Skip to main content

 

Cisco Meraki Documentation

Configuring SAML SSO with OneLogin

This article provides an example walk-through of configuring OneLogin as an Identity Provider (IdP) for the Cisco Meraki Dashboard. It is recommended that administrators read the article on SAML integration for Dashboard before proceeding.

  1. Login to OneLogin as a user with permissions to create company apps.
  2. From the home page, click on APPS > Add Apps.
     Click APPS the Add Apps.png
  3. Search for 'meraki' and click on the Meraki app.
    Search Meraki app.png
  4. On the initial configuration page:
    1. Under Personal or Organization App, choose the bubble for the organization.
      Personal or Organization App.png
    2. Under Connectors, choose the bubble for SAML2.0.
      Connectors choose SAML2.0.png
  5. Click Save.
    Save.png
  6. On the Configuration tab, enter the SAML Consumer URL. This will be the Consumer URL from Organization > Settings > SAML Configuration in Dashboard.
    Configuration tab, enter the SAML Consumer URL.png
  7. On the SSO tab, click on View Details under the X.509 Certificate.
    SSO tab click on View Details under the X.509 Certificate.png
  8. Copy the SHA1-Fingerprint and enter it in the X.509 cert SHA1 fingerprint field under Organization > Settings > SAML Configuration in Dashboard.
    Enter SHA1-Fingerprint.png
  9. Return to the previous page by clicking on the Meraki (or custom name entered earlier) app under Apps using this certificate. Then click on the SSO tab.
  10. (Optional) Enable Single Logout (SLO) by copying the SLO Endpoint (HTTP) field and pasting it into the SLO logout URL field under Organization > Settings > SAML Configuration in Dashboard.
    Note: If enabled, logging out in Dashboard will log the user out of OneLogin and any compatible apps as well.
    Copy SLO Endpoint.png
  11. On the Access tab, ensure that any desired Roles are selected. If none are selected, users will need to be manually given access to the app.
    Access tab choose desired roles.png
  12. Click Save.
    Click Save button.png
  13. On the Users tab, select a user to grant access. In this example, it is assumed that 'SAML Demo' is part of the 'Default' role.
    Users tab and grant access.png
  14. Enter a Role for the user. This must match a Role configured under Organization > Administrators > SAML administrator roles in Dashboard.
    Enter a Role for the user.png
  15. Click Save.
    Save button.png

At this point, the configured user should be able to seamlessly login to Dashboard by clicking on the Meraki app. 

Meraki app.png

If an error is presented, ensure that all necessary fields have been correctly populated and both the user's Role and the SHA1 fingerprint match correctly between OneLogin and Dashboard.

 

For any questions on OneLogin, please refer to the OneLogin documentation.

For information on resolving possible error messages, please refer to the article on SAML Login History Error Messages.

For more information on Dashboard permissions and administrator types, refer to the article on managing administrative users.

  • Was this article helpful?