Skip to main content

Self-Service OSU Portal

Overview

The IronWifi Online Sign-Up (OSU) portal provides a self-service interface for Passpoint (Hotspot 2.0) profile provisioning. Users can register themselves and automatically receive properly configured WiFi profiles for seamless, secure connectivity across all Passpoint-enabled networks.

The OSU portal is accessible at osu.ironwifi.com and integrates with the Passpoint/Hotspot 2.0 ecosystem to deliver zero-touch onboarding experiences.

Key Benefits

User Experience

  • Self-service registration (no admin intervention)
  • Automatic profile download and installation
  • One-time setup for all Passpoint networks
  • Seamless roaming across providers
  • Works on all major platforms (iOS, Android, Windows, macOS)

Operational Efficiency

  • Eliminate manual provisioning
  • Reduce help desk tickets
  • Scale to thousands of users
  • Automated credential lifecycle
  • Integration with identity providers

Security

  • Certificate-based authentication (EAP-TLS)
  • Encrypted credential delivery
  • Tamper-proof profiles
  • Automatic certificate renewal
  • Secure device binding

How OSU Works

Passpoint Discovery & Registration Flow

1. User Discovery

Device detects Passpoint network (ANQP)

Device discovers OSU providers

User sees "Get Internet Access" option

2. OSU Portal Access

Device connects to open OSU SSID

Browser launched to osu.ironwifi.com

User presented with registration page

3. User Registration

User enters credentials (email/password or SSO)

Account validation

Terms of service acceptance

4. Profile Provisioning

Server generates unique client certificate

Certificate packaged into WiFi profile

Profile encrypted and signed

5. Profile Installation

Profile automatically downloaded

User prompted to install

Profile installed (one-click on iOS/Android)

6. Automatic Connection

Device disconnects from OSU SSID

Device connects to secure Passpoint SSID

Certificate-based authentication (EAP-TLS)

Connected - seamless roaming enabled

Technical Components

ANQP Server

  • Advertises OSU providers
  • Provides network information
  • Enables pre-association discovery
  • Roaming consortium information

OSU SSID

  • Open network for registration
  • Walled garden to osu.ironwifi.com
  • HTTPS redirect
  • Temporary internet access

OSU Portal (osu.ironwifi.com)

  • User registration interface
  • Authentication processing
  • Profile generation
  • Certificate issuance
  • Device enrollment

Provisioning Server

  • OMA DM (Device Management) protocol
  • SOAP-XML communication
  • Profile packaging
  • Certificate delivery
  • Platform-specific formatting

Network Configuration

Prerequisites

Access Point Requirements

  • Hotspot 2.0 / Passpoint support
  • ANQP capability
  • Dual SSID support (secure + OSU)
  • 802.11u support
  • Firmware with Passpoint Release 2 or higher

Supported Vendors

  • Cisco (Meraki, Catalyst, WLC)
  • Ubiquiti UniFi
  • Ruckus (SmartZone, Cloud, Unleashed)
  • Aruba (Mobility Controller, Instant)
  • Cambium Networks
  • TP-Link Omada
  • MikroTik
  • Fortinet FortiGate
  • Juniper Mist
  • See vendor-specific guides in Passpoint Configuration

Secure SSID Configuration

Primary Passpoint SSID:

SSID Name: (Hidden - advertised via ANQP only)
Security: WPA2/WPA3-Enterprise
Authentication: 802.1X EAP-TLS
RADIUS Servers: IronWifi RADIUS
Passpoint: Enabled
OSU Provider: IronWifi

Hotspot 2.0 Settings:
- Enable Hotspot 2.0
- Enable ANQP
- Venue Type: [Select appropriate]
- Operator Friendly Name: [Your organization]
- Domain Name: [your-domain.com]
- Roaming Consortium OIs: (from IronWifi console)
- NAI Realm: [realm from IronWifi]

OSU SSID Configuration

OSU/Registration SSID:

SSID Name: "Get Internet Access" or "[Organization] Setup"
Security: Open (no password)
Captive Portal: Redirect to osu.ironwifi.com
Network Access: Walled garden

Walled Garden (Allowed Domains):
- osu.ironwifi.com
- console.ironwifi.com
- *.apple.com (for iOS)
- *.google.com (for Android)
- *.microsoft.com (for Windows)

Hotspot 2.0 OSU Settings:
- OSU Provider Name: [Your Organization]
- OSU Method: OMA-DM
- OSU Server URI: https://osu.ironwifi.com/[your-account]
- OSU Icon: (upload logo)
- OSU Service Description: "Get WiFi Access"

ANQP Configuration

ANQP Elements to Advertise:

Venue Information:
- Venue Group: (e.g., Educational, Business, Assembly)
- Venue Type: (specific to venue)
- Venue Name: [Your location name]

Network Information:
- Internet: Available
- Network Type: Free Public WiFi / Private Network
- Network Authentication: 802.1X
- IPv4/IPv6: Available

Operator Information:
- Operator Friendly Name: [Your organization]
- Domain Name List: [your-domain.com]

Roaming Partners:
- Roaming Consortium OIs
- NAI Realm List
- 3GPP Cellular Network (if applicable)

OSU Providers:
- Provider Name: [Your Organization]
- Server URI: https://osu.ironwifi.com/[account]
- Method: OMA-DM
- Icon: (logo file)
- Service Description: Multi-language descriptions

IronWifi Console Configuration

Step 1: Enable Passpoint

Navigation: Networks → [Your Network] → Passpoint Settings

Basic Settings:
├─ Enable Passpoint: ✓
├─ Passpoint Release: 2 or 3
├─ Venue Type: [Select from list]
├─ Operator Name: [Your organization]
└─ Domain Name: [your-domain.com]

OSU Provider Settings:
├─ Enable OSU Portal: ✓
├─ OSU Server URL: https://osu.ironwifi.com/[auto-generated]
├─ Provider Name: [Your organization]
├─ Service Description: "Self-service WiFi access"
├─ Icon Upload: [Your logo - PNG, 160x160px]
└─ Friendly Name: Multiple languages supported

Roaming Configuration:
├─ Roaming Consortium OIs: [Auto-populated]
├─ NAI Realms: [Your authentication realm]
└─ OpenRoaming: Optional integration

Step 2: Configure Authentication

Navigation: Networks → [Your Network] → Authentication

Primary Authentication Method:
- Method: 802.1X
- Inner Method: EAP-TLS
- Certificate Authority: IronWifi CA
- Client Certificate: Auto-provisioned via OSU

User Database Options:

Option 1: Local Database
- Users register with email/password
- Accounts created in IronWifi
- Certificate bound to account

Option 2: External Identity Provider
- Azure AD / Google Workspace / Okta
- OAuth 2.0 / SAML integration
- SSO during OSU registration
- Certificate bound to corporate identity

Option 3: RADIUS Proxy
- Proxy to existing RADIUS
- External user validation
- Certificate provisioning by IronWifi

Step 3: OSU Portal Customization

Navigation: Captive Portal → OSU Portal → Branding

Visual Customization:
├─ Logo: Upload (PNG, max 500KB)
├─ Background: Color or image
├─ Primary Color: Brand color
├─ Font: Select from library
└─ Favicon: Upload

Content Customization:
├─ Welcome Message: Custom text
├─ Instructions: Setup guidance
├─ Terms of Service: Link or inline
├─ Privacy Policy: Link or inline
├─ Support Contact: Email/phone
└─ FAQ Link: Optional

Localization:
├─ Default Language: English
├─ Available Languages: 20+ supported
├─ Auto-detect: From device settings
└─ User selection: Language dropdown

Registration Fields:
├─ Email: Required
├─ Password: Required (if local auth)
├─ First Name: Optional
├─ Last Name: Optional
├─ Phone: Optional
├─ Organization: Optional
├─ Custom Fields: Up to 5
└─ Terms Acceptance: Required checkbox

Step 4: Certificate Settings

Navigation: Account → PKI Infrastructure → Client Certificates

Certificate Template:
├─ Validity Period: 365 days (recommended)
├─ Key Length: 2048-bit RSA or 256-bit ECC
├─ Subject DN: CN={email}, O=[Organization]
├─ SAN: email:{email}
└─ Extended Key Usage: Client Authentication

Auto-Renewal:
├─ Enable Auto-Renewal: ✓
├─ Renewal Period: 30 days before expiration
├─ Renewal Method: Silent (automatic)
└─ User Notification: Email 14 days before

Revocation:
├─ CRL Distribution: Enabled
├─ OCSP Responder: Enabled
├─ Revocation Reason: User deactivation, security
└─ Grace Period: None (immediate)

User Registration Process

Self-Registration Flow

Step 1: Network Discovery

User Experience:

On iOS:
- Settings → WiFi
- Available networks show "Get Internet Access"
- Tap to view OSU providers
- See organization name and logo
- Tap "Get Access"

On Android:
- Settings → Network & Internet → WiFi
- Advanced → Passpoint
- Add Passpoint network
- See available providers
- Select organization
- Tap "Connect"

On Windows:
- Network icon → Available Networks
- See Passpoint networks
- Click organization name
- Follow setup wizard

Step 2: OSU Portal Registration

Browser Flow:

1. Connection to OSU SSID (automatic)
2. Browser opens to osu.ironwifi.com
3. User sees branded registration page

Registration Options:

A) Email/Password (Local):
- Enter email address
- Create password (8+ chars)
- Confirm password
- Accept terms of service
- Click "Register"

B) SSO Integration:
- Click "Sign in with [Provider]"
- Redirect to SSO provider
- Authenticate with corporate credentials
- Redirect back to OSU portal
- Click "Complete Registration"

C) Voucher Code:
- Enter pre-generated code
- Validate code
- No password required
- Click "Activate"

Step 3: Profile Installation

Platform-Specific Installation:

iOS:
1. Profile download initiated
2. "Profile Downloaded" notification
3. Settings → General → VPN & Device Management
4. Tap downloaded profile
5. Tap "Install" (may require passcode)
6. Trust certificate warning → "Install"
7. Profile installed ✓

Android:
1. Profile download to device
2. Notification: "WiFi profile ready"
3. Tap notification
4. "Install network?" prompt
5. Tap "Install"
6. Profile installed ✓

Windows:
1. .xml profile download
2. "Open file?" prompt
3. Network profile wizard launches
4. "Install network profile?" → Yes
5. Certificate installed automatically
6. Profile installed ✓

macOS:
1. .mobileconfig download
2. System Preferences → Profiles
3. New profile appears
4. "Install" button → Click
5. Enter admin password
6. Profile installed ✓

Step 4: Automatic Connection

Post-Installation:

1. Device disconnects from OSU SSID
2. Device scans for Passpoint networks
3. Matches installed profile to network
4. Automatic EAP-TLS authentication
5. Connected to secure network ✓

No further action required:
- No SSID selection needed
- No password entry
- No manual configuration
- Seamless roaming to any Passpoint network with matching profile

Administrative Management

User Lifecycle Management

User Provisioning

Bulk Import:

CSV Format:
email,firstName,lastName,group,validUntil
user1@company.com,John,Doe,employees,2025-12-31
user2@company.com,Jane,Smith,guests,2024-06-30

Import Process:
1. Navigate: Users → Import
2. Upload CSV file
3. Map fields
4. Set default group
5. Generate OSU invite emails
6. Users receive registration links

User Management

Individual User Actions:

View User:
- Registration date
- Certificate status
- Last connection
- Device count
- Data usage
- Group membership

Edit User:
- Update email
- Change group
- Set expiration
- Add notes
- Custom attributes

Disable User:
- Revoke certificate
- Disable account
- Terminate sessions
- Optional: Re-enable later

Delete User:
- Permanent removal
- Certificate revocation
- Audit log retention
- Cannot be undone

Certificate Management

Certificate Operations:

View Certificates:
- List all issued certificates
- Filter by status (valid, expired, revoked)
- Search by user email
- Sort by expiration date

Renew Certificate:
- Manual renewal trigger
- Automatic renewal (if enabled)
- Email notification to user
- Silent renewal (no user action)

Revoke Certificate:
- Immediate revocation
- CRL update
- OCSP notification
- User notification (optional)
- Reason code (required)

Reissue Certificate:
- After device loss
- Security incident
- User request
- Different device

Monitoring & Analytics

Registration Metrics

Dashboard Metrics:

Today:
- New registrations: 47
- Profile installations: 45 (96% success)
- Active users: 1,234
- Failed attempts: 2

This Month:
- Total registrations: 1,458
- Unique devices: 1,891
- Platform breakdown:
- iOS: 52%
- Android: 35%
- Windows: 10%
- macOS: 3%

Trends:
- Week-over-week growth: +12%
- Month-over-month: +8%
- Registration completion rate: 94%
- Average time to complete: 2 minutes

Connection Analytics

Network Performance:

Current Status:
- Active connections: 892
- Authentication success: 98.7%
- Average session: 3.2 hours
- Roaming events: 156/hour

Historical:
- Daily connections: 1,500 avg
- Peak concurrent: 1,100 (2pm)
- Authentication failures: 1.3%
- Top failure reason: Expired certificate

User Behavior:
- Return user rate: 87%
- Multi-device users: 43%
- Roaming users: 28%
- Average devices/user: 1.6

Error Tracking

Common Issues:

Registration Failures:
- Invalid email: 15 (this week)
- Weak password: 8
- Terms not accepted: 3
- SSO timeout: 2

Installation Failures:
- Profile not installed: 12
- Certificate rejected: 4
- Platform incompatible: 1

Authentication Failures:
- Expired certificate: 45
- Revoked certificate: 5
- Invalid certificate: 2
- RADIUS timeout: 8

Actions:
- Automated user notifications
- Self-service troubleshooting guides
- Help desk ticket integration

Reporting

Standard Reports

Available Reports:

Registration Report:
- Date range
- User details
- Platform distribution
- Registration method
- Installation success rate
- Export: CSV, PDF

Usage Report:
- Active users
- Connection frequency
- Session duration
- Data consumption
- Device types
- Export: CSV, Excel

Security Report:
- Certificate status
- Expiring certificates (30 days)
- Revoked certificates
- Failed authentications
- Anomalous activity
- Export: PDF

Compliance Report:
- User audit trail
- Configuration changes
- Access logs
- GDPR compliance data
- Export: PDF (encrypted)

Custom Reports

Report Builder:

Dimensions:
- Time period
- User group
- Location
- Device type
- Authentication method

Metrics:
- Registration count
- Active users
- Session duration
- Data usage
- Authentication success rate

Filters:
- User status
- Certificate validity
- Connection status
- Error types

Scheduling:
- Daily / Weekly / Monthly
- Email delivery
- Recipients list
- Format: PDF, CSV, Excel

Platform-Specific Considerations

iOS Devices

Profile Format

.mobileconfig (Apple Configuration Profile)

Requires:
- Signed profile (IronWifi certificate)
- WiFi payload with EAP-TLS settings
- Certificate payload with client cert
- Trust payload for RADIUS CA

User Experience:
- Profile download notification
- Settings → General → VPN & Device Management
- One-tap installation
- Passcode required
- Trust warning (normal)
- Immediate connection

MDM Integration

Alternative Deployment:

Via MDM (Jamf, Intune, etc.):
1. Export profile from IronWifi
2. Import to MDM system
3. Assign to user groups
4. Push to devices
5. Silent installation (no user action)

Benefits:
- No OSU portal needed
- Automated deployment
- Centralized management
- Compliance enforcement

Android Devices

Profile Format

Passpoint Profile (via OMA-DM)

Includes:
- WiFi configuration
- EAP-TLS settings
- Client certificate
- CA certificate
- Roaming consortium

User Experience:
- Automatic profile download
- Notification: "Network available"
- One-tap to install
- May require lock screen PIN
- Connects immediately

Version Compatibility

Android Support:

Android 6.0 - 8.1:
- Basic Passpoint support
- Manual profile installation sometimes required
- Certificate trust confirmation

Android 9.0+:
- Full Passpoint Release 2
- Automatic profile installation
- OSU support
- Seamless experience

Android 11+:
- Passpoint Release 3
- Enhanced OSU
- Better roaming
- Improved security

Windows Devices

Profile Format

.xml (Windows WiFi Profile)

Contains:
- SSID configuration
- EAP-TLS settings
- Certificate installation
- Network policies

Installation Methods:

A) Via OSU Portal:
- Download .xml file
- Import via network wizard
- Certificate auto-installs

B) Via PowerShell:
- netsh wlan add profile filename="profile.xml"
- Certificate installed to user store

C) Via Group Policy:
- Domain-joined devices
- Automated deployment
- Centralized management

Windows Hello Integration

Certificate Protection:

Windows 10/11:
- Store cert in TPM
- Biometric unlock
- Enhanced security
- Certificate exportable: No

Configuration:
- Enable in IronWifi console
- Requires TPM 2.0
- Windows Hello for Business
- Domain join (optional)

macOS Devices

Profile Format

.mobileconfig (macOS Configuration Profile)

Similar to iOS:
- Signed profile
- WiFi and certificate payloads
- Trust settings
- Network policies

Installation:
- Download profile
- System Preferences → Profiles
- Click "Install"
- Admin password required
- Immediate effect

Keychain Integration

Certificate Storage:

System Keychain:
- Client certificate
- CA certificate
- Network identity

User Keychain:
- Alternative location
- User-specific

Access Control:
- 802.1X process
- Always allow
- No user prompt

Security Considerations

Certificate Security

Private Key Protection

Key Generation:

On-Device Generation (Recommended):
- Private key never leaves device
- CSR sent to server
- Signed certificate returned
- Highest security

Server-Side Generation:
- Faster provisioning
- Key encrypted in transit
- Delivered via HTTPS
- Deleted from server immediately

Platform Support:
- iOS: On-device
- Android: On-device
- Windows: Server-side
- macOS: On-device

Certificate Pinning

RADIUS CA Validation:

Trust Settings:
- Pin IronWifi RADIUS CA
- Reject untrusted CAs
- Prevent MITM attacks
- Included in profile

Validation:
- Server certificate check
- CN/SAN validation
- CA chain verification
- Revocation check (OCSP)

Authentication Security

EAP-TLS Protection

Benefits:

Mutual Authentication:
- Client proves identity (certificate)
- Server proves identity (RADIUS cert)
- No password interception
- No credential phishing

Encrypted Tunnel:
- TLS 1.2 or 1.3
- Strong cipher suites
- Per-session keys
- Forward secrecy

Protection Against:
- Credential theft
- Man-in-the-middle
- Rogue access points
- Evil twin attacks
- Phishing

Portal Security

OSU Portal Protection

Security Measures:

HTTPS Only:
- TLS 1.2+ required
- Valid SSL certificate
- HSTS enabled
- No HTTP allowed

DDoS Protection:
- Rate limiting
- CAPTCHA for suspicious activity
- IP reputation filtering
- WAF protection

Input Validation:
- Email format validation
- Password strength requirements
- SQL injection prevention
- XSS protection
- CSRF tokens

Session Security:
- Secure session cookies
- Short session timeout (15 min)
- Session fixation protection
- Logout functionality

Troubleshooting

Common Issues

Profile Installation Fails

Symptoms:
- Download completes but profile not installed
- Error message during installation
- Profile appears but doesn't work

iOS Troubleshooting:
1. Check iOS version (9.0+ required)
2. Ensure sufficient storage
3. Verify passcode is set
4. Check for existing conflicting profile
5. Try removing and reinstalling

Android Troubleshooting:
1. Check Android version (6.0+ required)
2. Verify security settings allow unknown sources
3. Clear app cache (Settings)
4. Reboot device
5. Try manual profile installation

Windows Troubleshooting:
1. Run as administrator
2. Check certificate store
3. Verify WiFi service running
4. Import via PowerShell
5. Check event viewer logs

macOS Troubleshooting:
1. Check macOS version (10.9+ required)
2. Ensure admin privileges
3. Check keychain access
4. Verify WiFi is enabled
5. Remove and reinstall profile

Authentication Failures

Symptoms:
- Profile installed but won't connect
- "Authentication failed" error
- Connects then disconnects

Diagnosis:

Check Certificate:
- Validity period (not expired?)
- Revocation status
- Correct username/identity
- CA chain complete

Check RADIUS:
- Server reachable
- Shared secret correct
- User account active
- Certificate authentication enabled

Check AP Configuration:
- 802.1X enabled
- RADIUS servers configured
- EAP-TLS allowed
- Passpoint enabled

Check Device:
- Correct network selected
- Certificate trusted
- Date/time accurate
- No conflicting profiles

OSU Portal Access Issues

Symptoms:
- Can't reach osu.ironwifi.com
- Page doesn't load
- Redirect doesn't work

Solutions:

Network Issues:
1. Verify OSU SSID connection
2. Check walled garden config
3. Ensure DNS resolution works
4. Test with different device
5. Check firewall rules

Browser Issues:
1. Clear cache and cookies
2. Try different browser
3. Disable extensions
4. Check for popup blockers
5. Enable JavaScript

Account Issues:
1. Verify account active
2. Check OSU portal enabled
3. Validate configuration
4. Review audit logs
5. Contact IronWifi support

Error Codes

Common Error Messages

Registration Errors:

ERROR_EMAIL_EXISTS:
- Cause: Email already registered
- Solution: User should use password reset
- Admin: Check user status, reactivate if needed

ERROR_INVALID_PASSWORD:
- Cause: Password doesn't meet requirements
- Solution: Use 8+ characters, mixed case, numbers
- Admin: Review password policy settings

ERROR_SSO_FAILED:
- Cause: OAuth/SAML authentication failed
- Solution: Check SSO provider status
- Admin: Verify integration configuration

Installation Errors:

ERROR_PROFILE_INVALID:
- Cause: Corrupted or incompatible profile
- Solution: Re-download profile
- Admin: Regenerate profile for user

ERROR_CERT_UNTRUSTED:
- Cause: CA certificate not trusted
- Solution: Install CA cert first, then profile
- Admin: Verify CA cert in profile

Authentication Errors:

ERROR_RADIUS_NO_RESPONSE:
- Cause: RADIUS server unreachable
- Solution: Check network connectivity
- Admin: Verify RADIUS server status

ERROR_CERT_EXPIRED:
- Cause: Client certificate expired
- Solution: Renew certificate via portal
- Admin: Enable auto-renewal

ERROR_USER_DISABLED:
- Cause: Account deactivated
- Solution: Contact administrator
- Admin: Reactivate user account

Best Practices

Deployment Strategy

Pilot Phase

Small-Scale Testing:

Week 1-2:
- IT team registration (10-20 users)
- Test all platforms
- Validate certificate issuance
- Confirm authentication
- Document issues

Week 3-4:
- Friendly user group (50-100 users)
- Gather feedback
- Monitor success rates
- Refine documentation
- Train help desk

Validation:
- Installation success: 95%+
- Authentication success: 98%+
- User satisfaction: 4/5+
- Help desk tickets: Under 5%

Full Rollout

Phased Approach:

Phase 1: Early Adopters (Month 1)
- Tech-savvy users
- Self-service oriented
- Provide feedback
- Target: 10-20% of users

Phase 2: General Users (Month 2-3)
- Broad communication
- Training sessions
- Help desk support
- Target: 60-80% of users

Phase 3: Laggards (Month 4+)
- Direct outreach
- Assisted registration
- Deprecate old methods
- Target: 95%+ of users

User Communication

Pre-Launch

Communication Plan:

T-14 days:
- Announcement email
- Feature overview
- Benefits explanation
- Timeline

T-7 days:
- Reminder email
- Setup instructions
- FAQ link
- Support contact

T-1 day:
- Final reminder
- Quick start guide
- Video tutorial
- Live support hours

Launch Materials

Required Documentation:

Quick Start Guide:
- Platform-specific steps
- Screenshots
- Troubleshooting tips
- Support contact
- 1-2 pages max

FAQ Document:
- Common questions
- Account issues
- Installation help
- Authentication problems
- 10-15 Q&As

Video Tutorials:
- iOS registration (2 min)
- Android registration (2 min)
- Windows registration (3 min)
- macOS registration (2 min)
- Troubleshooting (3 min)

Support Resources:
- Email: support@yourdomain.com
- Portal: help.yourdomain.com
- Chat: Available 9-5 M-F
- Phone: XXX-XXX-XXXX

Operational Excellence

Monitoring

Daily Checks:

Morning:
- Registration success rate
- Authentication success rate
- Error log review
- Help desk tickets
- Certificate expiration alerts

Evening:
- Daily usage report
- Capacity trends
- Security events
- Backup verification

Weekly:
- Trend analysis
- User growth tracking
- Platform distribution
- Performance optimization

Monthly:
- Strategic review
- Capacity planning
- Security audit
- Documentation updates

Maintenance

Regular Tasks:

Weekly:
- Certificate expiration review (30 days)
- User account cleanup (inactive)
- Error pattern analysis
- Performance tuning

Monthly:
- Certificate renewal processing
- User satisfaction survey
- Help desk metrics review
- Documentation updates

Quarterly:
- Security audit
- Capacity assessment
- Platform updates
- Disaster recovery test

Annually:
- CA certificate renewal
- Policy review
- Technology refresh planning
- Compliance audit

Support & Resources

IronWifi Support

Contact Methods

Response Times

  • Critical (OSU portal down): Under 2 hours
  • High (authentication failures): Under 4 hours
  • Normal (user registration issues): Within 24 hours
  • General questions: Within 48 hours

Documentation

Related Guides

Professional Services

Available Services

  • OSU portal customization
  • Custom integration development
  • White-label OSU portal
  • Dedicated support
  • On-site training
  • Managed service

Ready to Deploy?

Contact IronWifi to enable the OSU portal for your Passpoint deployment and provide seamless self-service registration for your users.