![]() Next to the same certificate, click and select Copy Fingerprint.The AuthPoint metadata provides your resource, in this case Cisco Meraki Dashboard, with information necessary to identify AuthPoint as a trusted identity provider. We recommend that you choose the certificate with the latest expiration date. Next to AuthPoint certificate you will associate with your resource, click and select Download Metadata.If you have a Service Provider account, you must select an account from Account Manager. From the navigation menu, select Configure > AuthPoint.After you have that, you can configure Cisco Meraki Dashboard. from the Certificate Management page in the AuthPoint management UI. To start, you must download the metadata file The metadata provides your resource with information necessary to identify AuthPoint as a trusted identity provider. You have an AuthPoint identity provider (IdP) certificate (see Certificate Management).A token is assigned to a user in AuthPoint.End-users can log in to Cisco Meraki Dashboard. ![]() This diagram shows the data flow of an MFA transaction for Cisco Meraki Dashboard.īefore you begin these procedures, make sure that: Cisco Meraki Dashboard Authentication Data Flow with AuthPointĪuthPoint communicates with various cloud-based services and service providers with the SAML protocol. Cisco Meraki Dashboard must already be configured and deployed before you set up MFA with AuthPoint. This document describes how to set up multi-factor authentication (MFA) for Cisco Meraki Dashboard with AuthPoint as an identity provider. Cisco Meraki Dashboard Integration with AuthPoint Deployment Overview
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |