Juniper Mist चे Purple WiFi सोबत इंटिग्रेशन

This guide provides a comprehensive technical reference for integrating Juniper Mist's AI-driven wireless platform with Purple's enterprise guest WiFi and analytics solution. It covers the full integration architecture — from the Mist external captive portal and REST API authorisation flow through to PurpleConnex Passpoint and RadSec configuration for seamless repeat-visitor connectivity. Venue operators and IT teams will find actionable deployment guidance, real-world implementation scenarios, and a clear framework for measuring the business impact of a Mist-Purple deployment.

📖 9 min read📝 2,031 words🔧 2 examples4 questions📚 10 key terms

🎧 Listen to this Guide

View Transcript
Welcome to the Purple Technical Briefing, where we explore the integrations that power world-class guest WiFi experiences. Today we're diving into a crucial integration for any enterprise-grade deployment: Juniper Mist and Purple WiFi. Introduction and Context. If you're an IT leader managing a large venue — think hotels, retail chains, stadiums, or conference centres — you know that guest WiFi is no longer just a nice-to-have. It's a critical piece of infrastructure. You need reliability, you need security, and most importantly, you need to derive real business value from it. That's where the combination of Juniper Mist's AI-driven network and Purple's analytics and engagement platform truly shines. Juniper Mist is one of the most sophisticated cloud-managed wireless platforms available today. Built on a microservices architecture, it uses machine learning to continuously optimise radio resource management, predict and resolve network issues before users notice them, and provide granular service level insights through its Wi-Fi Assurance framework. It's the kind of infrastructure that enterprise IT teams trust at scale. Purple, on the other hand, is an enterprise guest WiFi intelligence platform. It provides the guest-facing experience — the captive portal, the login journey, the data capture — and then transforms that data into actionable business intelligence. Think foot traffic analytics, dwell time reports, repeat visitor tracking, CRM integration, and GDPR-compliant marketing automation. Put these two platforms together, and you have a powerful combination: Mist provides the robust, intelligent wireless backbone, while Purple layers on the guest experience, the data insights, and the compliance tools. In this briefing, we'll cover how this integration works architecturally, how to set it up step by step, and why it represents a compelling return on investment for venue operators. Technical Deep-Dive. So, let's get technical. How does this integration actually function? It's elegant, really. At its core, it uses Mist's 'Forward to external portal' feature within the WLAN configuration. When a guest connects to your WiFi network, the Mist access point detects that the device has not been previously authorised. It then redirects the guest's browser to a captive portal URL — a URL that is hosted by Purple. This redirect is not just a simple page load. Mist appends several key parameters to the redirect URL. These include the WLAN identifier, the MAC address of the access point the guest is connected to, the MAC address of the guest's device itself, and the original URL the guest was trying to reach. These parameters are essential because they allow Purple's platform to know exactly which network the guest is on and to correctly authorise that specific device once authentication is complete. The captive portal itself is fully customisable. You can brand it with your venue's logo and colours, configure it to support over twenty-five languages with automatic device detection, and choose from a range of authentication methods — a simple email form, social media login via Facebook or Google, a pre-shared access code, or even a paid access purchase. Purple handles all of this within its platform. The magic of the authorisation flow happens via the Mist REST API. Once a guest authenticates on the Purple portal, the Purple platform makes a secure API call back to the Mist Cloud. This call, directed at the Mist portal authorisation endpoint, tells Mist: 'This device is authorised. Grant it internet access.' Mist then opens the network for that specific device. The entire process is secured using an API Secret — a unique cryptographic key that you configure in both the Mist dashboard and the Purple venue settings. This ensures that only your Purple instance can authorise devices on your Mist network. Now, let's talk about repeat visitors, because this is where the integration becomes genuinely sophisticated. Forcing guests to log in every single time they visit is a poor experience, and frankly, it's unnecessary friction that can damage your brand perception. That's where PurpleConnex — our Passpoint solution — comes in. Passpoint, also known as Hotspot 2.0, is an IEEE 802.11u standard that enables mobile devices to automatically discover and connect to WiFi networks. After a guest's first visit and authentication through the captive portal, we can provision a Passpoint profile to their device. On every subsequent visit, their device automatically and securely connects to the PurpleConnex SSID without any user interaction whatsoever. No portal, no login prompt — just seamless, instant connectivity. This is achieved using RadSec, which stands for RADIUS over TLS. Instead of the traditional, unencrypted RADIUS protocol, RadSec tunnels all authentication traffic over a TLS connection, providing enterprise-grade security. The Mist Cloud communicates with Purple's RadSec servers — rad1-secure.purple.ai and rad2-secure.purple.ai on port 2083 — to authenticate returning guests. You'll also need to upload Purple's RadSec certificate to your Mist organisation settings, which is a straightforward process. The PurpleConnex WLAN is configured as a WPA2 Enterprise network with 802.1X authentication, which is the gold standard for wireless security. For venues that have enabled 6 GHz radio bands on their Mist access points, WPA3-Enterprise is required, providing even stronger encryption through the 192-bit security mode. It's worth noting one important architectural consideration: Juniper Mist does not support RADIUS authentication and accounting for the captive portal flow itself. This means that real-time user count reports and certain network session metrics within the Mist dashboard will not reflect captive portal sessions. However, Purple's own analytics platform provides comprehensive reporting on guest sessions, so in practice, this limitation has minimal impact on the overall intelligence you can derive from the deployment. Implementation Recommendations and Pitfalls. Now for implementation. The basic setup is straightforward, but there are several configuration details that can trip up even experienced network engineers. Let me walk you through the key steps and the common pitfalls. The first step is to create your Guest WLAN in the Mist dashboard. Navigate to Network, then WLANs, and add a new WLAN. Set the security type to Open Access — this is correct and intentional, as the security for the guest network is handled at the application layer by the captive portal and GDPR-compliant data capture. Set the Guest Portal option to 'Forward to an external portal' and enter the Portal URL provided by Purple. The most common pitfall we see at this stage is an incomplete walled garden configuration. The walled garden is the list of hostnames that unauthenticated users are permitted to access before they complete the login process. You must add all of Purple's required domains to this list, as well as any social media login providers you intend to support. If the walled garden is incomplete, the captive portal will fail to load for guests, and they will be stuck at a browser error page. Purple provides a comprehensive list of required domains in their support documentation, and I strongly recommend reviewing it carefully before going live. After saving the WLAN, go back into the configuration and locate the API Secret. This is a unique cryptographic key that Mist generates automatically. Copy it and paste it into the Purple venue settings under the 'Mist API secret' field. This is the link that allows Purple to authorise devices on your Mist network. For the PurpleConnex Passpoint configuration, create a second WLAN with WPA2 Enterprise security and Passpoint enabled. Configure the Operators field with 'OpenRoaming-Settlement-Free', and set the NAI Realm to securewifi.purple.ai with EAP-TTLS as the authentication method. Add the two RadSec server addresses provided by Purple, and set the NAS Identifier to MIST followed by the device MAC address variable. Finally, upload the RadSec certificate to your Mist organisation settings. For multi-site deployments — and this is critical advice for any organisation managing more than a handful of venues — use Mist's Organisation Templates. Configure your guest and secure WLANs once in a template and apply it to all your sites. This ensures absolute consistency across your estate and dramatically reduces administrative overhead. A retail chain with fifty stores, for example, can push a configuration change to all sites simultaneously, rather than making manual changes site by site. One final implementation recommendation: always test the integration in a staging environment before rolling out to production. Use Mist's test authorisation endpoint — /authorize-test — to verify that the captive portal flow is working correctly without affecting live users. And always test on multiple device types — iOS, Android, Windows, and macOS — as captive portal behaviour can vary significantly between operating systems and browser versions. Rapid-Fire Questions and Answers. Let's tackle some rapid-fire questions we often hear from network architects during deployment planning. First question: Does this integration impact network performance? No. The authentication handshake is lightweight and happens only once per session. Once a guest is authorised, their traffic flows directly from the Mist access point to the internet. Purple is not in the data path at all, so there is no performance overhead for normal browsing traffic. Second question: How secure is the guest data collected by Purple? Very secure. Purple is ISO 27001 certified, and the platform is architected for compliance with GDPR, CCPA, and other major data privacy regulations. All data is encrypted in transit using TLS and encrypted at rest. Purple's consent management tools ensure that guests provide informed, explicit consent before any personal data is collected, which is a fundamental requirement under GDPR Article 7. Third question: Can I offer tiered bandwidth to monetise the WiFi? Absolutely. Purple's platform supports tiered bandwidth configurations. You can offer a free basic tier with a lower speed limit and a paid premium tier with higher speeds. This is particularly relevant for airports, conference centres, and stadiums, where premium connectivity is a genuine value-add that guests are willing to pay for. One Purple customer — an airport operator — achieved an eight hundred and forty-two percent return on investment by implementing tiered bandwidth through Purple's platform. Fourth question: What happens if the Purple platform is temporarily unavailable? This is an important resilience consideration. By default, Mist will not grant internet access to unauthenticated guests if the external portal is unreachable. You can optionally enable the 'bypass guest portal in case of exception' setting in Mist, which will grant open access if the portal is unavailable. However, this should be carefully considered, as it removes the data capture and compliance layer. For most enterprise deployments, we recommend leaving this disabled and ensuring that Purple's platform — which operates on a highly available cloud infrastructure — is monitored as part of your service management process. Summary and Next Steps. To summarise this briefing: integrating Juniper Mist with Purple transforms your guest WiFi from a simple utility into a powerful tool for business intelligence and customer engagement. You get Mist's AI-powered network reliability, with its machine learning-driven radio resource management and proactive fault detection, combined with Purple's deep visitor analytics, marketing automation, and GDPR-compliant data capture. The integration is API-driven and flexible, supporting both simple captive portal deployments and sophisticated, secure Passpoint implementations for a truly seamless repeat visitor experience. The key takeaways are these. First: always configure a complete walled garden — it's the most common cause of integration failures. Second: plan for two SSIDs from day one — an open guest network for first-time visitors and a secure Passpoint network for repeat guests. Third: use Mist's Organisation Templates for any multi-site deployment to ensure consistency and operational efficiency. And fourth: leverage Purple's analytics platform to derive actionable business intelligence from your guest WiFi data — this is where the real return on investment is realised. Your next step? If you're already a Purple customer, review the Juniper Mist integration guide in our support portal at support.purple.ai. If you're new to Purple, head to purple.ai and book a demo with one of our solutions architects. We can walk you through a live environment, discuss your specific venue requirements, and model the expected return on investment for your deployment. Thank you for joining this Purple Technical Briefing. We'll see you next time.

header_image.png

कार्यकारी सारांश

Juniper Mist WiFi चे Purple सोबतचे इंटिग्रेशन हे आजच्या एंटरप्राइझ व्हेन्यू ऑपरेटर्ससाठी उपलब्ध असलेल्या सर्वात सक्षम जोड्यांपैकी एक आहे. Mist चा क्लाउड-नेटिव्ह, AI-चालित वायरलेस प्लॅटफॉर्म नेटवर्क आर्किटेक्ट्सना आवश्यक असलेली इन्फ्रास्ट्रक्चर विश्वसनीयता आणि ऑपरेशनल इंटेलिजन्स प्रदान करतो, तर Purple चे Captive Portal, ॲनालिटिक्स आणि मार्केटिंग ऑटोमेशन लेयर त्या इन्फ्रास्ट्रक्चरला मोजता येण्याजोग्या व्यावसायिक मालमत्तेत रूपांतरित करते. हे इंटिग्रेशन Mist च्या एक्सटर्नल पोर्टल रिडायरेक्ट मेकॅनिझमद्वारे चालते, जे प्रति-WLAN API Secret द्वारे सुरक्षित केलेले असते, आणि WPA2/WPA3-Enterprise आणि RadSec वापरून वारंवार येणाऱ्या अभ्यागतांना विनाअडथळा कनेक्टिव्हिटी देण्यासाठी Passpoint-आधारित सुरक्षित WiFi सोल्यूशन — PurpleConnex — द्वारे पूरक आहे. या डिप्लॉयमेंटचे मूल्यांकन करणाऱ्या IT लीडर्ससाठी, मुख्य निर्णयाचे मुद्दे हे आहेत: केवळ बेसिक Captive Portal इंटिग्रेशन लागू करायचे की वारंवार येणाऱ्या पाहुण्यांसाठी PurpleConnex देखील डिप्लॉय करायचे; वॉल्ड गार्डनची (walled garden) रचना कशी करायची; आणि मोजता येण्याजोगा ROI मिळवण्यासाठी Purple च्या ॲनालिटिक्सचा कसा फायदा घ्यायचा. हे मार्गदर्शक या तिन्ही मुद्द्यांवर सविस्तर चर्चा करते, ज्यामध्ये कॉन्फिगरेशनचे तपशील, हॉस्पिटॅलिटी आणि रिटेल क्षेत्रातील उदाहरणे आणि स्पष्ट ट्रबलशूटिंग फ्रेमवर्क समाविष्ट आहे.


तांत्रिक सखोल माहिती

Juniper Mist आणि Purple चे इंटिग्रेशन जबाबदाऱ्यांच्या स्पष्ट विभाजनावर आधारित आहे. Mist कडे रेडिओ फ्रिक्वेन्सी वातावरण, ॲक्सेस पॉईंट मॅनेजमेंट आणि पॉलिसी एन्फोर्समेंट लेयरची जबाबदारी आहे. Purple कडे गेस्ट एक्सपिरियन्स, डेटा कॅप्चर आणि ॲनालिटिक्स व एंगेजमेंट लेयरची जबाबदारी आहे. हे दोन्ही प्लॅटफॉर्म्स एका सुस्पष्ट API कराराद्वारे संवाद साधतात, जे सुरक्षित आणि कॉन्फिगर करण्यासाठी सोपे आहे.

इंटिग्रेशन आर्किटेक्चर

architecture_overview.png

खालील तक्ता इंटिग्रेशनमधील प्रत्येक घटकाची भूमिका थोडक्यात सांगतो.

घटक भूमिका
Juniper Mist Access Points वायरलेस कव्हरेज प्रदान करणे; WLAN पॉलिसी लागू करणे; अनधिकृत पाहुण्यांना HTTP 302 द्वारे Purple Captive Portal वर रिडायरेक्ट करणे.
Juniper Mist Cloud सेंट्रलाइज्ड क्लाउड मॅनेजमेंट प्लॅटफॉर्म. WLAN कॉन्फिगरेशन, AI-चालित RRM, Wi-Fi ॲश्युरन्स SLEs आणि गेस्ट डिव्हाइस ऑथोरायझेशनसाठी वापरले जाणारे REST API होस्ट करते.
Purple Platform एक्सटर्नल Captive Portal होस्ट करते; नियमांनुसार गेस्ट डेटा कॅप्चर आणि स्टोअर करते; ॲनालिटिक्स डॅशबोर्ड, CRM इंटिग्रेशन आणि मार्केटिंग ऑटोमेशन प्रदान करते.
Mist API Secret एक प्रति-WLAN क्रिप्टोग्राफिक की (HMAC-SHA1) जी Purple आणि Mist Cloud मधील ऑथोरायझेशन हँडशेक सुरक्षित करते.
PurpleConnex (Passpoint) पोर्टल री-ऑथेंटिकेशनची आवश्यकता नसताना परत येणाऱ्या पाहुण्यांसाठी स्वयंचलित, सुरक्षित कनेक्टिव्हिटी प्रदान करण्यासाठी WPA2/WPA3-Enterprise आणि Passpoint वापरणारे दुसरे WLAN.
RadSec (RFC 6614) RADIUS over TLS. PurpleConnex WLAN साठी Mist Cloud आणि Purple च्या RADIUS सर्व्हरमधील ऑथेंटिकेशन ट्रॅफिक सुरक्षित करते.

Captive Portal ऑथेंटिकेशन फ्लो

जेव्हा एखादे गेस्ट डिव्हाइस गेस्ट SSID शी कनेक्ट होते, तेव्हा Mist तपासते की डिव्हाइसचा MAC ॲड्रेस पूर्वी ऑथोराइज्ड केला गेला आहे की नाही. जर नसेल, तर Mist पाहुण्यांची पहिली HTTP रिक्वेस्ट इंटरसेप्ट करते आणि Purple पोर्टल URL वर 302 रिडायरेक्ट जारी करते. हे रिडायरेक्ट अनेक पॅरामीटर्स जोडते जे Purple ला ऑथोरायझेशन सायकल पूर्ण करण्यासाठी आवश्यक असतात:

पॅरामीटर वर्णन आवश्यक?
wlan_id Mist मधील WLAN ऑब्जेक्टचा UUID होय
ap_mac सर्व्हिंग ॲक्सेस पॉईंटचा MAC ॲड्रेस होय
client_mac गेस्ट डिव्हाइसचा MAC ॲड्रेस होय
url पाहुण्यांनी रिक्वेस्ट केलेली मूळ URL नाही
ap_name AP चे वाचता येण्याजोगे नाव नाही
site_name साइटचे वाचता येण्याजोगे नाव नाही

एकदा पाहुण्यांनी Purple पोर्टलवर लॉगिन फॉर्म पूर्ण केल्यावर, Purple portal.mist.com/authorize वर Mist बॅकएंडला एक साइन्ड ऑथोरायझेशन रिक्वेस्ट तयार करते. या रिक्वेस्टमध्ये WLAN च्या API Secret चा वापर करून तयार केलेली HMAC-SHA1 सिग्नेचर, wlan_id, ap_mac, client_mac आणि सेशन कालावधी असलेले base64-एनकोडेड टोकन आणि एक्सपायरी टाइमस्टॅम्प समाविष्ट असतो. Mist सिग्नेचर व्हॅलिडेट करते आणि जर ती वैध असेल, तर इंटरनेट ॲक्सेससाठी गेस्ट डिव्हाइसला ऑथोराइज करते.

महत्त्वाची आर्किटेक्चरल नोंद: Juniper Mist Captive Portal फ्लोसाठी RADIUS ऑथेंटिकेशन किंवा अकाउंटिंगला सपोर्ट करत नाही. याचा अर्थ असा की Mist डॅशबोर्डमधील रिअल-टाइम युझर काउंट रिपोर्ट्स आणि काही नेटवर्क सेशन मेट्रिक्स Captive Portal सेशन्स दर्शवणार नाहीत. Purple चा स्वतःचा ॲनालिटिक्स प्लॅटफॉर्म सर्वसमावेशक सेशन रिपोर्टिंग प्रदान करतो आणि गेस्ट WiFi इंटेलिजन्सचा प्राथमिक स्रोत म्हणून त्याचा वापर केला जावा.

PurpleConnex: Passpoint आणि RadSec

purpleconnex_passpoint.png

हॉटेल्स, कॉर्पोरेट कॅम्पस, रिटेल चेन्स यांसारख्या वारंवार येणाऱ्या अभ्यागतांचे लक्षणीय प्रमाण असलेल्या ठिकाणांसाठी — PurpleConnex सोल्यूशन वारंवार पोर्टल ऑथेंटिकेशनची आवश्यकता दूर करते. Captive Portal द्वारे पाहुण्यांच्या पहिल्या लॉगीननंतर, Purple पाहुण्यांच्या डिव्हाइसवर Passpoint (Hotspot 2.0) प्रोफाईल प्रोव्हिजन करते. त्यानंतरच्या सर्व भेटींमध्ये, डिव्हाइस आपोआप PurpleConnex SSID निवडते आणि Purple च्या RadSec सर्व्हर्सवर EAP-TTLS द्वारे WPA2-Enterprise (किंवा 6 GHz-सक्षम APs वर WPA3-Enterprise) वापरून सायलेंटली ऑथेंटिकेट करते.

Mist मधील RadSec कॉन्फिगरेशनसाठी दोन सर्व्हर एंट्रीज आवश्यक आहेत — rad1-secure.purple.ai आणि rad2-secure.purple.ai, दोन्ही पोर्ट 2083 वर — आणि Mist ऑर्गनायझेशन सेटिंग्समध्ये Purple चे RadSec सर्टिफिकेट इन्स्टॉल करणे आवश्यक आहे. Purple ऑथेंटिकेटिंग ॲक्सेस पॉईंट अचूकपणे ओळखू शकेल याची खात्री करण्यासाठी NAS आयडेंटिफायर MIST-{{DEVICE_MAC}} वर सेट केले जावे.


इम्प्लिमेंटेशन गाईड

खालील पायऱ्यांमध्ये Juniper Mist Cloud डॅशबोर्ड (manage.mist.com) आणि Purple पोर्टल या दोन्हीचा ॲडमिनिस्ट्रेटिव्ह ॲक्सेस असल्याचे गृहीत धरले आहे. मल्टी-साइट डिप्लॉयमेंटसाठी, पायरी 1 ते 3 साइट लेव्हलऐवजी Mist ऑर्गनायझेशन टेम्प्लेटमध्ये केल्या पाहिजेत.

टप्पा 1: गेस्ट WLAN कॉन्फिगरेशन (Mist)

पायरी 1. manage.mist.com वर लॉग इन करा आणि Network > WLANs वर जा. Add WLAN वर क्लिक करा.

पायरी 2. खालील पॅरामीटर्ससह WLAN कॉन्फिगर करा:

सेटिंग मूल्य
SSID Guest WiFi (किंवा तुमच्या पसंतीचे नाव)
WLAN स्टेटस Enabled
सिक्युरिटी प्रकार Open Access
गेस्ट पोर्टल Forward to an external portal
पोर्टल URL Purple द्वारे प्रदान केलेले (तुमच्या व्हेन्यूची ॲक्सेस URL)
अलाउड होस्टनेम्स सर्व Purple डोमेन्स — Purple च्या वॉल्ड गार्डन डोमेन व्हाईटलिस्टचा संदर्भ घ्या
बायपास पोर्टल ऑन एक्सेप्शन अनटिक ठेवा (शिफारस केलेले)

पायरी 3. Save वर क्लिक करा. WLAN पुन्हा उघडा आणि API Secret शोधा. हे मूल्य कॉपी करा.

टप्पा 2: Purple व्हेन्यू कॉन्फिगरेशन

पायरी 4. Purple पोर्टलवर लॉग इन करा आणि तुमच्या व्हेन्यूच्या सेटिंग्सवर जा.

पायरी 5. Mist API secret फील्डमध्ये Mist API Secret पेस्ट करा.

पायरी 6. Mist WLAN मधील पोर्टल URL Purple व्हेन्यू सेटिंग्समध्ये दर्शविलेल्या ॲक्सेस URL शी जुळत असल्याची खात्री करा.

टप्पा 3: PurpleConnex (Passpoint) WLAN कॉन्फिगरेशन (पर्यायी परंतु शिफारस केलेले)

पायरी 7. Mist डॅशबोर्डमध्ये, खालील सेटिंग्ससह दुसरे WLAN तयार करा:

सेटिंग मूल्य
SSID PurpleConnex
सिक्युरिटी प्रकार WPA2 Enterprise (802.1X)
Passpoint Enabled
ऑपरेटर्स OpenRoaming-Settlement-Free
व्हेन्यूचे नाव तुमच्या व्हेन्यूचे नाव
डोमेन नाव securewifi.purple.ai
रोमिंग कन्सोर्टियम ID 5A03BA0000, 004096
NAI रिअल्म नाव securewifi.purple.ai
NAI रिअल्म EAP प्रकार TTLS
ऑथ सर्व्हर प्रकार RadSec
ऑथ सर्व्हर 1 rad1-secure.purple.ai, पोर्ट 2083
ऑथ सर्व्हर 2 rad2-secure.purple.ai, पोर्ट 2083
NAS आयडेंटिफायर MIST-{{DEVICE_MAC}}
गेस्ट पोर्टल No portal (थेट इंटरनेट ॲक्सेस)

पायरी 8. Organisation Settings वर जा आणि RadSec Certificates अंतर्गत Purple चे RadSec सर्टिफिकेट अपलोड करा.


सर्वोत्तम पद्धती

मल्टी-साइट डिप्लॉयमेंटसाठी ऑर्गनायझेशन टेम्प्लेट्स वापरा. एकापेक्षा जास्त साइट्सवर पसरलेल्या कोणत्याही डिप्लॉयमेंटसाठी, Mist ऑर्गनायझेशन टेम्प्लेटमध्ये दोन्ही WLANs कॉन्फिगर करा. हे संपूर्ण इस्टेटमध्ये कॉन्फिगरेशनची सुसंगतता सुनिश्चित करते आणि सर्व साइट्सवर एकाच वेळी बदल लागू करण्यास अनुमती देते. उदाहरणार्थ, पन्नास स्टोअर्स व्यवस्थापित करणारी रिटेल चेन तिची गेस्ट पोर्टल URL किंवा वॉल्ड गार्डन एंट्रीज एकदा अपडेट करू शकते आणि काही मिनिटांतच तो बदल प्रत्येक साइटवर लागू होऊ शकतो.

संपूर्ण आणि अद्ययावत वॉल्ड गार्डन राखा. वॉल्ड गार्डन हे इंटिग्रेशन फेल्युअरचे सर्वात सामान्य कारण आहे. अपूर्ण वॉल्ड गार्डनचा अर्थ असा आहे की अनधिकृत पाहुणे Captive Portal पर्यंत पोहोचू शकत नाहीत, ज्यामुळे WiFi चा अनुभव खराब होतो. सर्व आवश्यक Purple डोमेन्स, सोशल लॉगिन प्रोव्हायडर डोमेन्स आणि पोर्टल ज्यावर अवलंबून आहे अशा इतर कोणत्याही रिसोर्सेसची अद्ययावत यादी ठेवा. जेव्हा तुम्ही पोर्टलवर नवीन ऑथेंटिकेशन पद्धती जोडता तेव्हा या यादीचे पुनरावलोकन करा.

पहिल्या दिवसापासून दोन SSIDs चे नियोजन करा. सुरुवातीला Passpoint चा वापर कमी असला तरीही, ओपन गेस्ट WiFi SSID आणि PurpleConnex Passpoint SSID दोन्ही सुरुवातीपासूनच डिप्लॉय करा. जसजशी Passpoint-सक्षम डिव्हाइसेसची संख्या वाढेल — आणि ती वेगाने वाढत आहे, बहुतांश आधुनिक iOS आणि Android डिव्हाइसेस या मानकाला सपोर्ट करतात — तसतसा वारंवार येणाऱ्या अभ्यागतांचा विनाअडथळा अनुभव अधिकाधिक मौल्यवान होईल.

IEEE 802.1X आणि WPA3 रोडमॅप्सशी संरेखित करा. कोणत्याही नवीन Mist डिप्लॉयमेंटसाठी, विशेषतः ज्यामध्ये 6 GHz रेडिओ बँड्स समाविष्ट आहेत, PurpleConnex SSID वर WPA3-Enterprise चे नियोजन करा. 6 GHz नेटवर्क्सवर WPA3 अनिवार्य आहे आणि ते त्याच्या 192-बिट सिक्युरिटी मोडद्वारे लक्षणीयरीत्या मजबूत एन्क्रिप्शन प्रदान करते. हे विकसित होत असलेल्या सुरक्षा मानकांसह दीर्घकालीन अनुपालनासाठी डिप्लॉयमेंटला योग्य स्थितीत ठेवते.

तुमच्या CRM सोबत Purple इंटिग्रेट करा. Captive Portal द्वारे कॅप्चर केलेल्या गेस्ट डेटाचे मूल्य WiFi व्यवस्थापनाच्या पलीकडे लक्षणीय आहे. Purple ला तुमच्या CRM शी जोडल्याने — मग ते Salesforce, HubSpot किंवा हॉस्पिटॅलिटी-विशिष्ट PMS असो — एक युनिफाईड कस्टमर प्रोफाईल तयार होते जे पर्सनलाईज्ड मार्केटिंग, लॉयल्टी प्रोग्राम इंटिग्रेशन आणि सुधारित गेस्ट सर्व्हिसला चालना देऊ शकते.


ट्रबलशूटिंग आणि रिस्क मिटिगेशन

लक्षण संभाव्य कारण उपाय
पाहुण्यांना Captive Portal वर रिडायरेक्ट केले जात नाही Mist WLAN मध्ये चुकीची पोर्टल URL, किंवा WLAN "Forward to external portal" वर सेट केलेले नाही Mist WLAN कॉन्फिगरेशनमध्ये पोर्टल URL आणि गेस्ट पोर्टल सेटिंग तपासा.
Captive Portal पेज लोड होत नाही अपूर्ण वॉल्ड गार्डन — अनधिकृत युझर्ससाठी Purple डोमेन्स ब्लॉक केलेले आहेत Mist WLAN च्या अलाउड होस्टनेम्स यादीमध्ये सर्व आवश्यक Purple डोमेन्स आणि सोशल लॉगिन प्रोव्हायडर डोमेन्स जोडा.
पाहुणे लॉगिन पूर्ण करतात परंतु इंटरनेट ॲक्सेस मिळत नाही Purple व्हेन्यू सेटिंग्समध्ये चुकीचे API Secret, किंवा फायरवॉल portal.mist.com वरील ट्रॅफिक ब्लॉक करत आहे API Secret तपासा आणि फायरवॉल नियम तपासा. Mist Cloud वरून portal.mist.com (किंवा प्रादेशिक समतुल्य) पोहोचण्यायोग्य असल्याची खात्री करा.
गेस्ट डिव्हाइसेसवर PurpleConnex SSID दिसत नाही WLAN वर Passpoint सक्षम केलेले नाही, किंवा डिव्हाइसवर Passpoint प्रोफाईल प्रोव्हिजन केलेले नाही Mist WLAN सेटिंग्समध्ये Passpoint सक्षम असल्याची खात्री करा. पाहुण्यांनी यापूर्वी Captive Portal द्वारे ऑथेंटिकेट केले आहे आणि Passpoint प्रोफाईल प्रोव्हिजन केले गेले आहे याची पडताळणी करा.
PurpleConnex साठी RadSec ऑथेंटिकेशन फेल्युअर्स गहाळ किंवा चुकीचे RadSec सर्टिफिकेट, किंवा चुकीचे सर्व्हर ॲड्रेसेस/पोर्ट Purple च्या सपोर्ट डॉक्युमेंटेशनमधून RadSec सर्टिफिकेट पुन्हा अपलोड करा. सर्व्हर ॲड्रेसेस आणि पोर्ट 2083 तपासा.
Mist मध्ये रिअल-टाइम युझर काउंट रिपोर्ट्स अनुपलब्ध अपेक्षित वर्तन — Mist Captive Portal सेशन्ससाठी RADIUS अकाउंटिंगला सपोर्ट करत नाही गेस्ट सेशन रिपोर्टिंगसाठी Purple चा ॲनालिटिक्स डॅशबोर्ड वापरा. या इंटिग्रेशनसाठी हा योग्य आणि अभिप्रेत डेटा स्रोत आहे.

ROI आणि बिझनेस इम्पॅक्ट

retail_analytics_dashboard.png

Juniper Mist आणि Purple डिप्लॉयमेंटचा बिझनेस केस केवळ कनेक्टिव्हिटीच्या पलीकडे जातो. हे इंटिग्रेशन एक डेटा कलेक्शन आणि एंगेजमेंट इन्फ्रास्ट्रक्चर तयार करते जे अनेक आयामांवर मोजता येण्याजोगा परतावा देते.

गेस्ट एंगेजमेंट आणि मार्केटिंग ऑटोमेशन. Purple Captive Portal द्वारे ऑथेंटिकेट करणारा प्रत्येक पाहुणा एक ज्ञात संपर्क बनतो. Purple चे मार्केटिंग ऑटोमेशन टूल्स व्हेन्यू ऑपरेटर्सना टार्गेटेड, संमती-आधारित कम्युनिकेशन्स — भेट दिल्यानंतरचे सर्वेक्षण, प्रमोशनल ऑफर्स, इव्हेंट नोटिफिकेशन्स — पाठविण्याची अनुमती देतात, ज्यामुळे वारंवार भेटी वाढतात आणि सरासरी खर्च वाढतो. हॉटेल चेनसाठी, याचा थेट अर्थ सुधारित डायरेक्ट बुकिंग रेट्स आणि OTA कमिशनवरील अवलंबित्व कमी होणे असा होतो.

ऑपरेशनल इंटेलिजन्स. Purple चे फूट ट्रॅफिक ॲनालिटिक्स व्हेन्यू ऑपरेशन्स टीम्सना अभ्यागतांच्या वर्तनावर सविस्तर डेटा प्रदान करतात: व्हेन्यूचे कोणते भाग सर्वाधिक वेळ आकर्षित करतात, दिवसाच्या वेळेनुसार आणि आठवड्याच्या दिवसानुसार ट्रॅफिक पॅटर्न कसे बदलतात आणि कालांतराने वारंवार येणाऱ्या अभ्यागतांचे दर कसे बदलतात. ही माहिती स्टाफिंगचे निर्णय, स्टोअर लेआउट ऑप्टिमायझेशन आणि इव्हेंट प्लॅनिंगसाठी उपयुक्त ठरते.

रेव्हेन्यू जनरेशन. विमानतळ, कॉन्फरन्स सेंटर्स आणि स्टेडियम्स यांसारख्या ठिकाणांसाठी, Purple च्या टायर्ड बँडविड्थ क्षमता प्रीमियम WiFi ॲक्सेसच्या मॉनिटायझेशनला सक्षम करतात. एका विमानतळ ऑपरेटरने Purple चे टायर्ड ॲक्सेस मॉडेल लागू केल्यानंतर 842% ROI नोंदवला, जो योग्यरित्या कॉन्फिगर केलेल्या गेस्ट WiFi डिप्लॉयमेंटची लक्षणीय महसूल क्षमता दर्शवतो.

कम्प्लायन्स रिस्क मिटिगेशन. GDPR किंवा CCPA उल्लंघनामुळे लक्षणीय आर्थिक आणि प्रतिष्ठेचा धोका असतो. Purple चे अंगभूत कन्सेंट मॅनेजमेंट, डेटा सब्जेक्ट राईट्स टूल्स आणि कंप्लायंट डेटा प्रोसेसिंग आर्किटेक्चर हा धोका लक्षणीयरीत्या कमी करतात, एक भक्कम कम्प्लायन्स पोश्चर प्रदान करतात जे कायदेशीर टीम्स आणि डेटा प्रोटेक्शन ऑफिसर्स दोघांचेही समाधान करते.


हे मार्गदर्शक Purple च्या टेक्निकल कंटेंट टीमद्वारे मेंटेन केले जाते. नवीनतम कॉन्फिगरेशन तपशीलांसाठी, Purple Support Portal आणि Juniper Mist Documentation चा संदर्भ घ्या.

Key Terms & Definitions

Captive Portal

A web page presented to newly connected WiFi users before they are granted broader network access. It is the primary mechanism for guest authentication, data capture, and terms-of-service acceptance in a guest WiFi deployment.

In the Mist-Purple integration, the captive portal is hosted by Purple and is triggered by a Mist HTTP 302 redirect. IT teams configure the Portal URL in the Mist WLAN settings and the API Secret in Purple to link the two platforms.

Walled Garden

A restricted set of hostnames and IP ranges that unauthenticated users on a captive portal network are permitted to access before completing the login process. The walled garden must include the portal itself and all resources it depends on.

Network engineers must configure the Allowed Hostnames list in the Mist WLAN settings to include all Purple domains and any social login provider domains. An incomplete walled garden is the most common cause of captive portal failures.

API Secret (Mist)

A per-WLAN cryptographic key automatically generated by Mist when a Guest WLAN with an external portal is created. It is used as the HMAC-SHA1 signing key for the authorisation requests that Purple sends to the Mist backend to grant guest devices internet access.

The API Secret must be copied from the Mist WLAN configuration and pasted into the Purple venue settings. It is the trust anchor for the entire integration and should be treated as a sensitive credential.

Passpoint (Hotspot 2.0)

An IEEE 802.11u-based standard that enables mobile devices to automatically discover, select, and connect to WiFi networks using pre-provisioned credentials, without requiring user interaction or portal authentication.

PurpleConnex uses Passpoint to provide a seamless, automatic connection experience for repeat guests. After an initial captive portal login, a Passpoint profile is provisioned to the guest's device, enabling silent authentication on all future visits.

RadSec (RADIUS over TLS)

A protocol defined in RFC 6614 that secures RADIUS authentication and accounting traffic by tunnelling it over a TLS connection. It replaces the traditional UDP-based RADIUS transport, which is vulnerable to interception and replay attacks.

The PurpleConnex WLAN uses RadSec to secure authentication traffic between the Mist Cloud and Purple's RADIUS servers. Network engineers must configure the RadSec server addresses, port (2083), and certificate in the Mist WLAN and Organisation Settings.

IEEE 802.1X

An IEEE standard for port-based Network Access Control that provides an authentication framework for devices connecting to a LAN or WLAN. It requires each user or device to authenticate with unique credentials before gaining network access.

The PurpleConnex WLAN uses WPA2/WPA3-Enterprise with 802.1X to provide strong, per-user authentication for repeat guests. This is the same authentication framework used in corporate enterprise networks and is significantly more secure than pre-shared key (PSK) authentication.

Mist AI (Wi-Fi Assurance)

Juniper Mist's cloud-based machine learning engine that continuously analyses wireless network telemetry to optimise radio resource management, predict and resolve connectivity issues, and provide service level experience (SLE) metrics for each user session.

While Mist AI operates independently of the Purple integration, it is a key reason why Mist is selected as the infrastructure platform for enterprise guest WiFi deployments. Its proactive fault detection and automated RRM reduce the operational burden on IT teams and improve the reliability of the guest WiFi experience.

GDPR (General Data Protection Regulation)

EU Regulation 2016/679, which governs the collection, processing, and storage of personal data of individuals in the European Union and European Economic Area. It requires explicit, informed consent for data collection and grants individuals rights over their personal data.

Any guest WiFi deployment that collects personal data — including email addresses, names, or device identifiers — from EU residents must comply with GDPR. Purple's platform provides built-in consent management tools, data subject rights workflows, and compliant data processing agreements to support GDPR compliance.

OpenRoaming

A Wireless Broadband Alliance (WBA) initiative that enables seamless, automatic WiFi roaming across participating networks globally, using Passpoint technology and a federated identity framework. The Settlement-Free tier allows users to roam without per-session charges.

The PurpleConnex WLAN is configured with the OpenRoaming-Settlement-Free operator profile, which enables devices with OpenRoaming credentials from other providers to connect automatically to the PurpleConnex SSID. This extends the seamless connectivity benefit beyond Purple's own user base.

NAS Identifier

A RADIUS attribute (Attribute 32) that identifies the Network Access Server — in this context, the Mist access point — to the RADIUS server. It is used by the RADIUS server to apply per-AP policies and to log authentication events with AP-level granularity.

In the PurpleConnex WLAN configuration, the NAS Identifier is set to MIST-{{DEVICE_MAC}}, where {{DEVICE_MAC}} is a Mist variable that is replaced with the MAC address of the authenticating AP at runtime. This allows Purple's RADIUS servers to identify the specific AP handling each authentication request.

Case Studies

A 200-room four-star hotel wants to provide a seamless WiFi experience for guests. The general manager requires that first-time guests see a branded captive portal, that repeat guests connect automatically without a login prompt, and that the marketing team can send post-stay email campaigns to guests who have consented. How would you configure the Juniper Mist and Purple integration to meet these requirements?

The solution requires a dual-SSID architecture. First, create a 'Guest WiFi' WLAN in the Mist dashboard with Open Access security and the Guest Portal set to 'Forward to an external portal', using the Purple portal URL. Configure the walled garden with all required Purple domains. Retrieve the Mist API Secret and enter it into the Purple venue settings. In Purple, configure the captive portal with the hotel's branding, a simple email-and-name form, and explicit marketing consent checkboxes that comply with GDPR Article 7. Second, create a 'PurpleConnex' WLAN with WPA2-Enterprise, Passpoint enabled, and the RadSec server details from Purple. Upload Purple's RadSec certificate to the Mist Organisation Settings. After a guest's first login through the captive portal, Purple automatically provisions a Passpoint profile to their device. On all subsequent visits, the device silently connects to PurpleConnex. The marketing team can then use Purple's CRM integration to push consented guest email addresses into the hotel's email marketing platform for post-stay campaigns.

Implementation Notes: This dual-SSID approach is the industry best practice for hospitality deployments. The open SSID with captive portal handles first-time data capture and consent, while PurpleConnex delivers the premium, frictionless experience that modern hotel guests expect. The GDPR consent mechanism on the portal is non-negotiable for any EU-operating property — Purple's built-in tools make this straightforward to implement correctly. The key risk to mitigate is an incomplete walled garden; always test the portal flow on a fresh device with no cached credentials before going live.

A retail chain with 75 stores across the UK and Ireland wants to deploy guest WiFi to understand foot traffic patterns, measure the impact of store layout changes on dwell time, and send targeted promotions to opted-in customers. The IT team has a small central team and cannot manage per-site configurations individually. How should the Mist and Purple deployment be structured?

The deployment should be built around Mist's Organisation Templates for centralised management. Create a single WLAN template containing both the 'Guest WiFi' (open, captive portal) and 'PurpleConnex' (WPA2-Enterprise, Passpoint) WLANs, and apply this template to all 75 sites. This ensures that any configuration change — such as updating the walled garden or rotating the API Secret — propagates to all sites simultaneously without manual intervention. In Purple, create a location hierarchy that mirrors the retail estate: group stores by region or country to enable segmented analytics. Configure Purple's foot traffic analytics to track dwell time by zone within each store, using the AP placement data from Mist to map signal coverage to physical store areas. Integrate Purple with the retailer's existing marketing platform via Purple's API or native CRM connectors. Use Purple's campaign tools to send geo-targeted promotions — for example, a discount notification to customers who have been in the store for more than 15 minutes without making a purchase.

Implementation Notes: The Organisation Template approach is essential for any deployment at this scale. Without it, the operational overhead of managing 75 individual site configurations would be prohibitive for a small central IT team. The location hierarchy in Purple is equally important — it enables the marketing team to run regional campaigns and compare performance across the estate without requiring IT involvement. The 15-minute dwell-time trigger for promotions is a concrete example of how WiFi analytics can drive measurable commercial outcomes, and it is a capability that Purple's platform supports natively.

Scenario Analysis

Q1. A 500-seat conference centre is deploying a Mist and Purple guest WiFi solution. The events team wants to offer a free basic tier (2 Mbps per device) and a paid premium tier (20 Mbps per device) for delegates who need reliable video conferencing. The IT team has two network engineers and cannot manage per-event configurations manually. How would you structure the deployment to meet these requirements?

💡 Hint:Consider how Purple's tiered bandwidth feature works alongside Mist's WLAN configuration, and how Mist Organisation Templates reduce operational overhead.

Show Recommended Approach

Deploy a single 'Guest WiFi' SSID configured in a Mist Organisation Template with the Purple captive portal redirect. In Purple, configure two access tiers: a free tier with a 2 Mbps per-device bandwidth cap and a paid premium tier at 20 Mbps, with a payment gateway integrated into the portal for premium access purchases. The captive portal should clearly present both options to connecting guests. Use Purple's event management features to create event-specific portal pages that can be activated by the events team without IT involvement, reducing the operational burden on the two-engineer team. For the PurpleConnex Passpoint SSID, configure it to automatically grant premium-tier bandwidth to returning guests who have previously purchased a premium pass, using Purple's CRM data to identify them.

Q2. A hotel group's IT security team has raised a concern that the Open Access guest SSID creates a risk of guest-to-guest traffic interception. The network architect needs to address this concern without removing the captive portal functionality. What Mist configuration options are available, and how do they interact with the Purple integration?

💡 Hint:Consider Mist's client isolation features and how they apply to an Open Access WLAN. Also consider the role of WPA3 OWE (Opportunistic Wireless Encryption).

Show Recommended Approach

There are two primary mitigations. First, enable client isolation on the Guest WiFi WLAN in Mist. This prevents guest devices from communicating directly with each other at the Layer 2 level, eliminating the risk of ARP spoofing and direct traffic interception between guests on the same SSID. This setting does not affect the captive portal redirect or the Purple authorisation flow. Second, for deployments on APs that support it, consider enabling WPA3 OWE (Opportunistic Wireless Encryption) on the guest SSID. OWE provides per-session encryption for open networks without requiring a password, protecting guest traffic from passive eavesdropping. OWE is transparent to the captive portal flow — Mist still redirects unauthenticated devices to Purple regardless of the encryption mode. Note that OWE requires client device support, which is now widespread on modern iOS and Android devices but may not be universal across all guest devices.

Q3. After deploying the Mist-Purple integration at a 30-store retail chain, the IT team reports that approximately 15% of guests are completing the captive portal login but not receiving internet access. The remaining 85% are connecting successfully. What is the most likely cause, and what is the diagnostic approach?

💡 Hint:Think about what could cause the Mist authorisation API call from Purple to fail for a subset of users. Consider timing, firewall rules, and the API Secret.

Show Recommended Approach

The most likely cause is a race condition or timeout in the Purple-to-Mist authorisation API call, potentially caused by firewall rules at specific stores blocking outbound HTTPS traffic to portal.mist.com, or by network latency causing the authorisation request to expire before Mist processes it. The diagnostic approach is: (1) Check Purple's server-side logs for authorisation API call failures — Purple's support team can provide these. Look for HTTP error codes (401 Unauthorized suggests an API Secret mismatch; 504 Gateway Timeout suggests a connectivity issue). (2) Identify whether the failures are concentrated at specific stores, which would point to a per-site firewall or routing issue rather than a platform-wide problem. (3) Verify that the API Secret in Purple matches the API Secret in the Mist WLAN for the affected stores — if Organisation Templates were not used consistently, there may be mismatches. (4) Check that the correct regional Mist portal endpoint is being used — Mist API endpoints vary by region (US, EU, APAC), and using the wrong endpoint will cause authorisation failures.

Q4. A public-sector organisation — a local council — wants to deploy free guest WiFi across 12 libraries using Mist and Purple. Their data protection officer has specified that no personal data may be collected without explicit, granular consent, and that the organisation must be able to demonstrate compliance with a subject access request within 30 days. How should the Purple captive portal be configured to meet these requirements?

💡 Hint:Focus on GDPR Articles 7 (consent), 15 (right of access), and 17 (right to erasure). Consider how Purple's compliance features map to these requirements.

Show Recommended Approach

Configure the Purple captive portal with the following GDPR-compliant settings: (1) Use a simple, unbundled consent mechanism — present separate, opt-in checkboxes for each data processing purpose (e.g., 'I consent to my email being used for service notifications' and 'I consent to my usage data being used for analytics'). Pre-ticked boxes are not valid consent under GDPR Article 7. (2) Link to a clear, plain-English privacy notice that identifies the council as the data controller, lists the categories of data collected, and explains the legal basis for processing. (3) Configure Purple to capture only the minimum data necessary — for a public-sector library, this may be as simple as a device identifier and session timestamp, with no personal data required for basic access. (4) Enable Purple's data subject rights tools, which allow the DPO to respond to subject access requests by exporting all data associated with a specific email address or device, and to process erasure requests within the statutory 30-day window. (5) Ensure that a Data Processing Agreement (DPA) is in place between the council and Purple, as Purple processes personal data on behalf of the council as a data processor under GDPR Article 28.

Key Takeaways

  • The Juniper Mist and Purple integration uses Mist's external captive portal redirect and a per-WLAN API Secret to securely authenticate guest devices and capture visitor data through Purple's hosted portal.
  • A dual-SSID architecture — an open Guest WiFi SSID for first-time visitors and a WPA2/WPA3-Enterprise PurpleConnex SSID for repeat guests — is the industry best practice for balancing accessibility, security, and user experience.
  • The walled garden configuration in Mist is the most common source of integration failures; always ensure all Purple domains and social login provider domains are included in the Allowed Hostnames list before going live.
  • For multi-site deployments, Mist Organisation Templates are essential — they enable consistent configuration across the entire estate and allow changes to propagate to all sites simultaneously, dramatically reducing operational overhead.
  • Juniper Mist does not support RADIUS accounting for captive portal sessions; use Purple's analytics platform as the primary source of guest session reporting and business intelligence.
  • Purple's GDPR and CCPA compliance tools — including granular consent management, data subject rights workflows, and Data Processing Agreements — are critical for any deployment that collects personal data from EU or California residents.
  • The ROI of a Mist-Purple deployment extends beyond connectivity: guest data analytics, marketing automation, CRM integration, and tiered bandwidth monetisation can deliver measurable returns that far exceed the cost of the infrastructure.