4.5. BYOD
The BYOD (Bring Your Own Device) Use Case allows you to authenticate corporate users from their personal devices.

- 4.5.1. Introduction
- 4.5.2. Deployment Steps
- 4.5.3. Architecture
- 4.5.4. Configuration
- 4.5.5. Administration
- 4.5.5.1. Join ON Core to Active Directory domain
- 4.5.5.2. Registering Network Devices in the CMDB
- 4.5.5.3. Managing APs and Controllers in the CMDB
- 4.5.5.4. Defining User Data Sources
- 4.5.5.5. Configuring LDAPS or TLS for Secure LDAP Communication
- 4.5.5.6. Configuring Captive Sponsors
- 4.5.5.7. Creating Captive Workflows
- 4.5.5.8. Customizing Captive Themes
- 4.5.5.9. Creating Captive Instances
- 4.5.5.10. Wired BYOD Policies
- 4.5.5.11. Wireless BYOD Policies
- 4.5.6. Operation
- 4.5.7. Monitoring
- 4.5.8. Troubleshooting