Skip to main content
Cisco Meraki

Google Sign-In


Google Sign-in is offered out of the box with Meraki Access Points via the Meraki Cloud. For more information on all of the different splash page options see the Splash Page Overview.


Using the oAuth protocol, Meraki MR access points are able to authenticate users with Google accounts via a sign-on splash page for network access control. The administrator can easily setup this integration via the dashboard with the steps below. 

  1. Navigate to Access Control
  2. Select the SSID that you would like to provision for Google authentication
  3. In the splash page section, configure the SSID to use 3rd party credentials
  4. Select "Google" from the Accepted credentials box
  5. Optionally you can configure a domain to restrict the scope of Google accounts permitted to access the network
    • If a domain is not specified, all valid Google accounts will be permitted to access the SSID.
    • To configure multiple domains, simply separate them by a space (e.g.
  6. Click Save

Below is an example configuration for this feature which accepts Google credentials from the domain. 

If the captive portal strength is configured to restrict non-http traffic, the public IP address of Google's web servers will need to be added to the walled garden.

User Experience 

The Meraki Access points simply redirect an un-authorized user's first HTTP GET to the splash page server which is hosted within the Meraki Cloud Controller. The splash page presents them with the option to log onto the SSID using their Google account. Below is an example of the initial splash page where the SSID name is "Example SSID" prompting the user to continue to the Google login screen.



The user is then directed to the familiar Google login screen that is hosted on Google's servers. After the end user enters their credentials they will be either permitted or prompted to re-enter valid credentials.