Skip to main content
Cisco Meraki

Google Sign-In


Google Sign-in is offered out of the box with Meraki Access Points via the Meraki Cloud. For more information on all of the different splash page options see the Splash Page Overview.


Using the OAuth protocol, Meraki MR access points are able to authenticate users with Google accounts via a sign-on splash page for network access control. The administrator can easily setup this integration via the dashboard with the steps below. 

  1. Navigate to Wireless > Configure > Access control.
  2. Select the SSID that you would like to provision for Google authentication.
  3. In the Splash page section, select Sign-on with and choose Google OAuth from the drop-down menu.
  4. Optionally, you can configure a domain in the Allowed domains field to restrict the scope of Google accounts permitted to access the network.
    • If a domain is not specified, all valid Google accounts will be permitted to access the SSID.
    • To configure multiple domains, simply separate them by a newline.
  5. Click Save.

Below is an example configuration for this feature which accepts Google credentials from the domain. 

google sign-on.PNG

If the captive portal strength is configured to restrict non-http traffic, the public IP address of Google's web servers will need to be added to the walled garden.

User Experience 

The Meraki Access points simply redirect an un-authorized user's first HTTP GET to the splash page server which is hosted within the Meraki Cloud Controller. The splash page presents them with the option to log onto the SSID using their Google account. Below is an example of the initial splash page where the SSID name is "Example SSID" prompting the user to continue to the Google login screen.


Screen Shot 2015-02-11 at 3.33.12 PM.png


The user is then directed to the familiar Google login screen that is hosted on Google's servers. After the end user enters their credentials they will be either permitted or prompted to re-enter valid credentials.