Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Aptisi Transactions ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Aptisi Transactions on Technopreneurship
Article . 2023 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 2 versions
addClaim

Implementation of Wireless User Authentication using WLC-Forti Framework

Authors: Supriyono, Ignatius Agus; Sembiring, Irwan; Setiawan, Adi; Setyawan, Iwan; Wellem, Theophilus; Henderi; Hizbuloh, Ilham;

Implementation of Wireless User Authentication using WLC-Forti Framework

Abstract

Internet access at this time is a daily necessity that cannot be denied. It is certain that most institutions and business entities require internet access in carrying out their activities, including educational institutions. With the development of mobile computer technology in which more users use mobile devices to access the internet, wireless-based network infrastructure is a demand that cannot be postponed any longer. By using a wireless connection to connect to the network, authentication becomes something that must be considered, the use of access to the network by unwanted parties can harm other parties. Changing passwords regularly is important to avoid misuse of access to the network by other parties. This paper presents a problem where when an educational institution implements the Bring Your Own Device (BYOD) program, students and teachers cannot change passwords using the personal device used, this is because the personal device is not registered with the domain controller at the institution. The solution proposed in this article is to move the NPS RADIUS server function on the local site to LDAP in the cloud using a combination of WLC which handles Wi-Fi clients and Fortinet which handles authentication to the cloud. The implementation results show that the WLC-Forti framework functions well.

Related Organizations
Keywords

Authentication, LDAP, Wireless Controller, Wireless access, Cloud

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    5
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
5
Top 10%
Average
Top 10%
gold