Access Manager - Architecture And Example Use Cases
Overview
Cisco Access Manager uses cloud-delivered services native to the Cisco Meraki dashboard to ensure only authorized users and endpoints can gain access to the network, replacing the need for external RADIUS server integration.
Architecture
There are four major components in the Access Manager architecture:
- Identity Provider Integrations : external services that provide authoritative user and endpoint identity credentials and grouping context for a user or an endpoint connecting to the network, such as Microsoft Entra ID.
- Access Manager Services : network access control services hosted in the Cisco Meraki cloud for authentication, authorization and accounting (AAA) services using the RADIUS protocol. You configure Access Rules for your user and endpoint scenarios to assign session-based, zero trust network access (ZTNA) authorizations
- Network Devices, such as switches and access points, provide network connectivity to endpoints. When an endpoint connects to a SSID or switch port that uses Access Manager as its authentication server, authentication requests will be forwarded to the Cisco Meraki Cloud for policy evaluation.
- Endpoints : also known as Clients, these are the user and endpoints connecting to your network and requiring authentication in accordance with your zero trust Access Rules

Use Case Examples
There are many potential use cases for Access Manager, with support for both event driven identity and context-based authorization. Below we focus on two cases, securing managed and unmanaged endpoints:
| Use Case | Authentication and authorization |
|---|---|
| Secure organization managed endpoints |
Certificate based authentication (EAP-TLS) with Entra ID user lookup to apply user identity based authorization. Authorize Access Policies (Adaptive Policy SGT, VLAN, Group Policy) based on Entra ID user group membership like HR, Finance, or IT and user attributes like City, State, or Job title. Username and password based authentication (EAP-TTLS/PAP) with Entra ID user lookup for identity based authorization. Similar to above, you can authorize Access Policies (Adaptive Policy SGT, VLAN, Group Policy) based on user group membership and user-attributes from external identity and security sources such as Entra ID. |
| Secure unmanaged endpoints (802.1X supplicant unconfigured or unsupported) |
MAC Authentication Bypass (MAB) and/or Identity Pre-shared Key (IPSK) Authorize Access Policies (Adaptive Policy SGT, VLAN, Group Policy) based on specific, or part of MAC address, or endpoint groups with many MAC addresses. Use iPSK to Authorize Access Policies (Adaptive Policy SGT, VLAN, Group Policy) based on specific, or part of MAC address, or endpoint groups with many MAC addresses, based on unique pre-shared keys (PSKs) allocated to endpoints. |
EAP-TLS Certificate-based Authentication with Entra ID Lookup
Traditional Pre-shared Key and username/password based authentication have become increasingly vulnerable to attacks.
Certificate-based EAP-TLS authentication allows administrators to control network access to managed endpoints by forwarding authentication
requests to Access Manager. The Access Manager services within the cloud will evaluate the session based on the configured rules.

For the example above:
- A user's workstation is has been configured to use 802.1X with a user and/or machine certificate
- The user performs a login or connects their computer workstation to a switch or access point (AP) which initiate an EAP-Start (extensible authentication protocol) over 802.1X
- The workstation returns the user's certificate as it's authentication credential which is sent from the network device in a RADIUS authentication request to Access Manager
- Access Manager validates the certificate and that the Certificate Issuer CN matches one of Access Manager's Trusted Certificate Authorities (CAs)
- Access Manager uses the certificate's Subject Name which contains their Microsoft Entra ID user principle name (UPN, username@domain.onmicrosoft.com) to perform an Entra ID group membership lookup.
- Access Manager matches one of the user's group against the Employees rule in the Access Rules table
- Access Manager returns a RADIUS authorization to the network device containing an Employees security group tag (SGT) assignment
- The workstation workstation gets a DHCP-assigned IP address and all it's traffic is tagged with a Employees SGT
EAP-TTLS/PAP Username/Password Authentication with Entra ID Lookup
While certificate based authentication is the most secure method, some organizations may not have their own Public Key Infrastructure (PKI), and so require an alternative authentication method such as username and password.
With username/password based authentication (EAP-TTLS/PAP) against Entra ID, you can control network access to managed endpoints without the need for deploying PKI. When an endpoint connects to your Network Device (switch or access point), the endpoint will be prompted to enter the username and password (Entra ID credentials). Once entered, the authentication requests will be forwarded to to the Cisco Meraki cloud and Access Manager services within the cloud will authenticate the endpoints against the Entra ID. If the authentication is successful, the session will be authorized, and access granted based on the configured rules.

In the authentication flow above:
- A user connects their computer workstation to a switch or access point (AP) which initiates an EAP-Start (extensible authentication protocol) over 802.1X
- The user enters their Microsoft Entra ID user principle name (UPN, username@domain.onmicrosoft.com) as the username and their password
- Cisco Access Manager receives the authentication response and proxies it to Entra ID using OAuth
- After Entra ID authenticates the user successfully, Access Manager obtains the user's group memberships for evaluation against it's Access Rules
- Access Manager finds a match for the user in the Access Rule named Employees
- Access Manager returns a successful authorization to the network device allowing access and assigning a security group tag (SGT) to the endpoint's traffic
- The user's workstation gets a DHCP-assigned IP address and all it's traffic is tagged with a Employees SGT
MAC Authentication Bypass (MAB) for IOT Endpoints
Unmanaged endpoints, such as Internet of Things (IoT) and Operational Technology (OT) devices that do not support 802.1X are traditionally prone to security vulnerabilities, so it is essential to find a method to secure these devices. Access Manager can be used to secure unmanaged endpoints using MAC Address Bypass (MAB).
_for_IOT.png?revision=1)
In the example above:
- A camera is unconfigured for 802.1X but attempts to connect to the network
- The switch uses 802.1X to initiate an EAP-Start (extensible authentication protocol) request to the endpoint
- The camera ignores all EAP challenges since 802.1X is unconfigured and the EAP process times out
- The switch initiates a MAC Authentication Bypass (MAB) request to Cisco Access Manager since it knows the camera's MAC address from the source address in DHCP and other traffic
- Access Manager find the MAC address belonging to the Cameras client group and matches the Access Rule for Cameras
- Access Manager returns the RADIUS authorization which includes a security group tag (SGT)
- The scanner gets a DHCP IP address and all it's traffic is tagged with a Camera SGT
Identity Pre-Shared Key (iPSK) for IOT Endpoints
Wireless I/OT endpoints often do not have sophisticated interfaces enterprise authentication with 802.1X or certificate management. Many do support basic wireless pre-shared keys (PSKs) but it is not a good security practice to use the same PSK for all endpoints in your network in case it is leaked. It is much better to use a unique, identity pre-shared key (iPSK) tied to an endpoint (client) group or even endpoint MAC address.
__for_Wireless_IOT.png?revision=2)
In the example above:
- The handheld scanner attempts to associate to the wireless access point (AP) with it's configured pre-shared key (PSK)
- The AP performs a new RADIUS MAB request to Access Manager
- Access Manager verifies the MAC belongs to the Client Group named Scanners
- Access Manager checks the Access Rules and matches the Scanners rule for all members of the Scanners client group
- Access Manager returns an authorization to the AP with a security group tag (SGT) and the iPSK assigned for the Scanners client group
- The AP compares the scanner's iPSK with the assigned PSK from Access Manager if they match, it is authorized
- The scanner gets a DHCP IP address and all it's traffic is tagged with a Scanner SGT

