{"id":3281,"date":"2015-06-11T09:51:37","date_gmt":"2015-06-11T15:51:37","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3281"},"modified":"2024-01-18T15:10:25","modified_gmt":"2024-01-18T20:10:25","slug":"integrating-cisco-meraki-with-jumpclouds-radius-as-a-service","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/integrating-cisco-meraki-with-jumpclouds-radius-as-a-service","title":{"rendered":"Integrating Meraki with RADIUS-as-a-Service"},"content":{"rendered":"\n

Cisco\u2019s Meraki<\/a> wireless access point platform is one of the most widely used WiFi platforms. Organizations both small and large deploy the Cisco Meraki wireless platform because of its enterprise class capabilities. Many of these organizations also leverage Meraki\u2019s ability to integrate with RADIUS to provide more fine grained control over user access.<\/p>\n\n\n\n

At JumpCloud, we too see the benefits of Meraki. We have integrated our Directory-as-a-Service\u00ae<\/a> platform through the RADIUS protocol<\/a> with Meraki. In this blog post, we\u2019ll describe how the two solutions work together at a high level.<\/p>\n\n\n\n

Why Connect Wireless Solutions with a Directory Service<\/b><\/h2>\n\n\n
\n
\"WiFi<\/figure><\/div>\n\n\n

It’s all about security and control.<\/p>\n\n\n\n

Without leveraging a directory service to backend the access control to a wireless network, the IT organization must rely on an SSID and passphrase as the mechanism to control access. That mechanism is fine when there are just a few people that know the passphrase, but as an organization grows, a shared passphrase as the control mechanism for network access becomes high risk<\/a>.<\/p>\n\n\n\n

So IT admins often look to extend access to the wireless network<\/a> by connecting to the core user directory. Each user can then be checked against the central user store to determine whether or not they should be granted access. This integrated approach is a significant step up in terms of security and control.<\/p>\n\n\n\n

Meraki\u2019s Wireless Access Points Support Integration<\/b><\/h2>\n\n\n\n

Through a simple RADIUS configuration screen, IT admins are able to connect the WAP infrastructure to the RADIUS server. The RADIUS server<\/a> is then connected to the directory, where a user\u2019s credentials will traverse the WAP to the RADIUS server and then be checked for validity by the directory server. Access will then be granted or denied.<\/p>\n\n\n\n

The process is straightforward and valuable, but unfortunately, the setup is not. Installing and configuring a RADIUS server is complex and painful. Then connecting that to both the wireless infrastructure and to the user directory is non-trivial.<\/p>\n\n\n\n

Simplifying Setup <\/b><\/h2>\n\n\n\n

JumpCloud\u2019s Directory-as-a-Service platform is solving this problem. Through an on-board RADIUS server, IT admins can simply point their WiFi infrastructure to JumpCloud\u2019s cloud-based RADIUS server<\/a>. The RADIUS server is then automatically connected to JumpCloud\u2019s cloud-based directory services platform. This way, all of the heavy lifting is done for the IT organization by JumpCloud.<\/p>\n\n\n\n

As users are added, deleted, and changed inside of the JumpCloud user directory, those changes impact the wireless network access. A terminated user trying to access the wireless network may have the correct SSID and passphrase, but because their credentials have been revoked, they are not able to access the WiFi network. This fine grain control over network access is all driven from one central location \u2013 the JumpCloud user directory.<\/p>\n\n\n\n

Integrating Cisco Meraki and JumpCloud<\/b><\/h2>\n\n\n\n
\n