This guide explains how to integrate Assertiv with Cisco Meraki using SAML. When this set up is complete, users will be able to log into Cisco Meraki using their Assertiv account.
Create SAML administrator roles
Login to your Cisco Meraki account. Then navigate to Organization > Administrators
Create a SAML administrator Role.
Enter the Role name and permissions. For more information visit Managing_Dashboard_Administrators_and_Permissions
You will use the Role Name in the Assertiv Configuration.
Create Cisco Meraki app in Assertiv
Log into your Assertiv Organization (https://<your-org>.assertiv.com) as an Admin user and select the App Config dashboard tile.
Select the plus () button to create a new App config.
Search for the Cisco Meraki application and select the Cisco Meraki icon.
You will be prompted for some information on the following page.
Cisco Meraki Service Name: This is the name of the application how you would like it to appear in Assertiv. Make this a descriptive name that your users will understand. E.g "Corporate Cisco Meraki"
Signing Certificate: The certificate is used to create a trust between Assertiv and your Cisco Meraki account. For advanced users, if you have created a certificate you wish to use, select it here. Otherwise (or if you are unsure) you can select "-- Generate New Signing Certificate --".
Roles: The role is used to give the Assertiv user the specified role when the user Logs into the Meraki Dashboard. This role is found in Organization > Administrators under SAML administrator roles.
Save the configuration
You should now be shown the Edit Service page with some additional information.
You will need to keep this page open to add the Cisco Meraki Assertion Consumer URL. This will appear after you have entered the X.509 cert SHA1 fingerprint and saved the page.
Configure Cisco Meraki
Access the Organisation settings menu from Cisco Meraki.
Find the Section Labled SAML Configuration
Enable SAML SSO and click Add a SAML IdP.
Add the fingerprint from Assertiv into the X.509 cert SHA1 fingerprint field and save the changes.
The Consumer URL should then be available to copy back into the Assertiv Configuration.
The SLO logout URL is optional but could be configured with the following where <tenantName> replaces your organisation name:
Save the configuration.
After configuring roles, you can select the Cisco Meraki Icon to log you into Cisco Meraki.
For your users to access Cisco Meraki from their Assertiv apps page, you must set up a role, assign users to the role, and give that role permission to access the Cisco Meraki application.
More details on roles can be found in the following articles