Captive Portal:
Users connect to an open SSID and are redirected to a captive portal page.
They enter their Nexudus credentials or voucher code.
IronWiFi sends these credentials to Nexudus via API for validation and returns approval/rejection in real time.
No dependency on IronWiFi’s local database in this flow.
WPA2-Enterprise (Passpoint) Authentication:
Devices use stored credentials (from a Passpoint profile or Wi-Fi profile).
IronWiFi verifies the stored credentials against Nexudus in real time but depends on its local database as well.
Any profile updates in Nexudus are pushed to IronWiFi to maintain synchronization.
Nexudus updates user data (new attributes, expired memberships, disabled accounts) in IronWiFi’s database regularly.
These updates typically occur in real time or near real time, ensuring that IronWiFi has up-to-date information for accurate access decisions.
Certificate Trust Issues:
Devices may fail to connect if they don’t trust the RADIUS server’s certificate.
Account Status:
If the user account in Nexudus is disabled or expired, IronWiFi’s real-time verification will fail.
Mismatched Configurations:
Captive portal vs. enterprise authentication can lead to confusion if not properly configured.
Sync Delays:
Rarely, updates may not be immediately reflected due to API timeouts or temporary network issues.
Passpoint Profile and Nexudus credentials desynch
If the user changed / reset their PIN they will need to delete and re-install their passpoint profiles via captive portal, as the credentials are stored within the Passpoint profile
SSID Setup:
The Wi-Fi network is set to open (no WPA2 password).
Portal Login:
Users enter Nexudus credentials or a voucher code on a branded IronWiFi login page.
Validation:
IronWiFi sends credentials to Nexudus, which verifies the login and sends back an approval or rejection.
Access Grant:
Upon approval, IronWiFi grants temporary or permanent network access (MAC address whitelisting, etc.).
Profile Installation:
Members receive a Passpoint profile that includes credentials (username, password, or certificate).
Secure Connection:
Devices connect using the profile (SSID is encrypted with WPA2/WPA3 Enterprise).
Real-Time Validation:
IronWiFi checks credentials stored in its database and synchronizes them with Nexudus updates.
Fallback:
If authentication fails, fallback to captive portal can be considered, but it’s not ideal for secure networks.
Mixing these methods can cause confusion because:
Captive portal directly talks to Nexudus and bypasses local database checks.
Enterprise relies on local data + real-time checks.
If the local database is out of sync, WPA2-Enterprise might fail even if captive portal works.
Check IronWiFi Logs:
Logs show authentication attempts, success/failure, and error codes (e.g., password incorrect, certificate untrusted).
Review Change Logs:
IronWiFi’s admin console logs Nexudus updates to show if user data was recently changed (like disabled accounts or updated profiles).
Test with Known Working Credentials:
Use test accounts to isolate issues (credentials vs. network config).
Verify Certificate Trust:
For enterprise connections, ensure devices trust the RADIUS certificate chain.
Creation:Nexudus admins create voucher codes for day passes, promotions, or visitor access.
Login Flow:
Users enter the voucher code on the captive portal.
Verification:
IronWiFi requests Nexudus API to confirm the voucher’s validity (usage limits, expiry).
Access Grant:
If valid, the device is allowed on the network for the specified duration.
✅ Test in Staging First:
Validate Passpoint profiles and captive portal login with test accounts.
✅ Separate Guest & Enterprise SSIDs:
Use different SSIDs for visitors vs. members.
✅ Monitor Logs & Changelogs:
Track authentication issues and recent Nexudus updates.
✅ Educate Users:
Instruct them on profile installation, especially for WPA2-Enterprise.
✅ Document Everything:
Keep configuration details, user guides, and logs organized.
Passpoint Support:
Works with most modern OSes (Windows, MacOS, iOS, Android) but requires user acceptance of wireless settings.
Hardware Compatibility:
List of compatible HW vendors is available on this page - https://help.ironwifi.com/portal/en/kb/ironwifi/hotspot-2-0-passpoint