Home » Security » How to setup SAML SSO with the Meraki dashboard Firewalls using OKTA (resolved)

How to setup SAML SSO with the Meraki dashboard Firewalls using OKTA (resolved)

Okta saml integration is quite simple and gives you the ability to have a single sign and the only issue is that you can only map one role per IDP, for example if you need to add read-only role too then this will show up another tile in Okta – that is the only supported configuration today

log into Okta using the admin credentials and go the admin portion and then then go to Applications

Click on ‘Add Application’ to search for the Meraki application

You will see two applications pop up – choose the SAML one and click ‘Add’

You can modify the name if you have any sort of naming standards and click on ‘Done’

Next go to the ‘Sign On’ tab to click on ‘View Setup Instructions’ to get the setup instructions

Two important things to copy in the instructions  are below when you see the setup instructions

  1. X.509 certificate settings
  2. SLO logout URL

Copy them as you will need to paste them on the Meraki dashboard page and the picture below was extracted from by view Setup instructions from OKTA.

You will also need to define a SAML role in OKTA to match the role in the Cisco Meraki Dashbaord

last thing is that you will need to assign users and groups in Okta for access that will match the role in Cisco Meraki

Now login to the Cisco Meraki Dashboard using the admin credentials

Go to Organizations and settings and now you will need to input the settings from the setup documentations from Okta –


  1. The certificate value
  2. SLO URL

below is what Okta documentation gives you


Input the settings from above extracted documentations into Meraki Dashboard

  1. Enable SSO
  2. Input the X.509 certificate value
  3. add the SLO url for the organizations

Now you will need to add roles by going to Organizations and Administrator portion of the Meraki dashboard

here are the steps


  1. Click on Add SAML role
  2. Name the role and assign privileges

Unfortunately I was only able to add  a single role and this may have changed but was the limitation per Meraki support

below is the link to add Cisco Meraki using Azure AD



Leave a Reply

Your email address will not be published. Required fields are marked *