Home > General Administration > Managing Dashboard Access > Configuring SAML SSO with OneLogin

Configuring SAML SSO with OneLogin

Table of contents
No headers
This article provides an example walk-through of configuring OneLogin as an Identity Provider (IdP) for the Cisco Meraki Dashboard. It is recommended that administrators read the article on SAML integration for Dashboard before proceeding.

 

  1. Login to OneLogin as a user with permissions to create company apps.
  2. From the home page, click on APPS > Add Apps.

  3. Search for 'meraki' and click on the Meraki app.

  4. On the initial configuration page:
    1. Under Personal or Organization App, choose the bubble for the organization.

    2. Under Connectors, choose the bubble for SAML2.0.

  5. Click Save.

  6. On the Configuration tab, enter the SAML Consumer URL. This will be the Consumer URL from Organization > Settings > SAML Configuration in Dashboard.

  7. On the SSO tab, click on View Details under the X.509 Certificate.

  8. Copy the SHA1-Fingerprint and enter it in the X.509 cert SHA1 fingerprint field under Organization > Settings > SAML Configuration in Dashboard.

  9. Return to the previous page by clicking on the Meraki (or custom name entered earlier) app under Apps using this certificate. Then click on the SSO tab.
  10. (Optional) Enable Single Logout (SLO) by copying the SLO Endpoint (HTTP) field and pasting it into the SLO logout URL field under Organization > Settings > SAML Configuration in Dashboard.
    Note: If enabled, logging out in Dashboard will log the user out of OneLogin and any compatible apps as well.

  11. On the Access tab, ensure that any desired Roles are selected. If none are selected, users will need to be manually given access to the app.

  12. Click Save.

  13. On the Users tab, select a user to grant access. In this example, it is assumed that 'SAML Demo' is part of the 'Default' role.

  14. Enter a Role for the user. This must match a Role configured under Organization > Administrators > SAML administrator roles in Dashboard.

  15. Click Save.

At this point, the configured user should be able to seamlessly login to Dashboard by clicking on the Meraki app. 


If an error is presented, ensure that all necessary fields have been correctly populated and both the user's Role and the SHA1 fingerprint match correctly between OneLogin and Dashboard.

 

For any questions on OneLogin, please refer to the OneLogin documentation.

For more information on Dashboard permissions and administrator types, refer to the article on managing administrative users.

You must to post a comment.
Last modified
21:25, 2 Feb 2015

Tags

This page has no custom tags.

Classifications

This page has no classifications.

Article ID

ID: 1578

Contact Support

Most questions can be answered by reviewing our documentation, but if you need more help, Cisco Meraki Support is ready to work with you.

Open a Case