I have read below but still not 100% how does IPSK work.
https://meraki.cisco.com/blog/2019/12/the-key-for-iot/
https://documentation.meraki.com/MR/Encryption_and_Authentication/IPSK_with_RADIUS_Authentication
So the IPSK idea is to have a single SSID to provide different VLAN and Group Policy to different type of devices right?
It is based MAB which I understand the process.
However, I don't understand how Radius server/ISE assigns the Meraki Group policy to endpoint.
In 802.1x Meraki doco, it uses typically airespace-id.
In the IPSK doco, it mentioned Tunnel-password attribute, how does this link to different MAC and policy?
Separate question: can I use windows NPS instead of ISE to achieve this feature?