Skip to main content
Cisco Meraki Documentation

Meraki Cloud Authentication (Cisco Secure Connect Embedded)

This article describes Cisco Secure Connect's integration with Meraki Cloud Authentication, offering a turn-key solution for lab testing and proof of value (POV) environments only, without requiring external integrations. It outlines the use case for customers lacking an IdP, prerequisites, and deployment steps to manage users via SCIM tokens, while noting limitations such as no support for user groups, MFA, and a 200-user cap.

Overview

Cisco Secure Connect delivers a turn-key solution that will be bundled with Meraki Cloud Authentication as part of the package. Meraki Cloud Authentication is supported and designed for lab testing and Prof of Value (POV) only as it doesn't require external integrations.

  • Usage Guidelines: The Meraki Cloud Authentication feature is intended for use in testing environments only, and should not be used in production organizations.
  • Support Status: Meraki Cloud Authentication is supported "as is". There will be no further enhancements made to this feature.
  • Bug Evaluation: Any bugs identified in the Meraki Cloud Authentication feature will be evaluated on an individual bases. However, please note that there is no guarantee of a fix for any identified issue.

Client-based ZTNA doesn't support Meraki Authentication.

Use Case

  • Customers who don't have an IdP to authenticate users in Secure Connect can leverage Meraki Cloud Authentication as the cloud based authentication.

  • Existing Meraki Cloud Auth customers can continue using Meraki Cloud Authentication with the Secure Connect turn-key offer.

Prerequisites

  • API keys should be in place.

Deployment

1. Go to Secure Connect -> Identities & Connections -> Users, select your identity provider, click Start under "I don't have an Identity Provider".

1.IdP Picker Page.png

2. Then it will direct you to the SCIM Token page, click "Go to Umbrella and generate a SCIM Token" for the next step.

2.SCIM Token Page.png

3. After step 2, you will be landing in Umbrella API Keys page under Admin -> API Keys.

3.Umbrella API Keys Page - 1.png

4. Choose Static Keys and expand Other SCIM IdP, then click Generate Token.

4.Umbrella API Keys Page - 2.png

5. Copy the SCIM token and swivel back to Secure Connect SCIM token page.

Notice: Don't forget to save your SCIM token since the token will only shown once.

5.Umbrella API Keys Page - 3.png

6. Paste the SCIM token and click Next.

6.SCIM Token Page - Token added.png

7. Click + Add User to a add a new user to Meraki Cloud Auth.

7.User Opening Page.png

8. Provide a Name and an Email.  Enable Remote Access "ON" will show if you have Remote Access enabled, otherwise will be grayed out. Click Save to move forward.

8.Add User.png

9. The user shown in the Users page accordingly.

10.Add User Done.png

10. Go to the User's inbox for remote access login information. There is a password and a FQDN for remote worker to login through Secure Client. 

For more details on Remote Access use cases and deployment guide, please click here.

9.Add User email.png

11. If you want to edit a user, click three dots to expand options and choose Edit. (optional)

11.Edit User - 1.png

11. From Edit User page, you can toggle Enable Remote Access ON and OFF based on your own design. (optional)

12.Edit User - 2.png

 

12. If you want to delete a user, click three dots to expand options and choose Delete. (optional)13.Delete User - 1.png

13. Confirm the user is the one that you want to delete, check the box of "Yes, delete user" and click Delete. (optional)

14.Delete User - 2.png

Deleting User will not disconnect any existing sessions. Session will disconnect based on the configured timeout window.