Configuration Guide

Table Of Contents
Provisioning Guest Access
263 of 291
8. On clicking the Login URL that contains the encrypted details of the Guest
User the details are validated by RADIUS request to NAC.
9. After the successful authentication, the end system details are fetched from
XMC from the XMCs end system data.
10. The Guest and IoT Manager application associates the Guest User with the
corresponding end system and forces the reauthentication of the device
that is enforced through XCA.
11. Finally, Guest and IoT Manager application redirects the Guest User to the
URL configured in self-service.