Captive Portal Authentication Flow

J
Julien Robert, CTO

A network flow diagram for captive portal authentication in an educational institution — showing how student devices move through 802.1X/RADIUS authentication, dynamic VLAN assignment, and captive portal fallback. Two paths are modeled: authenticated devices go straight to the student VLAN; unauthenticated BYOD devices hit the quarantine VLAN and get redirected to the portal. Built for IT administrators and network architects who need to document or communicate their access control architecture.

How to create a Captive Portal Authentication Flow

To create a captive portal authentication flow, follow these steps:

01.
List the main components
Identify every network element: access points, switches, RADIUS server, firewall, Nginx frontend, backend API, VLANs.
02.
Define the two authentication paths
Path A: 802.1X credentials → RADIUS → student VLAN. Path B: BYOD → quarantine VLAN → captive portal.
03.
Organize with subgraphs
Group elements into labeled subgraphs: Network Access, Switch Authentication, Dynamic VLANs, Captive Portal, Internet.
04.
Model the decision point
After the firewall, use a diamond node to check for an active session. No session → redirect. Active session → internet access.
05.
Show the portal authentication flow
Redirect → Nginx → backend API → validation → session creation → redirect to internet.
06.
Add the RADIUS success path
Show how authenticated 802.1X traffic bypasses the portal and routes directly to the internet.
07.
Label edges
Annotate arrows with protocol and port details where relevant — this makes the diagram useful as actual reference documentation.

Share with others

Tags

Network ArchitectureAuthenticationCaptive Portal802.1XRADIUSVLANFlowchartIT InfrastructureEducation

You might also like

View all

P2P Process Flow (simple)

A streamlined version of the Procure-to-Pay flow covering the essentials: requisition, PO creation, delivery, and payment — split across Procurement and Management swimlanes. Use this when you need a quick visual for stakeholder presentations, team onboarding, or process documentation that doesn't need every edge case mapped out.
A
Aditya Kumar, Finance Analyst

Fibonacci Communication Development Model

A theoretical framework mapping the Fibonacci sequence backwards onto the evolution of communication – from an infant's first silence through language acquisition, social scaling, and civilizational complexity. Six subgraphs layer the model: core principles, linguistic development stages, trans-scalar social dynamics, civilizational lifecycle, diagnostic protocols, safeguarding rules, and ultimate insights. Built for researchers, systems thinkers, and educators exploring how communication patterns replicate across scales.
J
Jef Singh

Historical Events Timeline

Chronicle events, milestones, or developments across time periods in a structured visual narrative. This template organizes history into sections and eras, making it easy to see how things evolved and what happened when. Ideal for documenting company history, product roadmaps, historical analysis, industry evolution, or educational content.
M
Mermaid

Login Sequence Diagram

Map every step of user authentication. This template shows the back-and-forth between a user, your login interface, validation logic, and database — making it clear where credentials are checked, how responses flow back, and what happens after successful authentication. It's a straightforward way to document login flows, debug authentication issues, or explain security processes to your team without getting lost in technical specs.
M
Mermaid