<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki local authentication in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/meraki-local-authentication/m-p/5498303#M300849</link>
    <description>&lt;H2 id="toc-hId-1647626776"&gt; Requirements&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;All MR access points in the Network must be running MR 27.1+ firmware*&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;An admin account credential for the LDAP server with read-only permissions has to be input as part of dashboard configuration &lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If an Active Directory-based LDAP server is used, it must support an LDAP bind operation&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The LDAP server must support STARTTLS&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;CA certificate used to sign the LDAP server's private key must be uploaded to the dashboard. This certificate is used by an MR to verify the authenticity of the LDAP server.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The LDAP server’s certificate must have a subjectAltName field that matches the Host address configured on the dashboard (either IP address or FQDN)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Wireless clients must trust the certificate presented by the MR which is signed by a well-known Certification Authority QuoVadis for the purposes of validation of the MR for certificate-based authentication.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Meraki_Local_Authentication_-_MR_802.1X" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Meraki_Local_Authentication_-_MR_802.1X&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Tue, 25 Jun 2024 11:13:24 GMT</pubDate>
    <dc:creator>aleabrahao</dc:creator>
    <dc:date>2024-06-25T11:13:24Z</dc:date>
    <item>
      <title>Meraki local authentication</title>
      <link>https://community.cisco.com/t5/wireless/meraki-local-authentication/m-p/5498302#M300848</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;For Meraki local authentication with an LDAP server what are the Pre-requisites ? and is certificate must or is it optional if i am going with only LDAP &amp;amp; not LDAPs ?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 10:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-local-authentication/m-p/5498302#M300848</guid>
      <dc:creator>Ajchand</dc:creator>
      <dc:date>2024-06-25T10:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki local authentication</title>
      <link>https://community.cisco.com/t5/wireless/meraki-local-authentication/m-p/5498303#M300849</link>
      <description>&lt;H2 id="toc-hId-1647626776"&gt; Requirements&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;All MR access points in the Network must be running MR 27.1+ firmware*&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;An admin account credential for the LDAP server with read-only permissions has to be input as part of dashboard configuration &lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If an Active Directory-based LDAP server is used, it must support an LDAP bind operation&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The LDAP server must support STARTTLS&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;CA certificate used to sign the LDAP server's private key must be uploaded to the dashboard. This certificate is used by an MR to verify the authenticity of the LDAP server.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The LDAP server’s certificate must have a subjectAltName field that matches the Host address configured on the dashboard (either IP address or FQDN)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Wireless clients must trust the certificate presented by the MR which is signed by a well-known Certification Authority QuoVadis for the purposes of validation of the MR for certificate-based authentication.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Meraki_Local_Authentication_-_MR_802.1X" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Meraki_Local_Authentication_-_MR_802.1X&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 25 Jun 2024 11:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-local-authentication/m-p/5498303#M300849</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2024-06-25T11:13:24Z</dc:date>
    </item>
  </channel>
</rss>

