<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless network with splash page / AD authentication in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473710#M293322</link>
    <description>&lt;P&gt;By AD Authentication do you mean 802.1x Radius?  If so then it does look like you could have that selected for Network Access section and the spash 'Click-Through' is served by the Meraki servers so no certificate needed.  &lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 815px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/268521iF09D5439E49613CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Feb 2018 16:05:18 GMT</pubDate>
    <dc:creator>simple818</dc:creator>
    <dc:date>2018-02-13T16:05:18Z</dc:date>
    <item>
      <title>Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473709#M293321</link>
      <description>&lt;P&gt;I see in the documentation that a MR33 wireless AP can use AD authentication and a "splash-page" sign on option.&lt;/P&gt;&lt;P&gt;Does this require that a certificate be installed on the Meraki AP? One that is valid on a public / commercial level, so that it doesn't throw up errors when users see it? Or is that not an issue?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473709#M293321</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2018-02-13T15:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473710#M293322</link>
      <description>&lt;P&gt;By AD Authentication do you mean 802.1x Radius?  If so then it does look like you could have that selected for Network Access section and the spash 'Click-Through' is served by the Meraki servers so no certificate needed.  &lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 815px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/268521iF09D5439E49613CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473710#M293322</guid>
      <dc:creator>simple818</dc:creator>
      <dc:date>2018-02-13T16:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473711#M293323</link>
      <description>&lt;P&gt;Actually, I was think of this&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Splash_Page/Integrating_Active_Directory_with_Sign-On_Splash_Page" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Splash_Page/Integrating_Active_Directory_with_Sign-On_Splash_Page&lt;/A&gt;&lt;/P&gt;&lt;P&gt;unless that requires the MX appliance&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:52:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473711#M293323</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2018-02-13T16:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473712#M293324</link>
      <description>&lt;P&gt;You can do this in a few different ways. You can do 802.1x which can be implemented using AD.&lt;/P&gt;&lt;P&gt;Or, you can use splash page sign on with AD authentication. You will need to have a certificate on your server so the AP can validate against it when logging users on. The certificate can be self-signed but it is not recommended.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473712#M293324</guid>
      <dc:creator>CMetsch</dc:creator>
      <dc:date>2018-02-13T16:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473713#M293325</link>
      <description>&lt;P&gt;The AD server will have a certificate (self-signed), but I was wondering about the page that actually gets served up to the wireless clients.&lt;/P&gt;&lt;P&gt;That comes from the Meraki AP correct? I just wanted to make sure they didn't get certificate warnings/errors from it&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 17:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473713#M293325</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2018-02-13T17:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless network with splash page / AD authentication</title>
      <link>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473714#M293326</link>
      <description>&lt;P&gt;The web page comes from the cloud and should not throw a certificate error The certificate you install on your AD is to validate itself against the AP, when doing logins, not for serving web pages.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 17:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-network-with-splash-page-ad-authentication/m-p/5473714#M293326</guid>
      <dc:creator>CMetsch</dc:creator>
      <dc:date>2018-02-13T17:12:51Z</dc:date>
    </item>
  </channel>
</rss>

