We help IT Professionals succeed at work.

Meraki authentication options with AD joined on-Prem &Azure AD joined machines

353 Views
Last Modified: 2019-03-08
HI, Looking for some advice on the best authentication method to use with Meraki for our environment. We are in Hybrid mode with O365 via ADFS, and shortly all mailboxes and data will be migrated to the cloud to allow staff to work from home etc. Users currently have on-prem AD joined laptops and PC's, but going forwards we are replacing up to 150 laptops and the current plan is to Azure AD join them instead of directly to the on-prem domain, and manage with Intune. We installed a new Meraki wireless network and configured a local NPS server as per Meraki instructions "Configuring RADIUS Authentication with WPA2-Enterprise" using Domain/Users Group, and I can connect to the corporate SSID using my AD credentials. However, we would like to lock down access to just corporate machines but the Azure AD joined machines do not show in the on-prem AD so cannot just use the domain/computers group. If we go down the local on-prem CA server certificate route , as I understand it we would have to first add this as a trusted authority on all the Azure joined laptops.  I am leaning towards using a trusted CA authority cert from Go-Daddy - is this the best option for my scenario?

Cheers
Comment
Watch Question

MaheshArchitect
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Why you need certificate?

You could use intune to register devices / laptops to Azure ad and can use conditional access so that only azure registered devices can access cloud resources
Further you can control which devices can be registered with Azure and who can register those devices

I am not sure if you will keep onpremise AD?
If yes, you can use hybrid azure ad join so that device must be joined to Onpremise ad and must be in onpremise network to join azure ad, later on further access can be controlled on conditional access policies
You do need intune and Azure AD premium licenses for any scenario
WestyIT Operations Manager

Author

Commented:
Hi Mahesh,

I should have added to the question that not everything will be in O365. We will still have some application servers on the local LAN which can also be accessed remotely via Citrix. The idea is if they come in to the office they would auto-connect to the corporate WiFi and be able to access the application servers directly.

Cheers
Sr. Network Engineer
CERTIFIED EXPERT
Commented:
This one is on us!
(Get your first solution completely free - no credit card required)
UNLOCK SOLUTION
MaheshArchitect
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Ok
Certificate might be required if you enforced it for wifi connectivity
For that purpose standard client authentication certificate is required
You can generate it from internal CA as well
You do need to add ca root certificate to wifi device / firewall so that it can trust client certificates

Godaddy option is also fine with certificate cost involved

Azure and Intune you don't need cert
WestyIT Operations Manager

Author

Commented:
Apologies for the late reply, been busy on other stuff. Going to go down the linked CA cert server route using the Intune connector.
Thanks
Unlock the solution to this question.
Join our community and discover your potential

Experts Exchange is the only place where you can interact directly with leading experts in the technology field. Become a member today and access the collective knowledge of thousands of technology experts.

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.