Passpoint

Passpoint, also known as Hotspot 2.0, is a Wi-Fi Alliance protocol that discovers and authenticates Wi-Fi hotspots for accessing the internet. It streamlines network access in Wi-Fi hotspots and eliminates finding and authenticating a network each time a user connects. It’s based on the IEEE 802.11u standard for interworking with external networks.

Passpoint provides the ability for your device to connect to available Passpoint-certified Wi-Fi hotspots automatically. This provides better bandwidth to users and relieves carrier infrastructure of traffic.

Passpoint features

Passpoint provides features for security, flexibility, and simple deployment such as:

  • Automatic discovery and selection
  • Roaming between hotspots
  • Single SSID online sign-up
  • Operator-specific policies
  • Enterprise-level security for SIM and non-SIM devices alike

Passpoint benefits

There are multiple benefits to using Passpoint:

  • Public hotspots are easier to identify and more secure. For example, your device will automatically connect to the real public airport Wi-Fi without having to manually test multiple networks
  • Network providers can become partners with other providers, meaning hotspot locations are more prevalent.
  • Passpoint networks require enterprise-grade WPA2 encryption, meaning security is more than that of open Wi-Fi networks.

How to use Passpoint networks

Passpoint is supported in the latest version of Windows 10, macOS 10.9 or newer, Android 6.0 or newer, and iOS 7 or newer.

To connect, simply open the list of nearby Wi-Fi networks on your device and connect to the Passpoint-certified option. Once done, your device will automatically connect to affiliated Passpoint networks in the future.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...