Passer au contenu principal

Guides techniques

Guides techniques approfondis rédigés par des experts sur le WiFi invité, les analyses, les Captive Portals et la technologie de site.

353 guides

Configuration du walled garden pour le WiFi invité
Captive Portals

Configuration du walled garden pour le WiFi invité

This guide provides a comprehensive, vendor-neutral technical reference for configuring walled gardens in enterprise guest WiFi deployments. It covers the architecture of pre-authentication access, the critical role of dynamic DNS resolution, social login domain whitelisting, OS captive portal probe requirements, and compliance considerations under PCI DSS and GDPR. Aimed at IT managers, network architects, and venue operations directors, it delivers actionable implementation guidance with real-world case studies from hospitality, retail, and events environments.

11 min de lecture3k mots
Authentification SAML pour le WiFi du personnel
Authentication

Authentification SAML pour le WiFi du personnel

This guide provides a technical deep-dive into leveraging SAML 2.0 for enterprise-grade staff WiFi authentication, covering protocol architecture, Identity Provider integration, and deployment best practices. It equips IT leaders and network architects with actionable guidance on connecting Azure AD or Okta to the Purple WiFi intelligence platform to replace insecure pre-shared keys with robust, identity-driven access control. The result is a measurable improvement in security posture, compliance readiness, and operational efficiency across hotels, retail chains, stadiums, and public-sector venues.

7 min de lecture2k mots
Le NAC (Network Access Control) expliqué
Security

Le NAC (Network Access Control) expliqué

An authoritative technical reference for IT leaders on Network Access Control (NAC), explaining its architecture, deployment models, and critical role in enterprise WiFi security. This guide provides actionable insights for securing network access across hospitality, retail, and corporate environments, detailing how platforms like Purple integrate to enforce robust access policies.

7 min de lecture2k mots
Randomisation de l'adresse MAC : ce que c'est et comment la gérer
Captive Portals

Randomisation de l'adresse MAC : ce que c'est et comment la gérer

This guide provides IT leaders and network architects with a comprehensive technical overview of MAC address randomisation. It details the impact on enterprise and guest WiFi networks and presents actionable strategies, including Purple's SecurePass technology, to mitigate risks and maintain robust analytics and security.

6 min de lecture1k mots
802.1X vs PSK vs Open WiFi : Quelle méthode d'authentification vous convient le mieux ?
Authentication

802.1X vs PSK vs Open WiFi : Quelle méthode d'authentification vous convient le mieux ?

This guide provides a definitive, vendor-neutral comparison of the three primary WiFi authentication methods—802.1X (WPA2/3-Enterprise), Pre-Shared Key (PSK), and Open WiFi—tailored for IT managers, network architects, and CTOs in hospitality, retail, events, and the public sector. It cuts through technical complexity to deliver actionable deployment guidance, real-world case studies, and a clear decision framework for securing both staff and guest networks. Understanding which authentication model to deploy is not merely a technical choice; it is a strategic business decision with direct implications for security posture, regulatory compliance, operational efficiency, and the ability to extract commercial value from your WiFi infrastructure.

8 min de lecture2k mots
Comment intégrer les données du WiFi invité à votre CRM
Integrations

Comment intégrer les données du WiFi invité à votre CRM

This guide provides a comprehensive technical reference for IT managers, network architects, and marketing leaders on integrating guest WiFi analytics with CRM platforms such as Salesforce and HubSpot. It covers the strategic rationale, core architectural patterns (Direct API and Webhooks), available data fields, and step-by-step deployment guidance. Venue operators in hospitality, retail, and events will find actionable frameworks for building a compliant, scalable, first-party data pipeline that drives measurable marketing ROI.

8 min de lecture2k mots
Conformité GDPR pour la collecte de données via le WiFi invité
Security

Conformité GDPR pour la collecte de données via le WiFi invité

This guide provides IT managers, network architects, and Data Protection Officers with a comprehensive, actionable framework for achieving GDPR compliance across guest WiFi deployments in hospitality, retail, and public-sector venues. It covers the full spectrum of data collected by guest WiFi networks, the legal requirements for obtaining valid consent, best-practice data retention policies, and how to implement a defensible compliance architecture. Venue operators will learn how to transform their guest WiFi from a potential regulatory liability into a strategic asset that builds customer trust and drives measurable business intelligence.

7 min de lecture2k mots
Intégration de Cisco Meraki avec Purple WiFi
Integrations

Intégration de Cisco Meraki avec Purple WiFi

This guide provides a definitive technical reference for deploying Purple WiFi on Cisco Meraki infrastructure, covering the dual-layer integration architecture — Dashboard API provisioning and Captive Portal API authentication — alongside step-by-step RADIUS and splash page configuration. It is designed for network engineers and IT managers who need to move from a functional guest WiFi deployment to a strategic guest intelligence platform, with measurable ROI outcomes drawn from live enterprise deployments including McDonald's Belgium, Harrods, and AGS Airports.

10 min de lecture2k mots
Qu'est-ce que l'authentification RADIUS et comment fonctionne-t-elle ?
Authentication

Qu'est-ce que l'authentification RADIUS et comment fonctionne-t-elle ?

This guide provides a definitive technical reference on RADIUS authentication for IT leaders managing enterprise and guest WiFi deployments. It demystifies the AAA protocol, explains how 802.1X and EAP methods work together, and details how Purple's cloud-based platform simplifies deployment for hotels, retail chains, stadiums, and public-sector organisations. Readers will leave with a clear implementation roadmap, real-world case studies, and the decision frameworks needed to migrate from insecure pre-shared keys to a robust, identity-driven network access control architecture.

6 min de lecture1k mots
Réseau basé sur l'identité : Définition et enjeux
Network Design

Réseau basé sur l'identité : Définition et enjeux

This guide provides a comprehensive technical reference on Identity-Based Networking (IBN) — what it is, how it works, and why it is a critical investment for any organisation managing large, diverse user populations across hotels, retail chains, stadiums, and public-sector venues. It covers the core IEEE 802.1X architecture, Purple's cloud-native implementation, real-world deployment scenarios, and a clear ROI framework to support procurement decisions.

8 min de lecture2k mots
Ubiquiti UniFi et Purple WiFi : Guide d'intégration
Integrations

Ubiquiti UniFi et Purple WiFi : Guide d'intégration

This guide provides a definitive technical reference for integrating the Purple WiFi intelligence platform with Ubiquiti UniFi network deployments, covering architecture, step-by-step controller configuration, and GDPR-compliant data capture. It is designed for IT managers, network architects, and operations directors who need to deploy a secure, feature-rich guest WiFi experience across hospitality, retail, events, and public-sector environments. By correctly configuring the UniFi Network Controller to leverage Purple's external captive portal, organisations can transform a standard cost centre into a valuable source of visitor analytics and marketing intelligence.

8 min de lecture2k mots
Comment le WiFi invité optimise l'analyse des sites et le suivi de la fréquentation
Analytics

Comment le WiFi invité optimise l'analyse des sites et le suivi de la fréquentation

This guide provides a technical and operational framework for leveraging guest WiFi to gain deep insights into visitor behaviour within physical venues. It details how to capture and analyse data for footfall tracking and dwell time calculation, enabling IT and operations leaders to make data-driven decisions that optimize staffing, enhance venue layout, and increase business ROI.

7 min de lecture2k mots
WiFi géré dans le cloud vs WiFi basé sur contrôleur : Lequel choisir ?
Network Design

WiFi géré dans le cloud vs WiFi basé sur contrôleur : Lequel choisir ?

This guide provides a vendor-neutral technical comparison of cloud-managed WiFi and controller-based (on-premise) WiFi architectures, helping IT managers, network architects, and CTOs make an informed deployment decision. It covers the architectural trade-offs across scalability, data sovereignty, cost model, and offline resilience, with real-world case studies from hospitality, retail, and public-sector environments. It also explains how Purple's WiFi intelligence platform integrates with either architecture to deliver guest experience management, first-party data capture, and GDPR-compliant analytics.

9 min de lecture2k mots
WiFi Multi-Locataire : Architecture et Gestion
Network Design

WiFi Multi-Locataire : Architecture et Gestion

This authoritative technical reference guide provides IT managers, network architects, and venue operators with a comprehensive framework for designing, deploying, and managing multi-tenant WiFi networks across complex environments such as hotels, retail centres, stadiums, and multi-dwelling units (MDUs). It covers the critical architectural differences between single-venue and multi-tenant deployments, with a focus on tenant isolation, bandwidth management, and compliance. By leveraging Purple's enterprise WiFi intelligence platform, organisations can transform shared network infrastructure into a secure, scalable, and commercially valuable service.

8 min de lecture2k mots
L'IPSK expliqué : les clés pré-partagées basées sur l'identité pour l'accès WiFi
Authentication

L'IPSK expliqué : les clés pré-partagées basées sur l'identité pour l'accès WiFi

This guide provides IT managers, network architects, and venue operations directors with a definitive technical reference on Identity Pre-Shared Keys (IPSK) for WiFi access — explaining the architecture, comparing it against standard PSK and 802.1X Enterprise, and delivering actionable deployment guidance for hospitality, retail, events, and public-sector environments. It addresses the critical operational challenge of providing secure, individually-managed WiFi access across mixed-device fleets — including IoT and headless devices — without the infrastructure overhead of a full 802.1X deployment. Purple's platform is positioned as the orchestration layer that automates IPSK key lifecycle management at scale.

10 min de lecture2k mots
WiFi invité vs WiFi personnel : Bonnes pratiques de segmentation réseau
Network Design

WiFi invité vs WiFi personnel : Bonnes pratiques de segmentation réseau

This guide provides an authoritative technical reference for IT managers and network architects on the critical practice of separating guest and staff WiFi through network segmentation. It covers the security risks of running a flat, unsegmented network, the technical architecture of VLAN-based isolation, and vendor-neutral implementation guidance for hospitality, retail, and public-sector venues. The guide demonstrates how proper segmentation simultaneously mitigates data breach risk, satisfies compliance mandates such as PCI DSS and GDPR, and enables guest WiFi to become a revenue-generating business asset.

7 min de lecture2k mots
Comment configurer Purple WiFi pour la première fois : Aperçu technique
Hardware

Comment configurer Purple WiFi pour la première fois : Aperçu technique

This technical reference guide provides IT managers, network architects, and CTOs with a comprehensive overview of the Purple WiFi platform's initial setup process. It covers the core technical architecture, hardware integration, portal configuration, and best practices for a successful deployment in enterprise environments like hotels, retail, and stadiums. Following this guide, IT teams can confidently deploy a secure, GDPR-compliant guest WiFi solution that delivers both seamless connectivity and actionable business intelligence.

10 min de lecture2k mots