What authentication base are you using? Can you share an example? Does this happen to all customers? What operating system? Do you have any walled gardens set up?
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.