Access Manager and EAP-TLS

stu84773
Comes here often

Access Manager and EAP-TLS

I'm currently evaluating Meraki Access Manager for EAP-TLS certificate-based authentication, and I'm a bit unclear on the CA requirements.

Some earlier articles I've come across suggest that third-party or external CAs may not be required, implying that Meraki might handle certificate issuance internally. However, in the Access Manager interface, I only see an option to upload CA certificates, which seems to indicate we’d need to bring our own PKI.

Can someone clarify:
Do we need to use our own Certificate Authority (e.g., Microsoft CA, SecureW2, etc.) for EAP-TLS authentication with Access Manager, or is there a built-in Meraki CA that can issue and manage certificates for clients?

Thanks in advance.

7 Replies 7
alemabrahao
Kind of a big deal
Kind of a big deal

No, Meraki Access Manager does not currently include a built-in Certificate Authority (CA) to issue client certificates.

 

Meraki does provide its own RADIUS server certificate (used by Access Manager and local RADIUS on MR) that you can download and install on client devices to ensure trust during the TLS handshake.

 

Access Manager - EAP-TLS Client Configuration (Windows, macOS and iOS) - Cisco Meraki Documentation

 

However, when you use Meraki MDM, you can use Meraki certificates.

 

https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Configuring_EAP-TLS_W...

 

 

 

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
Blue_Bird
Getting noticed
EdNunez
Comes here often

I am using a root certificate from one of our Windows domain controllers and I am getting this error.  Any thoughts?

 

Failure/ Rejection info
Reason

The provided certificate is untrusted. This might be due to its signer being disabled, extra or duplicate certificates in the chain, or another untrusted reason.

 

Suggested action

Verify that the certificate chain does not contain duplicate or unnecessary certificates. Additionally, refer to the certificates page to ensure the signer is enabled and the chain is valid.

rhinkamper
Conversationalist

I am working through this myself as there is no documentation on how to do this with a Windows CA. But what I have come up with so far is.

 

  1. You have to setup user certificate auto enrollment.
  2. Take special note of how you manually configure the Wifi connection and configure your GPO accordingly. https://documentation.meraki.com/Access_Manager/Access_Manager_Configuration_Guides/Access_Manager_-...

 

I have gotten it to work with an endpoint certificate, and I am now working on the user part with Entra. 

PhilipDAth
Kind of a big deal
Kind of a big deal

Meraki Access Manager does not include a CA.

However, Meraki Systems Manager does - and Meraki Access Manager can use those certificates.

https://documentation.meraki.com/SM/Profiles_and_Settings/Certificates_in_Meraki_Systems_Manager

https://documentation.meraki.com/SM/Profiles_and_Settings/Certificates_Payload_(Pushing_Certificates...

 

I've also set it up using Microsoft Intune CloudPKI.

 

You could use a Microsoft CA server in an AD environment and configure group policy to deploy certificates to machines/users.

NetworkCcie
Conversationalist

Take a look at this access manager + cloud pki guide

 

https://www.hypershift.com/blog/meraki-intune-cloud-pki

Edon
Here to help

Make sure upload and *Enable* your CA, then have your client configured to use a cert issues by your CA, create a access rule to match the CA [like common name]

Get notified when there are additional replies to this discussion.