Personal WiFi Docs
  • Getting Started
  • WiFi Integration
    • Summary of supported WiFi vendors
      • Cisco Meraki
        • Meraki oAuth integration
      • Cisco Catalyst WLC (IOS-XE)
      • Cisco Meraki Easy PSK
      • Aruba - Unbound MPSK
      • Fortinet (FortiGate Secure Wireless Controller)
      • Extreme Networks
      • Ruckus SmartZone
      • Cambium cnMaestro
      • Juniper (Mist)
      • TP-Link Omada
      • Huawei - iMaster NCE-Campus
  • Service management
    • Dashboard
    • Managing Accounts
    • Groups
    • Managing Networks
      • Network Managers
    • Units
    • General options
      • Personal Area Networks (PAN)
      • Service Options
      • Organization details
    • Network Policies
    • WiFi Portal & Onboarding
      • Access Control options
      • WiFi Portal options
      • IoT Devices Authentication
      • WiFi Portal distribution
    • Visitors (beta)
    • Admins
      • Multi Organizations
    • Account settings
    • My Profile
    • Support platforms integrations
    • Service Monitoring and Assurance
      • Anomalies
      • Activity Logs
      • Network Health
  • Cloud Identity Platforms integrations
    • Coworking management platforms
      • Optix
      • Office RnD
      • Nexudus
      • Andcards
    • Property Management Systems
      • Oracle Opera Cloud
      • Mews
      • Cloudbeds
      • Apaleo
      • StarRez
    • Enterprise cloud IdPs
      • Microsoft Entra ID (SAML)
      • Microsoft Entra ID (oAuth)
      • Google Workspace (oAuth)
      • Shibboleth
      • Group mapping
    • Passwordless SSO
      • Custom HTTP Request
  • MSP Operations
    • MSP Dashboard
    • MSP Account settings
  • Add-ons
    • Billing
    • White label
    • Passpoint
    • SMS Services - via Twilio
  • APIs
    • Getting Started
    • Account management
  • PRODUCT
    • Coming soon...
      • Engenius Cloud
      • Zyxel Nebula (Pro)
    • Changelog
    • Datasheet
  • Solution guides
    • Student living
      • Sample FAQ: WiFi for the Resident Hall
    • BYOD
Powered by GitBook
On this page

Was this helpful?

  1. Cloud Identity Platforms integrations
  2. Passwordless SSO

Custom HTTP Request

PreviousPasswordless SSONextMSP Dashboard

Last updated 6 months ago

Was this helpful?

You can easily integrate any external user directory by using the Custom HTTP identity verification method.

In the External Identity Provider section of the Setup page, create a new Integration and select Custom HTTP Request.

In the configuration panel, enter your endpoint URL where the request will be made.

Cusna will make an HTTP GET request to the configured endpoint with the following parameters:

  • email: email address the user inserted in the portal

  • locationid: external id configured in the Network associated to the WiFi Portal

Example:

GET https://mycustomendpoint.com/users?email=email@cusna.io&locationid=1234

The GET Request also includes by default a custom header parameter tha tyou can use for futher validating the incoming requests and identifying the source Cusna account

  • x-cusna-organization: <id of your Cusna organization>

Cusna expects to receive as a response a JSON with the following content

{
  "valid": true,
  "id": "1232423532523",
  "firstName":"Ivan",
  "lastName":"Muccini",
  "groupId":"employees12345",
  "groupName":"employees",
  "terminationDate":"01/08/2024"
}
  • valid: boolean, indicate if the account is valid or not (mandatory)

  • id: external id of the record (optional)

  • firstName: first name of the user (optional)

  • lastName: last name of the user (optional)

  • groupId: ID of the group the user belongs to, if any (optional)

  • groupName: name of the group the user belongs to, if any (optional)

  • terminationDate: date the account service will be automatically suspended 9optional)