Deployment Guide

Table Of Contents
Basic Steps
The basic steps for verifying the signature are:
1. Perform basic validation on the request message (are all required fields present, is the date
current?). If these validations fail, there is no point in computing the signature.
2. Extract the signature from the received request.
3. From the received request, construct the string over which the signature will be computed. All but
one component of this string come from the query parameters.
4. Generate the signing key. The shared secret is used to generate a signing key and is not itself the
signing key.
5. Generate the signature using the signing key and the constructed string.
6. Compare the extracted signature (X-Amz-Signature) to the signature just computed. If they do not
match, the request is invalid and should be discarded.
External Captive Portal on a Third-Party Server
The Redirection URL Sent from Extreme Campus
Controller
Extreme Campus Controller Deployment Guide for version 5.46.03 99