09-05-2023
07:49 AM
- last edited on
09-05-2023
10:24 AM
by
shaiksh
Hello,
We need to configure SSID in Meraki dashboard for our BYOD network to use a captive portal with SSO authentication. the flow is from Meraki > to ISE > to Azure IDP.
Our goal is to be 100% password less. We will be using certificates for managed device on another SSID but for BYOD devices (phones, tablets, personal computers) we want to internal employees to have the ability to connect password less. Our IDP is configured with password less… that is once you enter your user id the screen provides you a 2-digit number and you enter this number on your authenticator app. With a match you are authenticated. No password needed.
Let me know if anyone has configured the solution.
Regards,
Kunal Shah
09-18-2023 03:45 PM
1. This is for the Guest 'Remember Me' feature. See the Guest Access Prescriptive Deployment Guide for more details.
2. That configuration on the WLC exempts those URLs from redirection. The same FQDNs would need to be in the Meraki Walled Garden configuration.
09-19-2023 08:27 AM
Thanks for a reply.
1). I believe BYOD USER MAB rule is for 'Remember Me' feature. Do I still need to configure other authorization rule called BYOD user?
2). I am not 100% sure, why do we need those URLs to exempt from redirection, if there is no exemption what could be the issue?
Regards,
Kunal
09-21-2023 10:42 AM
Hello Greg,
I am having some trouble in testing, when tested with personal phone connecting to test SSID. It is asking me for username, password and challenge, I am not sure why it is asking for password and second thing for apple phone it redirects me to microsoft but after putting my credentials it doesn't allow me to access internet. I have configured the policy same way as in document 1). BYOD MAB user and 2). Default.
Regards,
Kunal
Regards,
Kunal Shah
09-21-2023 03:26 PM
Have you enrolled the phone as a passwordless device in MS Authenticator? That process requires logging in with your credentials first.
The description of the policy configuration is not enough to provide assistance.
If you have not configured the three AuthZ Policies as per the example, that is likely the problem. The 'BYOD User' rule is needed to complete the device registration process in ISE. Without that, the 'remember me' MAB-based rule will not match.
09-21-2023 05:21 PM
Hello Greg,
In MS authenticator, when I clicked on "Enable Phone sign-in" option , I got following error.
2). I will configure 'BYOD User' policy and test.
Regards,
Kunal
09-21-2023 06:47 PM
You will have to work with your Azure administrator to enable passwordless sign-in to use the feature. This is controlled purely on the Azure side and nothing ISE has control over.
09-27-2023 05:53 AM
Hello Greg,
I was tested again Windows and Apple devices. here is the summary.
Apple Phone :
After our earlier discussion in the chat, I have added "BYOD User" authorization rule, so now I have 3 Authz rule. however, I am having same problem as mentioned earlier with apple phone, it redirects me to Microsoft login page but after putting my credentials it doesn't allow me to access the internet.
Company Managed Windows Laptops :
When tested company managed windows laptop, it redirects me to Microsoft login page, only asking for my email address and after putting my email address, got success page and allows me to access the internet.however, I noticed it's hitting first Default Rule and then "BYOD user MAB" rule but not hitting to "BYOD user" rule.
What am I missing in both Apple and Windows case, can you please suggest next troubleshooting steps?
09-27-2023 05:03 PM
If you're hitting the 'BYOD user MAB' rule, then the device registration may be completing. You can check the endpoint in Context Visibility to confirm if it shows the expected Identity Group Assignment.
It sounds like the AuthZ is being sent by ISE, so there may be something on the Meraki side that is causing the problem. You might review your Meraki config against this guide.
How To: Integrate Meraki Networks with ISE
If all else fails, you might need to open a TAC case to investigate in more detail.
09-29-2023 09:59 AM
Thanks, Greg, for suggestions.
1).I do see registration date and "BYOD_Endpoint" Identity Group for my windows laptop in Context Visibility >> Endpoints but I don't see those details for Apple devices. Any further suggestions on the same.
2). Looks like "BYOD user" Authz rule is not required now as device registration is covered by "BYOD user MAB" AuthZ rule, am I correct?
3). I am not sure what you mean by "Meraki Side something causing problem" because looks like it's working for Windows but not for Apple.
Regards,
Kunal
10-01-2023 04:11 PM
2) No. I suspect at some point, this rule was hit in order to complete the registration process as that's how the 'Remember Me' flow is intended to work. It does no harm to leave it.
1&3) The flow works in my lab with an iPhone. You might try disabling Private Wi-Fi Address (MAC Randomization) on the SSID in case that is causing a problem. Otherwise, please open a TAC case to investigate further.
10-03-2023 05:11 PM
Thanks, Greg for the suggestions.
2). I will keep the "BYOD user" rule. Just wanted to make sure is it something missing on my side that's what the reason so far, I am not hitting the "BYOD user" rule.
1&3). I disable MAC randomization but didn't work for me. The case is open with Cisco TAC for further investigation, will keep you posted our findings.
Regards,
Kunal
10-16-2023 08:35 AM
Hello Greg,
So far with Cisco TAC, we found that iPhone device is sending RST packets but still researching why the device doesn't want to communicate?
We would like to also know the flow of communication, can you confirm our understanding is correct?
1). User device connects to Open SSID and then it is redirected to ISE portal.
2).ISE redirects user to Microsoft Login page.
3).user enter the credentials and Azure AD authenticates the user.
4).user browser receives encoded SAML response with assertion data from Azure AD.
5). SAML response from browser is sent to ISE.
6). ISE parse the SAML response and confirms successful authentication and then send session COA.
7). user grant internet access.
Let me know if our understanding is correct or not in any of the above steps.
10-16-2023 02:06 PM
@kshah2589, yes.. that is essentially how the flow should behave. At step 6, the SAML assertion responses from Entra ID should also include any other attributes known by the IdP, like 'memberOf'
You can see an example of the SAML response I captured for another use case here. Unfortunately, I'm not sure there is a SAML tracer tool available for iOS so you would likely only see this communication via a packet capture on the wireless side.
Cisco ISE Sponsor Portal authentication via JumpCloud SSO
10-18-2023 08:46 AM
Thanks Greg.
Looks like after disabling Apple CNA Meraki side, apple phone/iPad can connect to SSID and able to access internet. Did you have to do the same thing for iPhone to work in your test envirometn?
Regards,
Kunal
10-18-2023 02:57 PM
Hi @kshah2589. No, I do not have Captive-Bypass enabled on my lab WLC/WLAN (Cisco 2504)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide