow a series of security guidelines aimed at minimizing their use by malicious persons for illicit activities. However, providing access to the Internet must comply with certain formalizations. In the current scenario, it is becoming more and more common for public and private environments to make Internet access available to users free of charge, bringing convenience, joining companies and people, for a variety of purposes. Easy access to the internet has boosted the improvement of the technologies for its transmission and connection, also contributing to the dissemination of wireless internet in residential, public and corporate environments. In recent decades, we have had the opportunity to follow the constant evolution of the internet, from the old dial-up connection to the arrival of broadband, transmitted through increasingly smaller devices and at much more attractive prices. This post is also available in: Português English Español