Configure Captive Portal Part 5: Associate Identity and SSL Policies with the Access Control Policy
This part of the procedure discusses how to associate the identity policy and SSL Decrypt - Resign rule with the access control policy you created earlier. After this, users can authenticate using the captive portal.
Before you begin
For an overview of the entire captive portal configuration, see How to Configure the Captive Portal for User Control.
Procedure
Step 1 | Click Configure the Captive Portal Part 2: Create a TCP Port Access Control Rule. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. and edit the access control policy you created as discussed in |
Step 2 | Either create a new access control policy or edit an existing policy. |
Step 3 | At the top of the page, click the link next to Identity Policy. |
Step 4 | From the list, choose the name of your identity policy and, at the top of the page, click Save. |
Step 5 | Repeat the preceding steps to associate your captive portal SSL policy with the access control policy. |
Step 6 | If you haven't done so already, target the policy at managed devices as discussed in Setting Target Devices for an Access Control Policy. |
What to do next
-
Deploy your identity and access control policies to managed devices as discussed in Deploy Configuration Changes.
-
Monitor user activity as discussed in Using Workflows.