@Joewro can you confirm your license level meets the requirements for the feature? I believe the wireless Entra SSO integration needs a minimum license level of Enterprise. https://community.meraki.com/t5/Feature-Announcements/Microsoft-Entra-ID-Integration-with-Splash-Page-is-Now-Available/ba-p/276038 The last screenshot you posted isn't where you enable the sso for the splash page, the sso mentioned there is for the dashboard only, and if you turn it on, please ensure you have a second account that isn't part of your sso to use, as it can lock out existing accounts which have the same email address as both a user in the dash, and and as a sso user. (Just a warning for that one) https://documentation.meraki.com/General_Administration/Managing_Dashboard_Access/Configuring_SAML_Single_Sign-on_for_Dashboard For wireless SSO integration, go to Wireless> Under the "Configure" Column on the right of the pop out menu, click on "Access Control" In the top left, select your ssid, and under Security set to Open, under splash page, where you see Sign on with, which is typically set to Meraki Cloud Auth, select that option and then click on the drop down and select Entra ID as the logon method. In the doc below there are a number of sites in specific places that need to be configured correctly for the authentication channels to be allowed by the firewall and wifi for users to communicate with meraki and microsoft and pass the token generated by the clients sign in event to the meraki ap's and dash so they are aware of the successful event and provide the client access. https://documentation.meraki.com/MR/Design_and_Configure/Encryption_and_Authentication/Microsoft_Entra_ID_Integration_with_Splash_page When you configure the walled garden, they provide a link to a list of MS sites that you need to add to the walled garden exclusion list to allow the requests through, I went with the top 3 categories, the general would allow way too much for my liking. The 3 category's to reference urls for in the doc below are: Azure Portal Auth Azure portal framework Account data Now we get to the part where you had issues, click on the link to create the application, and follow through to the error https://login.microsoftonline.com/organizations/adminconsent?client_id=d1b29572-1b35-40cc-9152-a8056ab586c4 After you have confirmed and created the app, and ended up with your error... Go into entra ID and find the application Cisco Meraki Network Access under the enterprise applications. Double click on the app and in the left column, click on permissions then click to provide Admin consent on behalf of your company. You will be required to confirm your account and immediately after that, you will see the same page that caused your initial error you logged. Only this time it will be successful. And now the app will have the required consent for you to continue with the single sign on portal setup. Essentially you have to fail to succeed in this case.
... View more