We have 2 Meraki tenants and one Azure tenant. Only some Meraki admins have access to both tenants, and of those admins, they may have read-only in one tenant and full access in the other. We don't have any granular per-network access configured.
Tenant 1 has SAML SSO enabled. Tenant 2 does not. Those of us who are admins in both tenants are using an alternate email address to log into Tenant 2.
I would like to configure Tenant 2 for SAML SSO, but I am not sure how to go about this, as I don't want to just wing it and accidentally break something. Ideally when someone logs in, if they have access to both tenants I would like for them to choose their tenant after logging in.
- Do I create a separate Enterprise App in Azure, or use the same one?
- If it is a separate Enterprise App, will Meraki choke on that when I have the same Azure tenant IDs configured for 2 separate Meraki tenants?
- I would assume that I would create additional SAML roles in Meraki, and map them accordingly in the Enterprise/App registrations, considering that AdminJoe might have Full Access in Tenant 1, but Read-Only in Tenant 2.
- Do I need to use a different SSO Subdomain in Tenant 2, or is there a way to reuse the obfuscated value I have below in the first screenshot, so that my admins can log in then choose their tenant?
- Any other valuable insights?
Both tenants do have break-glass non-SAML SSO accounts, just in case something does get messed up with trying to configure Tenant 2.
Tenant 1:
SP Initiated SAML IdP and X.509 cert SHA1 fingerprint are the same value.
SSO Subdomain is within the SLO logout URL.
Tenant 1 also has these two SAML roles, meraki_read and meraki_write:
On the Azure side:
1 tenant only.
Enterprise Application: Meraki Dashboard
The Thumbprint, App Federation Metadata URL contain the same identifier information for what I have in Meraki Tenant 1.
Also, the Login URL, MS Entra ID, and Logout URL (no screenshot provided) contain the same identifier information that appears in the Meraki tenant. Everything works.
The Users and Groups for the enterprise app:
The App Registration, which is also named Meraki Dashboard, ties the Role Assigned from above to the roles within the Meraki dashboard. I did not create msiam_access, but it magically appeared.