Captive Portal Limitations
This form of proxy authentication has some serious limitations.
-
Each user is supposed to be using a different IP address. If one IP address is shared by different users constant re-authentication or incorrect user to IP session info may occur.
-
Clustering of proxy nodes is not possible as each node would contain its own copy of the session database.
-
This type of authentication works best when there is a human in front of the display screen to type the credentials into login page. If for example, it is the network service which runs behind the proxy - Captive Portal authentication may not be a good choice.