Configure Captive Portal Part 6: Associate Identity and Decryption Policies with the Access Control Policy
This part of the procedure discusses how to associate the identity policy and TLS/SSL Decrypt - Resign rule with the access control policy you created earlier. After this, users can authenticate using the captive portal.
Before you begin
For an overview of the entire captive portal configuration, see How to Configure the Captive Portal for User Control.
Procedure
Step 1 | Click Configure the Captive Portal Part 3: Create a TCP Port Access Control Rule. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. and edit the access control policy you created as discussed in |
Step 2 | Either create a new access control policy or edit an existing policy. |
Step 3 | At the top of the page, click the word Identity. |
Step 4 | From the list, choose the name of your identity policy and, at the top of the page, click Save. |
Step 5 | Repeat the preceding steps to associate your captive portal decryption policy with the access control policy. |
Step 6 | If you haven't done so already, target the policy at managed devices as discussed in Setting Target Devices for an Access Control Policy. |
What to do next
-
Deploy your identity and access control policies to managed devices as discussed in Deploy Configuration Changes.
-
Monitor user activity .