Passpoint Onboarding Experience
Configure user onboarding for Passpoint (Hotspot 2.0) networks using IronWifi's cloud platform. This guide covers OSU portal setup, MDM-based provisioning, OpenRoaming federation, and device-specific configuration for seamless automatic WiFi authentication.
Overview
Passpoint onboarding is the process by which users receive credentials and configuration profiles that enable automatic connection to Passpoint-enabled networks. Unlike traditional WiFi that requires manual network selection and password entry, Passpoint provides a seamless, secure connection experience.
Prerequisites
In IronWifi Console (complete these first):
- Log in to IronWifi Management Console
- Navigate to Networks > select your network
- Enable Passpoint
- Configure your preferred onboarding method (OSU portal, MDM, etc.)
Onboarding Methods
1. MDM-Based Provisioning
For managed devices (enterprise, education):
Supported MDM Platforms:
- Microsoft Intune
- Jamf Pro
- Google Admin (Chromebook)
- VMware Workspace ONE
- Kandji
- Meraki Systems Manager
How It Works:
- IT admin creates WiFi profile with Passpoint settings
- Profile pushed to managed devices
- Device automatically connects to Passpoint networks
- No user action required
Best For: Corporate devices, school devices, managed BYOD
2. OSU (Online Sign-Up) Portal
For BYOD and guest devices:
IronWifi OSU Portal: https://osu.ironwifi.com
How It Works:
- User visits OSU portal (via QR code, link, or captive portal redirect)
- User authenticates (email, social login, or identity provider)
- Profile automatically downloads and installs
- Device connects to Passpoint networks automatically
Best For: Guests, BYOD, public hotspots
3. OpenRoaming Federation
For users with existing credentials:
How It Works:
- User already has OpenRoaming credentials (from carrier, employer, etc.)
- Device automatically discovers Passpoint network
- Authenticates using existing credentials
- Seamless connection with no user action
Best For: Roaming users, carrier WiFi, federated access
OSU Portal Configuration
Setting Up OSU Portal
- Log in to IronWifi Console
- Navigate to Networks > Passpoint
- Enable OSU (Online Sign-Up)
- Configure OSU settings:
Basic Settings:
- OSU Server URI: Your branded URL or use IronWifi default
- OSU Friendly Name: Display name shown to users
- OSU NAI: Network Access Identifier for OSU
- OSU Method: SOAP-XML or OMA-DM
Authentication Options
Configure how users authenticate during onboarding:
| Method | Description | Use Case |
|---|---|---|
| User enters email, receives verification | General access | |
| Social Login | Google, Apple, Facebook, etc. | Consumer venues |
| Identity Provider | SAML/OAuth with enterprise IdP | Corporate BYOD |
| SMS | Phone verification | High-security venues |
| Voucher | Pre-generated access codes | Events, hotels |
Branding
Customize the OSU portal appearance:
- Go to OSU Settings > Branding
- Configure:
- Logo: Upload your organization logo
- Colors: Match your brand colors
- Welcome Message: Custom text for users
- Terms of Service: Link to your ToS
- Privacy Policy: Link to privacy policy
User Onboarding Flow
First-Time Connection
1. User Discovers Network
└── Device scans for Passpoint networks
└── Finds network matching installed profile OR
└── Sees OSU-capable network
2. Profile Installation (if needed)
└── User directed to OSU portal
└── Authenticates (email, social, etc.)
└── Profile downloads automatically
└── User approves profile installation
3. Automatic Connection
└── Device connects using installed credentials
└── EAP authentication with RADIUS
└── Access granted
4. Ongoing Access
└── Device auto-connects when in range
└── No further user action needed
└── Works across all federated networks
Returning Users
For users with installed profiles:
- Device detects Passpoint network
- Automatically authenticates
- Connected in under 1 second
- No user interaction required
Profile Types
Certificate-Based (EAP-TLS)
Highest Security:
- Unique certificate per device
- No passwords to manage
- Automatic renewal via SCEP/EST
- Ideal for managed devices
Profile Contents:
- Root CA certificate
- Client certificate
- Private key (protected)
- Network configuration
Username/Password (EAP-TTLS)
Good Balance:
- Username derived from identity
- Password or token-based
- Easier to deploy
- Works on any device
Profile Contents:
- Root CA certificate
- Username/NAI configuration
- Authentication method
SIM-Based (EAP-SIM/AKA)
For Carrier WiFi:
- Uses mobile SIM credentials
- Automatic, no user setup
- Carrier-managed
- Best for WiFi offload
Device-Specific Onboarding
iOS / macOS
Profile Installation:
- User clicks profile link or scans QR
- Profile downloads to device
- User goes to Settings > General > VPN & Device Management
- Taps profile and selects "Install"
- Enters device passcode
- Profile installed, auto-connect enabled
MDM Deployment:
- Push configuration profile via MDM
- No user interaction required
- Supports supervised and unsupervised devices
Android
Profile Installation:
- User downloads Passpoint profile (
.confor via app) - Goes to Settings > Network > WiFi > Add Network
- Selects "Passpoint" option
- Imports profile
- Auto-connect enabled
Android 11+:
- Passpoint R2 support
- Improved profile handling
- Better auto-connection
Windows
Profile Installation:
- Download WiFi profile XML
- Import via Settings or command line
- Auto-connect enabled
Command Line:
netsh wlan add profile filename="passpoint-profile.xml"
Chromebook
MDM Deployment:
- Configure via Google Admin Console
- Push to managed Chromebooks
- Supports certificate and password auth
QR Code Onboarding
Generate QR Codes
Create QR codes for easy onboarding:
- In IronWifi Console, go to Networks > Passpoint > QR Codes
- Generate QR code with OSU portal link
- Download or print QR codes
- Display at venue entry points
QR Code Content
The QR code typically contains:
https://osu.ironwifi.com/org/YOUR_ORG_ID?location=LOCATION
Placement Recommendations
- Reception/front desk
- Elevator lobbies
- Conference rooms
- Guest room welcome materials
- Digital signage
- Website/email communications
Troubleshooting Onboarding
Profile Won't Install
iOS:
- Check device isn't in supervised mode blocking profiles
- Verify profile isn't expired
- Ensure device has internet for verification
- Check Settings > General > Profiles for stuck profiles
Android:
- Verify Android version supports Passpoint
- Check WiFi settings for Passpoint option
- Clear WiFi cache and retry
- Ensure profile format is correct
Auto-Connect Not Working
-
Verify profile installed correctly
- Check device WiFi settings for Passpoint entries
-
Check network configuration
- Ensure RCOI matches profile
- Verify NAI realm configured
-
Test manually
- Try connecting manually to isolate issue
Authentication Failures
-
Check credentials
- Verify certificate validity
- Check username/password
-
Check RADIUS
- Review IronWifi authentication logs
- Verify realm routing
-
Check profile
- Ensure EAP method matches server
- Verify CA certificate trusted
Best Practices
For Smooth Onboarding
- Clear Instructions: Provide step-by-step guides for users
- Multiple Methods: Offer QR, link, and manual options
- Test All Platforms: Verify on iOS, Android, Windows
- Monitor Success Rate: Track onboarding completion
- Support Ready: Train staff on troubleshooting
For Security
- Use Certificates: Prefer EAP-TLS when possible
- Short Expiry: Rotate credentials regularly
- Verify Identity: Require authentication during onboarding
- Audit Access: Log all onboarding events
For User Experience
- Minimize Steps: Reduce friction in onboarding
- Brand Consistently: Match your organization's look
- Clear Messaging: Explain benefits of Passpoint
- Instant Access: Ensure quick connection after onboarding