Currently, we have a captive portal solution with a RADIUS service that sends both a session timeout and bandwidth caps with its accept messages.
The problem is, not all devices that may be on the guest network are compatible with a captive portal solution.
To make it easy for our end users, we intend to provide a page that allows users to add certain MAC addresses on their account that should be authenticated upon logging into their account (or on-demand via web interface)
End users may roam between networks within the organization and our networks must be combined networks for various reasons.
The intent was to leverage the SplashAuthorizationStatus method on the network their primary device was seen at and simply authorize all of the MAC addresses on their account, but that does not seem to be supported on a combined network.
We then thought Group Policies may work, but we want the authorization to be temporary and only triggered upon a successful authentication of an account (I.E. a cellphone login on the network, then allow access to a roku with the MAC address on file for 24 hours)
The only way we could currently accomplish this would be to have a service go through and reverse each group policy after its intended timeout.
Group Policies are intended for dynamic auth without RADIUS, but they do not seem to be a good replacement in their current state. We would very much like these features added to Group Policies & its API and/or the SplashAuthorizationStatus endpoint be upgraded to support combined networks.