Link to home
Start Free TrialLog in
Avatar of Westy
WestyFlag for United Kingdom of Great Britain and Northern Ireland

asked on

Meraki authentication options with AD joined on-Prem &Azure AD joined machines

HI, Looking for some advice on the best authentication method to use with Meraki for our environment. We are in Hybrid mode with O365 via ADFS, and shortly all mailboxes and data will be migrated to the cloud to allow staff to work from home etc. Users currently have on-prem AD joined laptops and PC's, but going forwards we are replacing up to 150 laptops and the current plan is to Azure AD join them instead of directly to the on-prem domain, and manage with Intune. We installed a new Meraki wireless network and configured a local NPS server as per Meraki instructions "Configuring RADIUS Authentication with WPA2-Enterprise" using Domain/Users Group, and I can connect to the corporate SSID using my AD credentials. However, we would like to lock down access to just corporate machines but the Azure AD joined machines do not show in the on-prem AD so cannot just use the domain/computers group. If we go down the local on-prem CA server certificate route , as I understand it we would have to first add this as a trusted authority on all the Azure joined laptops.  I am leaning towards using a trusted CA authority cert from Go-Daddy - is this the best option for my scenario?

Avatar of Mahesh
Flag of India image

Why you need certificate?

You could use intune to register devices / laptops to Azure ad and can use conditional access so that only azure registered devices can access cloud resources
Further you can control which devices can be registered with Azure and who can register those devices

I am not sure if you will keep onpremise AD?
If yes, you can use hybrid azure ad join so that device must be joined to Onpremise ad and must be in onpremise network to join azure ad, later on further access can be controlled on conditional access policies
You do need intune and Azure AD premium licenses for any scenario
Avatar of Westy


Hi Mahesh,

I should have added to the question that not everything will be in O365. We will still have some application servers on the local LAN which can also be accessed remotely via Citrix. The idea is if they come in to the office they would auto-connect to the corporate WiFi and be able to access the application servers directly.

Avatar of atlas_shuddered
Flag of United States of America image

Link to home
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Certificate might be required if you enforced it for wifi connectivity
For that purpose standard client authentication certificate is required
You can generate it from internal CA as well
You do need to add ca root certificate to wifi device / firewall so that it can trust client certificates

Godaddy option is also fine with certificate cost involved

Azure and Intune you don't need cert
Avatar of Westy


Apologies for the late reply, been busy on other stuff. Going to go down the linked CA cert server route using the Intune connector.