Configuration Guide

Table Of Contents
Guest and IoT Manager Application Framework
28 of 291
Once the Provisioner logs in, then the Provisioner has access to the Onboarding
Templates that the Administrator has provided and is able to provision Guest
User and / or Devices.
The Guest and IoT Manager Overview chapter provides information on the
following:
l Guest and IoT Manager Application Framework
l User Roles and Access Controls
l Launching Guest and IoT Manager
l Using the Online Help System
Guest and IoT Manager Application Framework
The Extreme Management Center portfolio system for provisioning and
managing guest network access consists of the following components:
l Guest and IoT Manager Administrator Application for managing
provisioners and for performing bulk updates of Guests and Devices.
l Guest and IoT Manager Provisioner Application for managing Guests and
Devices.
l Access Control Engine that authenticates and authorizes users who desire
to connect to your network.
l Extreme Management Center Application to create the authorization
policies that determine which users can connect to specific parts of your
network.
l (Optionally) Extreme Management Center Captive Portal : The web-based
authentication helps users connect their Bring Your Own Device (BYOD)
devices to enterprise network even though if it is not equipped with 802.1X
authentication software.
User Roles and Access Controls
Roles are an important concept in the Guest and IoT Manager application. Roles
determine what users can view or perform, including what they can monitor and