in reply to this object

It seems I'm stuck on the side. Don't know how to configure (dynamic pre-shared key).

https://forum.openwrt.org/t/dynamic-pre-shared-key-dpsk-via-radius/193298?u=chrichri

Yes!

+ :

On an unencrypted registration SSID authorized a client through a portal page.

Then showed the client via dpsk (dynamic pre-shared key) provisioner login data for the encrypted SSID to connect to a network with internet access.

When the client connects to the unencrypted SSID it gets redirected to a portal to enter an email address (and possibly other data). Packetfence sends an email to a pre-configured address (owned by the sponsor) containing a link to approve the request for access.

The client waits on a portal html page for the sponsor to click the link. After the sponsor clicks the link to approve the request the clients web page reloads and shows the name of the encrypted SSID to connect to and a password for the connection.

Next step to accomplish: configure OpenWRT (hostapd) and Packetfence to allow the usage of the PSK to connect to the encrypted SSID.

BTW: Testing this I'm using to switch seamlessly between my notebook and my which I use as a test client for the wifi connection to the OpenWRT access point.

To learn more about and integration into I set up a packetfence server on an H3.

I'll try to integrate a TP Link RE500 running . While reading into wifi related stuff I found the README which turned out to be a perfect introduction to the topic.

It didn't deliver on my expectation for documentation about the file hostapd.vlan in OpenWRT, but that might be an include as well. Otherwise its content has been a nice surprise!