Okta

How to Configure SAML 2.0 for Cisco Meraki Dashboard


NOTE

The Cisco Meraki Dashboard SAML application does not support adding different IDPs with the same certificate fingerprint value. Users need to follow the the instructions here: https://developer.okta.com/docs/api/resources/apps#generate-new-application-key-credential to generate a different certificate for each new application instance.

Contents


Supported Features

The Okta/Cisco Meraki Dashboard SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Sign in to Cisco Meraki Dashboard as an administrator.

  2. Navigate to Organization > Settings:

    cmeraki_new1.png

  3. In the SAML Configuration section, select SAML SSO enabled from the SAML SSO dropdown menu, then click Add a SAML IdP:

    cmeraki_new2.png

  4. Enter the following (see screen shot at end of step for reference):

    • X.509 cert SHA1 fingerprint: Copy and paste the following:

      Sign into the Okta Admin dashboard to generate this value.
    • SLO logout URL (optional): Copy and paste the following:

      Sign into the Okta Admin dashboard to generate this value.

    • Click Save:

    • enter SSO config information in Meraki

  5. Still on the Organization settings page, make a copy of the Consumer URL value that is now displayed:

    cmeraki_new4.png

  6. Navigate to Organization > Administrators:

    cmeraki_new5.png

  7. Click Add SAML role:

    cmeraki_new6.png

  8. Enter a Role name, and select the appropriate Organization access and privileges, then click Create role:

    cmeraki_new7.png

  9. Click Save changes:

    cmeraki_new8.png

  10. In Okta, select the Sign On tab for the Cisco Meraki Dashboard SAML app, then click Edit:

    • SAML administrator role: Enter the Role name you specified in step 8.

    • Consumer URL: Enter the value you made a copy of in step 5.

    • Username attribute value: Select the value that will be used for the username attribute (specifically https://dashboard.meraki.com/saml/attributes/username) in the SAML assertion (either Email or Username).

    • Click Save:

    Enter SAML Admin Role, Consumer URL, Username attribute values into Okta - Sign On

  11. Done!



Notes