Skip to main content
Whitelist — labelled Whitelisting in the admin — is for devices that can’t interact with a Captive Portal. Printers, IoT sensors, signage, barcode scanners, VoIP phones, media players. Instead of a sign-in flow, the Whitelist module pre-approves a device by its MAC address and lets it straight through. Typical audiences: any venue that runs headless or keyboardless devices alongside human guests, shared offices, co-working spaces with printers and phones, smart buildings with sensor networks.
Whitelisting module admin page

How a device “signs in”

There is no sign-in flow. When the device appears on the network:
  1. Sign In matches the device’s MAC address against the Whitelist.
  2. If a matching entry exists and its Valid Until is still in the future, the device is admitted straight onto the network — no credentials, no portal render, no user action. It keeps access for exactly as long as that Valid Until remains in the future; when the date passes, the entry expires and the device is dropped.
  3. A device whose MAC isn’t on the whitelist — or whose entry has expired — isn’t admitted through this module. What the device sees then depends on the network integration: typically the Captive Portal, or an unchanged “no internet” state.

Adding a whitelist entry

The Whitelist module is always available on a Sign-In Context — there is no Activate / Disable toggle. Go to Sign In Modules → Whitelisting and add entries directly. Each entry has:
  • MAC address — required. Must be a valid MAC (AA:BB:CC:DD:EE:FF or AA-BB-CC-DD-EE-FF). Anything else is rejected.
  • Name — 2–100 characters, admin-only label.
  • Description — up to 200 characters, admin-only.
  • Tags — optional labels (e.g. printer, floor-3, tenant-acme) applied separately from the batch upload, used for filtering later.
  • Length policy — how long the entry stays active:
    • Forever — no expiry.
    • Timeout — a number of days from creation.
    • End date — a concrete date after which the entry expires.

Bulk upload

Use the batch upload for onboarding many devices at once. Each row in the upload carries MAC (required), Name, and Description. Tags are applied after the import from the UI.

MAC address considerations

  • MAC randomization — modern consumer devices (iPhone, Android, recent macOS and Windows) randomize their MAC per SSID. Whitelisting is not a good fit for personal devices for this reason — use Self-Provisioning by Email or other identity-based modules instead.
  • Locally administered vs universally administered MACs — both work, but if you’re issuing MACs (for example from a DHCP reservation), keep a consistent format.

Self-Service Portal

Organization admins create whitelistings directly from Sign In Modules → Whitelisting and aren’t subject to any length or quantity limits. They can give a new entry any Valid Until date, or leave it to never expire. Everything below this line is about a different audience: end-users of the Self-Service Portal who get the right to whitelist their own devices — speakers, TVs, sensors, printers — through an Access Policy that has Whitelisting Permission enabled. Typical scenarios:
  • Residents in a co-living or student-housing Context adding their own media devices.
  • Office staff registering the meeting-room speakers assigned to their floor.
  • Classroom teachers adding the shared iPads used that term.
These users don’t have admin access. They land on the Self-Service Portal, see a Manage Whitelistings surface if the policy allows it, and submit MAC addresses from there.

The Whitelisting Permission on an Access Policy

On the Access Policy’s Self-Service Permissions → Manage Whitelistings sub-tab, flip Enable Whitelisting Permission on and choose a Ticket Policy. The policy decides what Valid Until gets stamped on entries the user creates:
Ticket PolicyWhat happens when the user whitelists a device
ForeverNo end date — the entry never expires on its own.
TimeoutThe entry expires n days after creation. n is the policy’s Timeout for whitelisting field.
End dateEvery entry gets the same fixed end date chosen on the policy. Useful for a single event, a school term, a project window.
CalendarThe user picks the end date in a calendar when they create the entry. Max whitelisting length (in days) caps how far ahead they can pick (0 means no limit). Default whitelisting length (in days) pre-fills the picker.
Alongside the Ticket Policy, the policy also carries:
  • Max number of active Whitelistings — caps how many active entries this user can have at once. 0 means no limit. Hitting the cap blocks further creation until an older entry expires or is revoked.
Save with Update Whitelisting Permission.

What the Self-Service user sees

Users with this permission see My Devices in the Self-Service Portal — a combined list of the email-verified registrations the user owns plus the whitelistings they have created themselves. Filter pills at the top switch between Active, Expired, and All; expanding a row shows status, MAC address, last-seen timestamp, how it was verified, and — when known — the device’s operating system and browser.
My Devices list with a whitelisting expanded, showing Verified status, MAC address, Modify and Revoke buttons
Every active entry carries Modify and Revoke actions. Revoking removes the pre-approval, so a matching MAC address no longer enters the network automatically.

Adding a whitelisting

An Add device button opens the creation form:
Create Whitelisting modal with Name, Description, and MAC address fields
  • Name — required; shown in the user’s list.
  • Description — optional; useful for location or ownership context.
  • MAC address — required, in aa:bb:cc:dd:ee:ff format.
  • Valid Until — shown only for Calendar Ticket Policies; the date picker is capped by Max whitelisting length (in days). Forever, Timeout, and End date policies stamp the end date from the policy itself without prompting the user.
What the user can’t do — overriding the Ticket Policy, extending beyond the calendar max, or exceeding the active cap — is enforced server-side; the UI refuses the request and surfaces a policy-rooted error message. Admins see Self-Service-created entries in the same admin-side Whitelistings list, tagged with the creating user’s email under Created by, and can revoke or edit them like any other entry. For the surrounding portal — sign-in, the Context picker, the capability-driven rendering of each card — see the Self-Service Portal overview.

Self-Provisioning by Email

For personal devices that do have a user behind them.

Device blocking

The opposite of whitelisting — deny a specific MAC.