Anyway to link office365 user accounts to the MX so people can login with that rather than have to create local users in the MX for things like VPN?
Looking at https://community.meraki.com/t5/Security-SD-WAN/Client-VPN-and-Azure-AD/td-p/47689 you could also sync your on-prem AD with Azure and have your MX hit that.
Other than that, I‘m not aware of other solutions or more direct integrations.
There are authentication methods available like RADIUS and AD Login. Please try to add Azure AD there.
Else, try to configure an NPS server and integrate it with this.
Correct, it requires an Azure AD subscription.
If you don't have one, try to integrate the O365 with Radius Server.
I don't have an idea, how to integrate O365 with a Radius Server with but hope it is possible.
Thanks, I only see the following when I choose AD so it seems like it's only able to accept a local AD server. Since we don't have a local AD or radius server I'm hoping to avoid adding one.
I haven't integrated an Azure AD with Meraki but I have integrated a couple of Azure Radius Servers (NPS) with Meraki and it works.
>Anyway to link office365 user accounts to the MX so people can login with that rather than have to create local users in the MX for things like VPN?
If you have Active Directory syncing to Azure AD - yes.
If you are using pure Azure AD - no.
There are third party solutions like JumpCloud, but they use an ugly work around.
Not to blow the Cisco horn here but linking Duo to your AzureAD might be another solution to this, and it may address other organizatinoal MFA items as well.
We have had issues with VPN and MFA when it was "pure" NPS on a windows server. Using Duo as the provider worked really well for Meraki VPN, and it liked nicely to the identities