How are we now with Meraki LAN wireless users authenticating with Entra ID ?

Gan
Here to help

How are we now with Meraki LAN wireless users authenticating with Entra ID ?

Hi All, 

 

Have raised this before but it never got a proper answer, so I waited abit and raised once more. 

 

Our Meraki LAN wifi users are currently authenticating using Radius Servers configuration and we are trying to move out from it. 

I did raise a TAC case on options and this is the link provided;

 

https://documentation.meraki.com/Access_Manager/Access_Manager_Configuration_Guides/Access_Manager_U...

 

Looks like we need to get another product called Access Manager which seems like a Cloud Radius to me. 

Are there any other solutions to allow us to auth with Entra ID without a splash page for wireless users?

Regards

Gan

3 Replies 3
alemabrahao
Kind of a big deal

Meraki support is correct and there is no other way to do what you want without a Radius server.

The only way I can see to do something similar is using Meraki's local authentication framework.

Let me ask you why you don't want to use a Radius server?

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
GIdenJoe
Kind of a big deal
Kind of a big deal

The cloud radius that is part of Meraki Access Manager allows for EAP-TLS authentications which means you can have Entra ID users that have a cert on their laptop that can be authenticated agains their Entra-ID group membership directly.  So in this case there are no splash pages involved.

You can also use EAP-TTLS/PAP if a cert is not on the client machine but then the user will need to use the supplicant to provide his/her username and password.  But again no splash pages involved.

PhilipDAth
Kind of a big deal
Kind of a big deal

Adding to the others answers; you could consider using Meraki Trusted Access (which uses certificate authentication).

https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Trusted_Access_for_Se...

 

If you don't use an MDM, you could also consider using Meraki Systems Manager.  Trusted Access above actually uses this program but you can use it if you already have another MDM (like Intune).

https://meraki.cisco.com/products/systems-manager/

 

After that you can consider third party solutions, like Splash Access.

https://www.splashaccess.com/portfolio/cisco-meraki-azure-active-directory-authenticated-wifi/

Get notified when there are additional replies to this discussion.