Hey mate, sure fire away with questions - but to get you going are you wanting to authenticate the machine or the user?
In my setup I have two separate networks and we are Hybrid-Azure
WiFi_Device = Internet only
- Purpose is so devices can authenticate with azure at a login screen if user credentials are not cached. This uses a Machine certificate
SCEP Device Cert: Assign to your computer group.

WiFi_User = Internet + Corporate resources.
SCEP User Cert - Also assign to your device group (and apply filtering if you want to limit users).

Make sure you are pushing out a trusted certificate profile for:
IDEN Trust (from your meraki ssid page)
Hydrant CA O1 (from your meraki ssid page) - not 100% sure you need this but i added it.
Your Root CA
Your Issuing CE.
All 4 will be needed in the WiFi profile to stop the annoying windows "is this wifi trusted/what you expect" message.
WiFi Profile: device and user are basically the same except the cert you choose so ill only post the one screenshot and note the variances.

PS. this also works for auto configuration of iphones WiFi/outlook365 email config without passwords.
PPs. sorry we sort of derailed a bit from the OP and turned this into a guide
PPPs. Before anyone cries boogeyman - we are enrolling certs to KSP because surface devices and possibly others have a bug with 4096 keys not working in TPM