Skip to main content
Skip to main content

29 docs tagged with "security"

View all tags

Account Management

Manage your IronWiFi profile, change passwords, enable two-factor authentication, generate API keys, and configure subscription settings

Backup and Restore

Back up your IronWiFi configuration, schedule automated backups, restore settings, and roll back changes to protect your WiFi authentication setup.

Certificate Revocation Guide

Comprehensive guide to certificate revocation management including CRL and OCSP configuration, revocation procedures, security best practices, and automated lifecycle management for EAP-TLS authentication.

Data Collection

What information IronWiFi collects from users, data storage, ownership, and your compliance responsibilities.

High Availability and Disaster Recovery

Configure high availability for IronWiFi RADIUS authentication with multi-region redundancy, automatic failover, backup strategies, and disaster recovery planning.

IronWiFi Account Settings

Configure IronWiFi regional settings, notifications, white-label branding, data retention, security options, and integration settings

IronWiFi GDPR Compliance Statement

IronWiFi GDPR compliance statement covering data processing, user rights, data retention, international transfers, and Data Processing Agreements

IronWiFi Security and Compliance

IronWiFi security practices, ISO 27001 certification, SOC 2 compliance, data encryption, and infrastructure security for WiFi authentication services

IronWiFi Solutions for Businesses

IronWiFi offers robust solutions to secure business employee networks using WPA Enterprise authentication. With IronWiFi, businesses can ensure strong netw

IronWiFi Solutions for Healthcare

Secure WiFi solutions for healthcare organizations. HIPAA-compliant network segmentation, medical device authentication, patient and visitor WiFi with IronWiFi.

Network Segmentation

Implement network segmentation with IronWiFi using VLAN assignment, guest isolation, IoT segregation, and bandwidth allocation via RADIUS attributes.

Networks

Create and manage Networks in IronWiFi. A Network represents a WiFi deployment with RADIUS server settings that your access points connect to.

Passwords

Passwords are the keys that get you entry into so many things, including IronWiFi. As an attack vector, bad actors may try to take advantage of your passwo

PKI Infrastructure

Technical overview of IronWiFi's HSM-backed Public Key Infrastructure, certificate authority hierarchy, and SHA256 fingerprints for certificate verification.

Quick Start - WPA2/WPA3-Enterprise

Deploy WPA2-Enterprise or WPA3-Enterprise WiFi authentication with IronWiFi RADIUS in under 30 minutes. Step-by-step 802.1X setup guide.

RADIUS Caching & Failover

Comprehensive guide to RADIUS caching, local authentication fallback, and high-availability configurations. Improve performance, enable offline operation, and ensure continuous connectivity during network outages.

REST API Authentication Guide

Learn how to generate and use IronWiFi REST API keys. Guide with Bearer token authorization examples in cURL, PHP, JavaScript, and Python.

Roles and Permissions

Create and manage roles with granular permissions to control team member access to IronWiFi Console features, networks, and API endpoints

Sign in with Apple

Enable Sign in with Apple for captive portal authentication. Privacy-focused login with email relay for iOS, macOS, and web guests.

Terms of Service

Read the IronWiFi Terms of Service governing cloud RADIUS authentication, captive portal services, data usage, and account policies.

Trusted IdP With ADFS

This topic describes how to configure ADFS and IronWiFi to allow users to sign in to the Captive Portal using ADFS as the trusted identity provider (IdP).

Walled Garden Configuration

Configure pre-authentication access lists to allow Google, Facebook, and payment domains before captive portal login on your WiFi network

WPA3-Enterprise & 192-bit Security

Comprehensive guide to WPA3-Enterprise deployment including 192-bit security mode for high-assurance environments. Covers configuration, migration strategies, device compatibility, and best practices.