<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IdP Initiated SAML SSO for Meraki Dashboard in Cloud Networking Platform</title>
    <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419392#M6115</link>
    <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt; great content and discussion. This is what these boards are for. Way better than just links to the KB articles. &lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 12:52:54 GMT</pubDate>
    <dc:creator>RTownsend</dc:creator>
    <dc:date>2024-07-17T12:52:54Z</dc:date>
    <item>
      <title>IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419366#M6089</link>
      <description>&lt;P&gt;Lately, SSO login for Meraki Dashboard has been a huge nuisance for me, as I'm getting access to more and more customer organisations that use SAML SSO in their organizations.&lt;/P&gt;&lt;P&gt;If unsuccessful in convincing their IT teams to add me directly as a local admin to their Org, I have to go through having my account created in their Azure tenant.&lt;/P&gt;&lt;P&gt;Which by all means is probably also the correct way, IT security wise.&lt;/P&gt;&lt;P&gt;But as an MSP with access to many customers, SSO is a PITA. Many customers followed the guides on the Meraki Documentation on how to setup SSO for their org in Meraki, but this has also resulted in many organisations' lack of consideration of the different SAML attributes in Azure.&lt;/P&gt;&lt;P&gt;An easy fix would be to set the username attribute to something else than &lt;FONT face="courier new,courier"&gt;userprincipalname&lt;/FONT&gt;, which for some reason equates to their email address. In my tests, using &lt;FONT face="courier new,courier"&gt;employeeid&lt;/FONT&gt; is usually the best alternative, since chances are that this is more unique between customers and organisations, and especially for external consultants like myself. &lt;/P&gt;&lt;P&gt;I'm curious as to how others handle SAML SSO from an MSP stand of view? Do you also spend days during first time onboarding in just trying to get access, by having to make the customer reconfigure their Dashboard App, which by all means works for them?&lt;/P&gt;&lt;P&gt;What are you tips&amp;amp;tricks for when setting up SAML SSO? Or is there a simple Meraki setting that I'm just not aware of, that will fix everything, without having to touch their Azure tenant?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 18:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419366#M6089</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-15T18:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419367#M6090</link>
      <description>&lt;P&gt;And well, this also goes to SP-initiated SAML SSO.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 18:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419367#M6090</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-15T18:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419368#M6091</link>
      <description>&lt;P&gt;The SAML SSO configuration guide, clearly states that one should set the username attribute to email, but also clearly warns against it.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rhbirkelund_0-1721067718238.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263585i067AB4338019BB86/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This really messes things up for MSPs and those of us who are external consultants.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 18:23:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419368#M6091</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-15T18:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419369#M6092</link>
      <description>&lt;P&gt;Do you know the dashboard can support multiple SAML providers at the same time?&lt;/P&gt;&lt;P&gt;You should add your Idp to customers that you manage, so you can log in with the username in your tennancy.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 20:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419369#M6092</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-15T20:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419370#M6093</link>
      <description>&lt;P&gt;I've never done a SAML deployment where I used the email address.  It just doesn't work in practice.  I usually make it "&lt;SPAN&gt;user.displayname".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 20:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419370#M6093</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-15T20:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419371#M6094</link>
      <description>&lt;P&gt;Yes, but I tend to prefer not to do any major changes to customers dashboards, just in order to give me access.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 05:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419371#M6094</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T05:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419372#M6095</link>
      <description>&lt;P&gt;A minimal config requires only two fields to be filled in - the "X.509 cert SHA1 fingerprint" and "SSO login URL".&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_1-1721108224895.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263587i03C13DB6EEB3DC75/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;That's the same number of fields to add a local Meraki user ...&lt;/P&gt;&lt;P&gt;I personally like having my own SAML roles (instead of using the Customers), and if you like that too - that is just two more fields, "Role" and "&lt;SPAN&gt;Organization access".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_0-1721108198369.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263588i09E6D535D112FD46/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 05:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419372#M6095</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T05:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419373#M6096</link>
      <description>&lt;P&gt;What would be the best course of action then, for an MSP with access to many customers?&lt;/P&gt;&lt;P&gt;If we add our company tenant as IdP to the customers' organizations, we'd need to then set up a Dashboard application per customer. WOuldn't that then result in many different customer apps on the myapp.microsoft.com page?&lt;/P&gt;&lt;P&gt;Or in the case of SP-initiated, they'd have to set a unique subdomain for their SSO login?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 06:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419373#M6096</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T06:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419374#M6097</link>
      <description>&lt;P&gt;Negative.  Let me give you the link for SAML configuration for MSPs:&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_Dashboard#SAML_SSO_for_MSPs" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_Dashboard#SAML_SSO_for_MSPs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;"SAML does support the use of multiple organizations. Similarly to traditional logins, it needs to determine that the user is identical across the affected organizations. Thus, for this to occur, the following must be identical across the designed organizations:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;X.509 cert fingerprint for the organization (case sensitive)&lt;/LI&gt;&lt;LI&gt;SAML administrator role (as only one role attribute can be used in the token)&lt;UL&gt;&lt;LI&gt;The permissions granted can be different in each Organization, but the role name must be identical&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When this occurs, the user will be directed to the MSP portal and receive the desired permissions in each organization. The&lt;SPAN&gt; &lt;/SPAN&gt;&lt;STRONG&gt;Consumer URL&lt;/STRONG&gt;&lt;SPAN&gt; &lt;/SPAN&gt;for any of the MSP organizations can be used, as they will all direct the user to the MSP portal."&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419374#M6097</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T07:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419375#M6098</link>
      <description>&lt;P&gt;When you set it up - you only set it up for your own companies dashboard.  However you load the same SHA certificate hash into every customers Meraki Dashboard - and that gets you the access automatically.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419375#M6098</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T07:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419376#M6099</link>
      <description>&lt;P&gt;We have a single enterprise app in Entra and then use the same certificate fingerprint configured in all our customer Meraki orgs - this allows IdP initiated login for us as the MSP to all. We have two roles, one for read only and one for full.&lt;/P&gt;&lt;P&gt;The customer can then optionally setup their own alongside this.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419376#M6099</guid>
      <dc:creator>JamesT91</dc:creator>
      <dc:date>2024-07-16T07:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419377#M6100</link>
      <description>&lt;P&gt;Another way you could attack this (I have not tested this) would be to get the customer to add your email address to their Entra ID as a guest user.  Then grant that guest user access to the Meraki Entra ID app.  It should work.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_0-1721115137223.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263590i1C4464AD6A0ACDA8/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You could make it smoother by having the customer create an Entra ID B2B relationship between their Entra ID tennancy and yours to trust your MFA.  This requires your customer to have an Entra ID P1 licence or better.&lt;BR /&gt;This would allow you to do seemless sign in to your customers Meraki environment.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_1-1721115205588.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263589i6B4787F51B8B684F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But personally, I prefer direct SAML to the dashboard from your environment ...&lt;/P&gt;&lt;P&gt;And more specifically, I prefer Cisco Duo as the SAML Idp because it is so much easier to setup and manage ...&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419377#M6100</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T07:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419378#M6101</link>
      <description>&lt;P&gt;So by using the same SHA certificiate (thumbprint) across different organizations, we'd be able to get the same Dashboard experience with a Organization Dropdown, and switch between organizations?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419378#M6101</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T07:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419379#M6102</link>
      <description>&lt;P&gt;Having the customer adding med as a Guest User in their tenant, is usually where it goes badly. I'm added with my company email as a guest to the customers tenant, and as my email is already known as local account on many other customers organizations, I end up getting redirected to the Meraki "true" page with a SAML login failure in the dashboard logs.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 07:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419379#M6102</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T07:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419380#M6103</link>
      <description>&lt;P&gt;Same SHA certificate &lt;SPAN&gt;thumbprint &lt;/SPAN&gt;and SAML role name.  Correct.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 08:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419380#M6103</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T08:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419381#M6104</link>
      <description>&lt;P&gt;When I set up the Dashboard App in Azure, the identifier (Entity ID) needs to be my SSO url &amp;lt;subdomain&amp;gt;.sso.meraki.com.&lt;/P&gt;&lt;P&gt;If use the generic URL, SSO fails with the error that the identifier was not found.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Skærmbillede 2024-07-16 kl. 10.30.26.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263591i14D9CBF9BDB31210/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rhbirkelund_2-1721119192840.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263592iD29B750CF21C2780/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The identifier (and Sign-on URL) are configured in Azure on a per organization basis, as I see it. So to have multiple organizations, I'd end up with many different dashboard applications in Azure. Unless I'm misunderstanding something?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 08:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419381#M6104</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T08:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419382#M6105</link>
      <description>&lt;P&gt;Don't use a sub-domain (so you are doing Idp initiated login).&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_0-1721119575686.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263593i39B84A5664370272/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 08:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419382#M6105</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T08:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419383#M6106</link>
      <description>&lt;P&gt;This is what the SAML configuration looks like for one of our clients.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_1-1721121257370.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263595i4FA8AE95E6CFBC0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 09:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419383#M6106</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T09:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419384#M6107</link>
      <description>&lt;P&gt;Okay. So I add the same SHA thumbprint to another lab dashboard that I have. The consumer url on this Org is different to that of my first Org. In the Dashbord Application on Azure it still referes to the Consumer URL of the first Org. Where should I then reference the Consumer URL for the second org?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 09:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419384#M6107</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2024-07-16T09:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: IdP Initiated SAML SSO for Meraki Dashboard</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419385#M6108</link>
      <description>&lt;P&gt;&amp;gt;&lt;SPAN&gt; Where should I then reference the Consumer URL for the second org?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You don't.  It is unused.  As soon as you have two configured it then takes you to the MSP portal.&lt;/P&gt;&lt;P&gt;I just onboarded another brand new org.  On the Meraki Dashboard org settings side, it just needed the config below.  Onboarding is super simple!&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PhilipDAth_0-1721121710595.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263597i6AFB8A2257820750/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 09:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/idp-initiated-saml-sso-for-meraki-dashboard/m-p/5419385#M6108</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-07-16T09:23:11Z</dc:date>
    </item>
  </channel>
</rss>

