<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment. in Cloud Networking Platform</title>
    <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440559#M10146</link>
    <description>&lt;P&gt;Thanks for sharing this Adam. &lt;/P&gt;</description>
    <pubDate>Thu, 18 Apr 2019 06:56:08 GMT</pubDate>
    <dc:creator>sbyatt</dc:creator>
    <dc:date>2019-04-18T06:56:08Z</dc:date>
    <item>
      <title>Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440557#M10144</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;&lt;P&gt;I have recently implemented single sign-on of the Meraki dashboard with Azure AD.&lt;/P&gt;&lt;P&gt;Here is the article I have just written about it;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/meraki-dashboard-sso-azure-ad-services-microsoft-identity-adam-sedar/" target="_self" rel="nofollow noopener noreferrer"&gt;https://www.linkedin.com/pulse/meraki-dashboard-sso-azure-ad-services-microsoft-identity-adam-sedar/ &lt;/A&gt;&lt;/P&gt;&lt;P&gt;I found a little stumbling block when I first did this work, that I did not include in the article.&lt;/P&gt;&lt;P&gt;Firstly. If you enable group-based claims within Azure AD, you need to be running an up to date version of Microsoft AD connect software.&lt;/P&gt;&lt;P&gt;Only the more recent versions of the software provide the ability to replicate on-premise group names (rather just the GUID) to Azure AD.&lt;/P&gt;&lt;P&gt;This is only required if you want to use on-premise AD groups, to give access to the SSO Meraki portal.&lt;/P&gt;&lt;P&gt;Secondly, I found (and tested multiple times) that when the SAML token is sent to Meraki, yes the AD groups are also listed under the role claim.&lt;/P&gt;&lt;P&gt;However, the problem is that all the groups that the user is a member of, are sent.&lt;/P&gt;&lt;P&gt;From what I can tell the Meraki dashboard only reads the first role claim entry, not all of the lines.&lt;/P&gt;&lt;P&gt;In the article above, I have documented using Azure RBAC function within the Azure enterprise application, thus you can map an RBAC role (by value) to a group role claim, which enabled the SSO to work.&lt;/P&gt;&lt;P&gt;Also enabling you to give different Meraki rights based on user or group, the same as ADFS.&lt;/P&gt;&lt;P&gt;What is nice (in my opinion) is that you don't need to place a non-SAAS service dependency on your Meraki SAAS management.&lt;/P&gt;&lt;P&gt;I hope this helps people.&lt;/P&gt;&lt;P&gt;All the best.&lt;/P&gt;&lt;P&gt;Adam.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 13:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440557#M10144</guid>
      <dc:creator>AdamSedar</dc:creator>
      <dc:date>2019-04-17T13:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440558#M10145</link>
      <description>&lt;P&gt;Well done!  That is impressive!&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 22:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440558#M10145</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2019-04-17T22:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440559#M10146</link>
      <description>&lt;P&gt;Thanks for sharing this Adam. &lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 06:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440559#M10146</guid>
      <dc:creator>sbyatt</dc:creator>
      <dc:date>2019-04-18T06:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440560#M10147</link>
      <description>&lt;P&gt;Thanks very much Philip.&lt;/P&gt;&lt;P&gt;I found that there seemed to be a functionality gap here and I couldn't find any simple, full guides on how to achieve something which I thought made sense.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Adam.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 08:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440560#M10147</guid>
      <dc:creator>AdamSedar</dc:creator>
      <dc:date>2019-04-18T08:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440561#M10148</link>
      <description>No worries Steve. What's the chances of getting something like this documented officially within Meraki, Microsoft Azure's Identity Services become commonplace now. &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;</description>
      <pubDate>Thu, 18 Apr 2019 13:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440561#M10148</guid>
      <dc:creator>AdamSedar</dc:creator>
      <dc:date>2019-04-18T13:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440562#M10149</link>
      <description>&lt;P&gt;Not sure Adam, but between Paul and I we will try to find out &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 13:36:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440562#M10149</guid>
      <dc:creator>sbyatt</dc:creator>
      <dc:date>2019-04-18T13:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440563#M10150</link>
      <description>&lt;P&gt;No matter what I try to do when editing the JSON I get&lt;/P&gt;&lt;P&gt;"Failed to update Meraki Dashboard application. "Error detail: One or more properties contains invalid values.""&lt;/P&gt;&lt;P&gt;The JSON now also has more attributes than it used to:&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;  &lt;/SPAN&gt;&lt;SPAN&gt;"allowedMemberTypes"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;[&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;                &lt;/SPAN&gt;&lt;SPAN&gt;"User"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;],&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"description"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;"msiam_access"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"displayName"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;"msiam_access"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"id"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;"xxxxxx-yyyy-ffff-nnnn-jgjgjgjg"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"isEnabled"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;true&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"lang"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;null&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"origin"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;"Application"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;            &lt;/SPAN&gt;&lt;SPAN&gt;"value"&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;null&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;For some reason this SAML implementation has been a pain in the ass compared to all the other apps we use. &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;The full JSON looks like this when it throws the error&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;"appRoles": [&lt;BR /&gt;{&lt;BR /&gt;"allowedMemberTypes": [&lt;BR /&gt;"User"&lt;BR /&gt;],&lt;BR /&gt;"description": "msiam_access",&lt;BR /&gt;"displayName": "msiam_access",&lt;BR /&gt;"id": "&amp;lt;Default Guid&amp;gt;",&lt;BR /&gt;"isEnabled": true,&lt;BR /&gt;"lang": null,&lt;BR /&gt;"origin": "Application",&lt;BR /&gt;"value": null&lt;BR /&gt;},&lt;BR /&gt;{&lt;BR /&gt;"allowedMemberTypes": [&lt;BR /&gt;"User"&lt;BR /&gt;],&lt;BR /&gt;"description": "Meraki Admin",&lt;BR /&gt;"displayName": "Meraki Admin",&lt;BR /&gt;"id": "randomly created GUID",&lt;BR /&gt;"isEnabled": true,&lt;BR /&gt;"lang": null,&lt;BR /&gt;"origin": "Application",&lt;BR /&gt;"value": "Meraki Dashboard Admin SAML Group name"&lt;BR /&gt;}&lt;BR /&gt;],&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 24 Jun 2020 08:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440563#M10150</guid>
      <dc:creator>c53e</dc:creator>
      <dc:date>2020-06-24T08:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440564#M10151</link>
      <description>&lt;P&gt;Hey man, no idea if you ever figured this out, but if not, remove &lt;SPAN&gt;"origin": "Application", from all custom roles.  That is what AzureAD doesn't like&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 23:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440564#M10151</guid>
      <dc:creator>Nick Oleson</dc:creator>
      <dc:date>2020-10-08T23:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440565#M10152</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Adam,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you for your post, it was very helpful. I have a question, where should I access the Meraki Dashboard so I can use SSO. When I go to &lt;/SPAN&gt;&lt;A href="https://dashboard.meraki.com/" target="_blank" rel="noopener nofollow noreferrer"&gt;https://dashboard.meraki.com&lt;/A&gt;&lt;SPAN&gt;, I have no option to use SSO. I'm told by Meraki that I have to access the dashboard from Azure. So I went to the O365 "MyApp" and access the "Meraki Dashboard" app there. When I do that, I was redirected to Meraki and all I see is the word "true". What am I doing wrong? Your help is much appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KitCheng_0-1651675165578.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/262355iBC0B873A2F0EB5F5/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Kit&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 14:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440565#M10152</guid>
      <dc:creator>skc@irm.com</dc:creator>
      <dc:date>2022-05-04T14:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Single Sign-On (SSO) integration with Azure AD. Including granular rights assignment.</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440566#M10153</link>
      <description>&lt;P&gt;Status update:&lt;/P&gt;&lt;P&gt;So, I figured out my problem.  Apparently, you should use a different email for your SAML login than your manual.  I was using my work email address as the manual logon to the dashboard.  Once I change the manual logon to another email address, SSO is now working.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kit&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 17:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/meraki-single-sign-on-sso-integration-with-azure-ad-including/m-p/5440566#M10153</guid>
      <dc:creator>skc@irm.com</dc:creator>
      <dc:date>2022-05-05T17:56:39Z</dc:date>
    </item>
  </channel>
</rss>

