Once the Google Analytics account is set up, the splash page details will be registered by Google Analytics.
Why are Google Analytics insights important
WiFi administrators can use Google Analytics insights together with the Tanaza Dashboard to understand the capacity of the splash page to retain WiFi users and transmit a message. Indeed, by comparing the number of daily splash page views with the number of daily WiFi users, administrators will be able to understand if their landing page is clear enough.
A big difference between this data might reflect a problem in the splash page. For example, it could mean that:
Together with the number of splash page views, WiFi administrators should also take into consideration the bounce rate, which is the percentage of visitors to a particular website who navigate away from the site after viewing only one page.
If the bounce rate is high, it means that the landing page is not effective and it does not encourage people to log in to the WiFi hotspot. A high bounce rate might be related to a slow loading splash page because of a low level of bandwidth, but the bounce rate also reflects the interest of customers about a WiFi hotspot. In contrast, a low bounce rate means that customers perceived the WiFi as a value and that they are willing to connect to the internet.
On this screenshot above you can see that there are 94 page views which means that 94 customers visited the splash page of this WiFi hotspot. When comparing this number with the number of WiFi users given by the Tanaza dashboard, you will be able to understand how many users actually connect to the WiFi hotspot. The average time on page is 33 seconds which is good cause it means that the splash page is clear and effective. The bounce rate is low, which reflects the interest of customers for the WiFi hotspot.
By controlling the average time spent on the splash page, WiFi administrators will understand if the invitation to connect to the WiFi hotspot is clear enough. Indeed, a short time session on the splash page means that the user doesn’t get lost in the process and access the internet without any problems. A long time spent on the splash page would show that the message is not clear enough and that maybe the user doesn’t know where to click to access the WiFi network.
To conclude, using monitoring tools such as Google Analytics together with multi-functional platforms like the Tanaza dashboard helps network administrators maximize their WiFi hotspot by underlying common user trends and helping them discover the best practices to engage their target users.
Tanaza has developed a feature to help WiFi network administrators collect additional custom WiFi user data in addition to the data already collected with authentication methods like social login, like Facebook, Twitter, Instagram, etc.
Once collected, this data can easily be leveraged to execute in-target marketing campaigns, such as email marketing.
Why is it important to collect WiFi user data
Once a user logs into a network using a popular authentication method like social login, the system collects personalized data about the WiFi user, like their gender, age, name, surname, email address, location to name a few. However, since social media platforms have adopted strict policies for user data protection, users can now customize their profiles’ visibility and can choose to keep private the personal information on their social media profiles.
As a result, Tanaza has combined two existing authentication methods to compensate for the lack of data provided by having just one. This latest update known as pre-filled form-based authentication provides a system that allows network administrators to request additional information about their WiFi users by enabling custom form authentication after social login that users must fill in before connecting to the WiFi network.
How to implement this feature in a public WiFi network
To collect more specific data about WiFi users, aside from the one collected with initial authentication method (i.e. social login), WiFi network administrator can simply enable custom form authentication, which consists on asking the users to fill in a custom form to complete the login, as seen on the image below of the Tanaza splash page editor’s Advanced Settings for Facebook Social Login.
This pre-filled form-based authentication is a handy captive portal configuration in public networks located in places like retail stores, supermarkets or educational institutes. By requesting a student number or a fidelity card number, the WiFi network administrator can be offer targeted discounts and share information tailored to the user. What is more, this tool can also serve as a verification system in order to identify that the user is a real user, using their personal phone number.
Thanks to the data retrieved from the WiFi user’s social profile (if its privacy setting allows that) and the information collected using the custom form, WiFi professionals can run various types of targeted marketing campaigns.
Let’s suppose that you were asked to deploy a Wi-Fi network in a restaurant and that your customer wants to collect their Wi-Fi clients’ data to promote their events and special evenings.
In order to collect this type of data easily and quickly, we encourage network admins to enable an easy way for users to login to the Wi-Fi, avoiding complex and long forms to fulfill.
There are two preferred social login flows to achieve this:
Facebook social actions (Like or Check-in)
This social login flow consists of asking Wi-Fi clients to “Log in with Facebook.
UX: After connecting to the Wi-Fi, the Wi-Fi clients will see a splash page, that can be customized with the customer’s logo, their preferred background, and type of advertising. In order to log into the network, they must click the button “Log in with Facebook” on the splash page which will give Facebook permission to access their data. If they accept to provide their complete anagraphic information (or a part of them) to the app “Access Internet”, they will connect to the internet.
PROS: No complex permission needed, no Facebook review needed. Super-easy login flow for the user. You can collect user data (name, surname, hometown location – country and city, birthday, e-mail, age, gender).
CONS: Because not everyone has a Facebook account, you should enable an alternative way to log in (e.g. e-mail, Twitter, Google+).
By choosing the social login, the owner of a venue gives the possibility to his visitors to access the internet through social media like Facebook, Instagram, Twitter, Linkedin, etc. In this article, we give you ten reasons to choose the social login rather than another login mode.
Tanaza allows multiple social logins such as Facebook, Instagram, Twitter, but also Linkedin, VKontakte, Google+, and Windows Live. Leave the choice to your WiFi users!
Nowadays, most of the people have a facebook, or an Instagram, or even a twitter account, on their mobile. This means that in just one click, the user access to the internet! No need to write their email address, or their phone number, or a long password…
Tanaza’s captive portal allows data capture through social login. This means that every time someone logs to your WiFi network, you will be able to collect data such as name, surname, email address, age, gender, location and so on. For the network administrator, it is a great tool to drive marketing campaigns and target the right people.
Thanks to the data capture, you will be able to personalize the client’s experience directly in your venue or through offline marketing campaigns.
Easier login for mobile
Even though mobile screens are always bigger, it is not easy for people to fill out a registration form on their mobile. Thanks to the social login, you will have more mobile registrations, and so more data collected…
Classic Hotspot is compatible with Ubiquiti UniFi APs
With its latest release (firmware 2.17) in December 2017, Tanaza continues its firmware releases for the Ubiquiti Unifi AC access points, starting with the widely used UniFi AC Mesh Pro, UniFi LR (long range) and UniFi AC PRO.
UBNT’s UAP AC APs are widely used by managed solution providers and hotspot providers globally.
Among all Ubiquiti Unifi AC access points, the devices that are already compatible with Tanaza’s software are: Ubiquiti UniFi AP AC PRO, UniFi AC Lite, UniFi AC In-WALL (AC-IW), UniFi AC Mesh, UniFi AC Mesh PRO, and UniFi AC LR (AC Long Range).
Being a cloud-based software, Tanza allows network administrators to manage their multi-vendor devices from the cloud. Also, network admins can manage Ubiquiti Nanostations from the same dashboard they use for their UniFi devices.
Thanks to Tanaza’s software, it is possible to manage the access points from the cloud and create public hotspots with social login as authentication method. Tanaza replaces the stock firmware and adds enterprise configuration capabilities to multi-vendor devices, including TP-Link, Ubiquiti, D-Link, Netgear, Engenius, Ligowave, and others.
How user authentication works with Tanaza’s access points and captive portal
In this article, you will learn about the steps needed to authenticate users on your captive portal through Tanaza’s access points, together with the most used authentication processes enabled by Tanaza (Facebook login, etc.).
Tanaza is a software that allows network admins to manage user authentication in a very intuitive way through the configuration of a customizable captive portal. A captive portal is the web page people see before accessing a public Wi-Fi network, i.e. when they use the free Wi-Fi connection of a bar, restaurant, hotel, shop, etc. At first, when clients try to log in to your Wi-Fi to browse a webpage, they are unauthenticated. Being unauthenticated means that their access to your network is limited to the captive portal, other than content and services included in the Walled Garden. To learn more about which websites and URLs are accessible by a client before authentication read this article. On the captive portal, users can then authenticate themselves and browse the web on their Wi-Fi-enabled devices. Let’s now see the steps needed to authenticate users on a captive portal and the main login methods featured by Tanaza.
Opening of the login page of the captive portal
Clients’ login flow starts in this way: the unauthenticated user’s device reaches your access point and requests access to the Internet. The access point, that is connected to the Tanaza Cloud, sees the request but doesn’t recognize the client as authenticated. Accordingly, instead of showing the user a web page, it redirects the unauthenticated user to the login page, aka your captive portal. Once here, the user authenticates through the captive portal and is therefore authorized to browse the web. Now, the user can freely browse any webpage, using your Wi-Fi network. To better understand how to use the Tanaza captive portal functionality, read this article.
In general, network administrators cannot see the list of users connected to their network in real-time. Instead, Tanaza allows network admins to see the list of connected clients from anywhere, anytime, through a web dashboard, cloud.tanaza.com. Specifically, they see real-time users connected and authenticated (or even in the process of authenticating) through their cloud.tanaza.com management platform. Also, they see the historical data from all authenticated users, together with their personal information, in the Tanaza Analytics Dashboard. The screenshots below show how data about users and connections are viewed on the management platform of the Tanaza Analytics Dashboard.
Why does it matter? This twofold kind of information helps you to understand better how the user authentication process to your Wi-Fi network works and the source of some related issues. For instance, visualizing a client in the list of connected clients on the Tanaza Cloud Platform, but not on the analytics dashboard, allows you to know that that user is in the process of authenticating, but didn’t provide his credentials to access Internet yet. Also, Tanaza can help you to detect potential network issues. The following screenshot shows an example of a connected client: here you can see the signal strength. If this element is red, for instance, it means that the user may have problems in reaching your captive portal due to a weak wireless signal, or that he may experience slow WiFi. The best choice in this case is to add one more access point to your network, in order to provide a stronger signal.
When you configure a click-through login page for user registration, clients authenticate to your network by simply clicking on a button, without providing any personal data. In this case, the authentication process starts once users click on the button and are redirected to the captive portal before accessing the Internet. When the cloud receives users’ request, it notifies the access point of the network that users have authenticated. Now, the access point clears away the captive portal on clients’ devices, and users can fully access Internet. The screenshot below shows how connected clients appear on the Tanaza dashboard: compared to the previous example, you can see more information about clients, as they have successfully authenticated on the captive portal, although in this case no personal data is available. Read this article to know how the Tanaza Analytics Dashboard works.
Typical use case: the click-through login method is favored by companies with an advertising-based business model, which value clicks for their ads and do not need any other personal data the clientele. Usually, network admins add videos, ads and banners on the login page, so as to further emphasise and advertise their products on the captive portal.
Other login methods: social login
Tanaza features a broad range of authentication methods within its captive portal, i.e. access through email or phone, voucher-based authentication, registration by filling a form and authentication using social networks, aka social login. Lately, the extensive use of social media among people led to the spread of social login among the different user login methods adopted by businesses. In this way, users can connect to an SSID using Facebook, Twitter, Instagram, Linkedin, etc. In this case, user authentication is completed when the login flow through social networks ends, meaning when the user accepts the terms and conditions requested by the social network, i.e. Facebook. The cloud then receives the user device’s request and notifies the access point of the network that the client has authenticated. At this point, full network access is granted. The following screenshot shows the Tanaza dashboard containing a connected client, who authenticated through the social login provided by Tanaza using his Twitter account.
Typical use case: any business whose goal is to boost its social visibility and increase its brand awareness leveraging the power of social media. A bar, for instance, could ask its visitors to like its Facebook page or to share their position to gain more visibility among other Facebook users. Also, a well-working wifi enhances the possibilities to gain positive reviews about your business on websites like TripAdvisor and Yelp. Read these instructions to learn how to setup a Tanaza built-in login page with social login.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.