Implementation of Wireless User Authentication using WLC-Forti Framework


  • Ignatius Agus Supriyono Univeristy of Raharja
  • Irwan Sembiring Satya Wacana Christian University
  • Adi Setiawan Satya Wacana Christian University
  • Iwan Setyawan Satya Wacana Christian University
  • Theophilus Wellem Satya Wacana Christian University
  • Henderi University of Raharja
  • Ilham Hizbuloh University of Raharja



Cloud, Authentication, LDAP, Wireless access, Wireless Controller


Internet access at this time is a daily necessity that cannot be denied. It is certain that most institutions and business entities require internet access in carrying out their activities, including educational institutions. With the development of mobile computer technology in which more users use mobile devices to access the internet, wireless-based network infrastructure is a demand that cannot be postponed any longer. By using a wireless connection to connect to the network, authentication becomes something that must be considered, the use of access to the network by unwanted parties can harm other parties. Changing passwords regularly is important to avoid misuse of access to the network by other parties. This paper presents a problem where when an educational institution implements the Bring Your Own Device (BYOD) program, students and teachers cannot change passwords using the personal device used, this is because the personal device is not registered with the domain controller at the institution. The solution proposed in this article is to move the NPS RADIUS server function on the local site to LDAP in the cloud using a combination of WLC which handles Wi-Fi clients and Fortinet which handles authentication to the cloud. The implementation results show that the WLC-Forti framework functions well.


S. Pranata and H. T. Nugroho, “2fysh two factor authentication you should have for password replacement,” vol. 17, no. 2, pp. 693–702, 2019, doi.v17i2.9187.

S. W. Chin, K. G. Tay, C. C. Chew, A. Huong, and R. A. Rahim, “Dorsal hand vein authentication system using artificial neural network,” vol. 21, no. 3, pp. 1837–1846, 2021, doi 10.11591ijeecs.v21.i3.pp1837-1846.

T. Mehraj, M. A. Sheheryar, S. A. Lone, and A. H. Mir, “A critical insight into the identity authentication systems on smartphoneS” vol. 13, no. 3, pp. 982–989, 2019, doi 10.11591ijeecs.v13.i3.pp982-989.

B. Hajimirzaei, “Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm,” Ict Express, vol. 5, no. 1, pp. 56–59, 2019, doi 10.1016/j.icte.2018.01.014.

J. Zhou and Q. Wang, “Lightweight Authentication Billing Enhancement Mechanism Based on the Fourier Fast Transform Algorithm,” vol. 2022, 2022.

P. Wanda and H. J. Jie, “Efficient Data Security for Mobile Instant Messenger,” vol. 16, no. 3, pp. 1426–1434, 2018, doi:10.12928/TELKOMNIKA.v16i3.4045.

Z. Asmae, P. El, and O. Nabih, “Implementation of a bluetooth attack on controller area network,” vol. 21, no. 1, pp. 321–327, 2021, doi 10.11591/ijeecs.v21.i1.pp321-327.

C. Alezander, O. Villanueva, and A. Roman-gonzalez, “International Journal of Advanced and Applied Sciences Implementation of a RADIUS server for access control through authentication in wireless networks,” vol. 10, no. 3, pp. 183–188, 2023.

S. J. Mohammed and S. A. Mehdi, “Web application authentication using zkp and novel 6d chaotic system,” vol. 20, no. 3, pp. 1522–1529, 2020, doi: 10.11591/ijeecs.v20.i3.pp1522-1529.

D. Sudyana and N. Lizarti, “Forensic Investigation Framework on Server Side of Private Cloud Computing,” vol. 10, no. 3, pp. 181–192, 2019.

M. H. Mahdi and I. A. Ibrahim, “Enhancing the security of quality of service oriented distributed routing protocol for hybrid wireless network,” vol. 30, no. 1, pp. 121–128, 2023, doi 10.11591/ijeecs.v30.i1.pp121-128.

A. A. Talib and A. D. Salman, “Design and develop authentication in electronic payment systems based on IoT and biometric,” vol. 20, no. 6, pp. 1297–1306, 2022, doi 10.12928/TELKOMNIKA.v20i6.22157.

I. M. Sukarsa, I. N. Piarsa, I. G. Bagus, and P. Putra, “Simple solution for low cost bandwidth management,” vol. 19, no. 4, pp. 1419–1427, 2021, doi 10.12928/TELKOMNIKA.v19i4.17109.

A. Ezugwu, E. Ukwandu, C. Ugwu, M. Ezema, C. Olebara, and J. Ndunagu, “Password-Based Authentication and The Experiences of End Users,” no. 2019.

A. H. Aly, A. Ghalwash, M. M. Nasr, and A. A. A. El-hafez, “Formal security analysis of lightweight authenticated key agreement protocol for IoT in cloud computing,” vol. 24, no. 1, pp. 621–636, 2021, doi: 10.11591/ijeecs.v24.i1.pp621-636




How to Cite

Supriyono, I. A., Sembiring, I., Setiawan, A., Setyawan, I., Wellem, T., Henderi, & Hizbuloh, I. (2023). Implementation of Wireless User Authentication using WLC-Forti Framework. Aptisi Transactions on Technopreneurship (ATT), 5(2sp), 234–242.