Securing Managed Endpoints - Username/Password Authentication against Entra ID
This article explains how to configure username and password based authentication against Entra ID to apply an identity based dynamic authorization to the users and endpoints connecting to your network.
Although certificate based authentication is the most secure method, some organizations may not have their own PKI infrastructure and/or need an alternative method such as username and password authentication. With Username/Password based authentication (EAP-TTLS/PAP) against Entra ID, you can control network access to your Managed endpoints without the need for deploying and maintaining external PKI infrastructure.
Authentication Flow
Firstly, let’s try to understand the authentication flow for this specific use-case. As shown in the diagram below, our goal is to enable end-users or endpoints connect to the network (SSID or a Switchport) using domain username and password.
Following is the sequence of steps in the authentication flow:
- The endpoint initiates the connection with the SSID or Switchport.
- The Network Device will request the identity of the endpoint.
- The user will enter their username and password or the endpoint uses the saved credentials that will be sent to Network Device.
- The Network Device will forward the identity information within a RADIUS packet to Cisco Meraki Cloud over a Cisco proprietary AES-256-bit encrypted TLS tunnel.
- Cisco Meraki Cloud will authenticate the user directly against Entra ID.
- Cisco Meraki Cloud would have already synced users, user-groups and user-attributes from Entra ID Graph API integration and stored them in its local database.
- Access Manager evaluates the session against the configured rules – a rule is matched if all the defined conditions (like user identity from Entra ID, endpoint identity, network information etc.) are matched and the corresponding configured authorization will be applied as a result.
- The resulting authorization (SGT, VLAN etc.) will be sent back to the Network Device for enforcement.
- The endpoint will be connected successfully.
Configuration Steps
This section covers the configuration steps at a high-level to explain various components of the workflow. The configuration needed for this use-case can be broken down into following steps:
- Configure endpoints for username and password authentication
- Configure Entra ID integration to sync users, user-groups and user-attributes.
- Configure SSIDs and Switches to use Access Manager.
- Configure authorizations to be used – SGTs, VLANs, Group Policies etc.
- Configure Access Manager rules for policy evaluation.
Configure Endpoints For Username/Password Authentication
This section is to give you a high-level overview of steps but please refer to OS level instructions if you need additional details. Following are the steps needed for this configuration:
(Required) Configure wired or wireless profile on your endpoint to use EAP-TTLS as the authentication method and PAP as the inner method (macOS) / non-EAP method (windows).
- (Optional) - If you would like for the endpoint to trust the RADIUS server certificate automatically without the user having to click on "continue" or "trust" when connecting, you will need to download the RADIUS CA certificates from the Dashboard, install it on the endpoint trusted store and use it in the wireless/wired profile.
- (Optional) Navigate to Access Manager > Configure > Certificates and click on Download RADIUS CA Certificates.
- (Optional) Install the downloaded “RADIUS CA Certificates” in the trusted store of your endpoints. This is to ensure that your endpoint trusts the Cisco Meraki’s RADIUS server during the authentication process.
- (Optional) Configure wired or wireless profile on your endpoint to add the installed RADIUS certificate as the server certificate.
- (Optional) Navigate to Access Manager > Configure > Certificates and click on Download RADIUS CA Certificates.
Configure Entra ID Integration
An integration with Entra ID can be used to not only sync users, user groups and user attributes into Cisco Meraki Cloud database, but also to perform the initial username and password authentication directly against Entra ID (as it is not possible to sync passwords). If you would like to apply an authorization (SGT, VLAN etc.) based on user groups like HR, Finance or any other attributes from Entra ID, you may use these groups and attributes as a part of matching criteria within an access rule you configure (that will be described in one of the next sections).
After the successful integration, Cisco Meraki Cloud will sync all the users, user groups and attributes and stores them in Cisco Meraki Cloud database. There will be a pro-active sync that happens once every 6 hours. You can always start a manual sync as well.
Refer to our documentation Organization End Users for more detailed instructions.
Important: Make sure to set these API permissions at minimum and grant admin consent :
- Graph API> Application > Directory.Read.All
- Graph API > Application > User.Read.All
- Graph API > Delegated > User.Read
Configure Wireless And Wired Networks To Use Access Manager
Wireless - Configure SSID Access Control Settings
-
Assuming, you already have an MR added to your dashboard and licensed appropriately, navigate to Wireless > Configure > Access control.
- Choose the SSID you want to use for this use-case.
- Navigate to Security section and choose Enterprise with Access Manager as shown below:
Extended Local Auth is only applicable for certificate (EAP-TLS) based authentication. Selecting this will ensure that this certificate chain is downloaded on all the MRs that are configured with an SSID that uses Access Manager. In the event of Cisco Meraki Cloud not being reachable, any new endpoints trying to authenticate will be authenticated by the local RADIUS server on each MR using the certificate it downloaded previously. Please note that the rules evaluation will not work but instead, the VLAN configured on the SSID will be applied to the session after successful authentication. Make sure to enable this on both the certificate and the SSID Access Control Page.
- Feel free to change any other SSID settings like Client IP and VLAN assignment etc. as needed and click save at the bottom.
Wired - Configure Access Policy and Switch-Port
For Wired connections, you will need to configure an Access Policy that uses Access Manager as the authentication method and attach that Access Policy to the switch-port where the endpoint/s will be connecting to.
Following are the steps at a high-level to configure access policy and switch-ports to use Access Manager as the authentication server:
For detailed instruction on how to configure Access Policies, refer to our documentation on Access Policy.
-
Assuming that you an MS already added to your dashboard and licensed appropriately, navigate to Switching > Configure > Access Policies.
-
Click on Add policy.
-
Choose Access Manager from Authentication method dropdown.
-
Configure other settings like 802.1X or Hybrid Authentication as Policy Type, Single-Host for Host mode etc. as desired for the use-case.
- Navigate to Switching > Switches and select the switch you would like to attach the configured access policy.
- Click on one of the ports where the endpoint/s will be connected to and where you would like to attach the configured access policy.
- Click Edit button next to Configuration and Status.
- Select Access for Type.
- Choose previously created Access Policy (Wired PCs in this example) from the Access Policy dropdown menu.
- Click on Update.
- Optionally, you can update multiple ports at a time by navigating to Switching > Switch Ports and selecting multiple ports
Configure Access Manager Rules
Now that we have everything in place, it is time to configure the Access Manager rules which will determine what authorization (SGTs, VLANs, Group Policies) will be applied to the endpoints when they authenticate.
The rule framework is very straightforward – define the matching criteria and define the corresponding authorization result to be assigned. Following are the steps needed for this configuration:
- Following is an example rule that we will use to illustrate on how to configure rules:
- Navigate to Access Manager > Policies > Access Rules
For this Early Access Preview, we only support one rule group (default rule group) with the ability to add multiple rules under it.
- To add a rule, click on Add a rule. Name and enable the rule.
- Under What’s matched section, choose Attribute source dropdown.
- Then, you will be able to select attribute and enter values you want to match – as an example, we selected a Product Management group from Entra ID integration.
- Under Authorization section, click on Access permission dropdown to choose an option.
- VLAN ID/name: Assigns a VLAN ID or VLAN name. For successful connection, make sure that the VLAN entered here is present in the network where the endpoint is authenticating.
- Voice domain: Enabling this will ensure that voice traffic is permitted.
- Adaptive policy: Assigns an Adaptive Policy Group (and corresponding SGT value).
Refer to our Adaptive Policy documentation on how to implement zero-trust micro-segmentation policies through Adaptive Policy.
- Identity PSK: Applicable for MAC Authentication Bypass use-case only. Assigns a key to the session and if the key entered by the endpoint matches the key assigned, the rule will be matched and corresponding authorization (VLAN, Adaptive policy etc.) will be applied.
- Group policy: Assigns a group policy.
Refer to our Group policy documentation on how define and apply a list of rules, restrictions, and other settings to the endpoints that are connecting to your network.
- As an example, we selected Allow restricted access, assigned FTE Laptops Adaptive Policy Group (SGT) and VLAN 250 that we created earlier. Click save after the selections.
- Now, any endpoint matching the criteria defined in the rule (Entra ID Group = Product Management) will be matched with the rule and corresponding authorization (VLAN = 250 and Adaptive Policy = FTE-Laptops) will be applied.
Troubleshooting
If there are any issues in signing in users, please make sure to confirm the following:
- Verify username and password: Please verify that the correct username and password are entered while authenticating.
- Verify password used is not a temporary password: Temporary passwords for the users are not supported on this flow. To change the temporary password for a user, login to any Microsoft portal (eg: portal.azure.com) to manually set the password.
- Verify access rule configuration: Please verify that the access rules configured (Access Manager > Policies > Access Rules) are correct and include matching criteria for the authentication. Following is an example access rule:
- Verify wired/wireless supplicant configuration: Please verify that the wired/wireless supplicant configured on the endpoint includes EAP-TTLS as the authentication method and PAP as the inner method (macOS) / non-EAP method (windows).
- Windows:
.
- macOS (using apple configurator)
- Windows:
- Verify API permissions on Entra ID: Please verify that the following API permissions are added on Entra ID app registration that was configured for the integration:
- Graph API> Application > Directory.Read.All
- Graph API > Application > User.Read.All
- Graph API > Delegated > User.Read
Note: Click on "Grant admin consent for Default Directory" after adding the the above permissions. Make sure the status shows "Granted.."