Solved

ISA server Captive portal Does ISA server support customised Portal for Login

Posted on 2007-11-25
4
1,544 Views
Last Modified: 2012-05-05
ISA server Captive portal Does ISA server support customised Portal for Login. what i mean is i want to use ISA in as ISP kind of setup . When user tries to acess internet he will be redirected to ISA Server and directed to a portal which captures username and password once authenticated he will be directed to internet otherwise if should ask for the Authentication again
0
Comment
Question by:rpmindtools
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20346477
I do not recognise the term Captive portal when talking about ISA Server. Are you refering to the IAG server or did you really mean ISA?
If you did mean ISA, can you give some details?
0
 

Author Comment

by:rpmindtools
ID: 20346485
I am checking if there is any captive portal feature avaiable with ISA. What is IAG btw
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 20346553
OK - no, there is not. ISA is a firewall and application-layer gateway (as in content filtering)

The IAG is the Intelligent Application Gateway - Microsoft bought out Whale technology last year and customised it keeping the core technology and adding a lot of the functions from ISA Server - welcome the IAG2007.
http://www.microsoft.com/forefront/edgesecurity/iag/default.mspx

I use this now as my front end to Sharepoint which is the Portal System.
http://office.microsoft.com/en-gb/sharepointserver/FX100492001033.aspx?ofcresset=1





0
 

Author Closing Comment

by:rpmindtools
ID: 31410873
Thanks
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
An article on effective troubleshooting
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question