MSP-style login for SSO account

Dunky
Head in the Cloud

MSP-style login for SSO account

We have two organizations both using Azure SSO in different tenancies

I want to be able to login with my SSO email address and be presented with a choice of organizations.

 

My account has been 'guested in' to the other orgs Azure ok.

 

I can login to each org via their specific URL, i.e. org1.sso.meraki.com and org2.sso.meraki.com

All I see when I login though is the org I've logged into. I want the choice to select the required org once I've logged in.

 

I'm obviously missing something?

TIA

 

11 Replies 11
Mloraditch
Kind of a big deal
Kind of a big deal

I'm thinking it may be because of the subdomains being defined. We leave that blank and can see all our sso enabled orgs from one account when they share the same fingerprint and login url.

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
Dunky
Head in the Cloud

Could you explain that a little more please @Mloraditch ?

What do you mean when you say you leave your subdomains blank?

Mloraditch
Kind of a big deal
Kind of a big deal

 

See below, I'm referring to the SSO Subdomain field

 
 

Screenshot 2026-03-06 105333.png

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
Dunky
Head in the Cloud

Ahh I see what you mean now, but that raises even more questions...

So simply remove the subdomain?

What URL would we use then to login to the dashboard?

When logging into Vision Portal I assume we would still click on "Log in with SAML SSO"? But then isa asks for subdomain.

What subdomain would we enter in the app?

 

I really appreciate you taking your time to assist 

Mloraditch
Kind of a big deal
Kind of a big deal

You can initiate from  here https://myapps.microsoft.com. as long as you have the Enterprise app visible to your users.

I don't use cameras at all so I can't answer regarding the Vision portal. @PhilipDAth may be able to help when he's next online (it's already the weekend in NZ). He's done a lot of SSO and helped a number of others on threads through the years.

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
Dunky
Head in the Cloud

Thanks @Mloraditch 

Its weekend here in 30mins too 😀

Hopefully Philip may be able to guide me.

Its annoying that I cant find any official Meraki documentation outlining how to achieve this.

JamesT91
Head in the Cloud
Head in the Cloud

And to save yourself having to go via MyApps first, you can right-click>copy link on the app and then add that URL as your bookmark 😊

PhilipDAth
Kind of a big deal
Kind of a big deal

>We have two organizations both using Azure SSO in different tenancies

 

To be clear, are you talking about two different Azure tenancies here?

And you have different logins for each of the two Azures?

Dunky
Head in the Cloud

Hi Philip,

Yes, they are two separate Azure organizations.

I have one SAML login in Org A, that same account is guested in to Org B's organization

PhilipDAth
Kind of a big deal
Kind of a big deal

I do not believe this approach will work.

Fundamentally, an Entra account is only authenticated in one tenancy.  The one where it was created.  When you add it as a guest to another tenancy, that tenancy does not authenticate the guest user itself; it relies on that authentication being forwarded from the tenancy where the user is actually hosted.

 

The Meraki Dashboard cannot ask the Entra tenant associated with your guest account to authenticate you.  Only the source tenant can do that.

 

 

A better solution would be to add your Entra to their Meraki Dashboard.  To do this is as simple as copying that SHA1 fingerprint from your existing dashboard to their dashboard, like this (this tenant has three SAML authentication sources!).

1.png

 

And then add the SAML roles you use to their system.  I tend to do a lot of SAML work in general, so I tend to name my roles:

<Company>-<App>-<Role>

 

In the example below, IFM is the MSP. This role is intended to authenticate access to the Meraki Dashboard, and this is intended to provide Administrator access.  This makes it very clear to anyone looking at the logs which company accessed their system, and who it was.

1.png

 

Also, if you are using Entra, use the "mysigns" style to access the Meraki Dashboard.  This is the most powerful way to gain access (and very quick, just two mouse clicks).

1.png

Dunky
Head in the Cloud

Thanks Philip, Will give it a go.

Get notified when there are additional replies to this discussion.