If you manage devices using Meraki MDM (Mobile Device Management), you may improve network security by pushing certificates to them via a Meraki SCEP (Simple Certificate Enrollment Protocol) CA certificate. SCEP is a protocol that automates the issuing of digital certificates to managed devices, which can be used to replace credentials in different uses, including for Wi-Fi, VPN, and application security. This setup dramatically improves network security and user experience. However, adopting Meraki’s default certification settings may expose your network to threats such as credential theft.
In this article, we’ll show you how to configure certificates in Meraki Systems Manager to build a robust and secure network environment. You can automate certificate deployment across all major operating systems, including Windows, iOS, and Linux, using Cisco Meraki Solutions and engineering Meraki technologies. The setup process includes generating an onboarding SSID, setting the SCEP server, and pushing certificates to endpoints managed by the Meraki Systems Manager. This solution protects your wireless LAN networks from unauthorized access, offering a solid security layer for your implementation.
Meraki Systems Manager can efficiently manage certificates by carefully configuring and deploying them, improving security for all connected devices in your network. This method strengthens your network and simplifies the process of ensuring safe access to controlled devices.
Using Meraki’s Default SCEP CA is a Security Risk
EAP-TLS and Meraki Integrations with SecureW2
Configuring the SecureW2 PKI and RADIUS Server
- Log in to the JoinNow Management Portal.
- Navigate to Device Onboarding > Getting Started.
- On the Quickstart Network Profile generator page, from the Generate Profile for drop-down list, select Internal User Authentication.
- From the Profile Type drop-down list, select Wireless.
- In the SSID field, enter the name of a profile.
- From the Security Type drop-down list, select WPA2-Enterprise.
- From the EAP Method drop-down list, choose EAP-TLS.
- From the Policy drop-down field, retain DEFAULT.
- From the Wireless Vendor drop-down list, choose Cisco Meraki.
- From the RADIUS Vendor drop-down list, select a RADIUS vendor.

- Click Create.
NOTE: The Getting Started wizard typically takes 60-90 seconds to create the profile.
To access the RADIUS details, follow the steps below.
- Navigate to RADIUS > RADIUS Configuration.
- Copy the Primary IP Address, Authentication Port, and Shared Secret of your subscribed region to your console.
Setting Up SecureW2 as a RADIUS Server in Meraki
Follow the steps below to configure the RADIUS server in Cisco Meraki.
- Log in to the Meraki Dashboard.
- Navigate to Wireless > Access control.


- In the Network access section, for Association requirements, from the Enterprise with a drop-down list, select my RADIUS server.
- From the WPA encryption mode drop-down list, select WPA2 only (recommended for most deployments).

- Under the Splash page, select None (direct access).
- In the RADIUS servers section, click Add a server.

- From the JoinNow Management Portal, navigate to RADIUS > RADIUS Configuration. Copy the Primary IP Address, Authentication Port, and Shared Secret, and then paste them into the Host, Port, and Secret fields in Meraki.

- In the RADIUS servers section, click Add a server again.

- From the JoinNow Management Portal, navigate to RADIUS > RADIUS Configuration. Copy the Secondary IP Address, Authentication Port, and Shared Secret, and then paste them into the Host, Port, and Secret fields in the Meraki.
- Click Save Changes.
Configure Access Point to use Splash Page
Follow the steps below to configure the access point.
- Log in to the Meraki Dashboard.
- Navigate to Wireless > Access Control.

- Under Network access, select Open (no encryption) in the Association requirements section.

- Under Splash page, select Click-through.

This process redirects to the SecureW2 landing page.
Creating a Certificate Authority with a Meraki Certificate Signing Request
- To set up your own CA, open the System Manager.
- Click MDM under Organization.
- Scroll down to the SCEP CA Certificate Configuration section.
- Download the Certificate Signing Request (CSR).

You can now use the downloaded CSR file to generate a custom CA. We did this by using SecureW2’s Management Portal to create a new certificate authority using Meraki’s CSR and generate a new certificate authority.
To create a Custom CA with a Certificate Signing Request (CSR) in SecureW2, follow these steps:
- Navigate to Dynamic PKI > Certificate Authorities.
- Click Add Certificate Authority.

- In the Basic section, from the Generate CA For drop-down list, select Device and User Authentication to authenticate devices and users
- From the Type drop-down list, select Intermediate CA.
- From the Certificate Authority drop-down list, select the default Root CA that comes with your organization.
- From the Generate via drop-down list, select Certificate Signing Request.
- From the Certificate Signing Request drop-down list, upload the CSR obtained from Meraki.
- Leave the other options at their default settings. You can now download the signed certificate after creating the Custom CA.

- Click Save.
- After creating your Custom CA, you can download the signed certificate:
- Go back to Certificate Authorities.
- Download your Custom CA certificate.
- Navigate to Meraki Systems Manager to upload your new certificate:
- Go back to SCEP settings under MDM.
- Upload the new signed certificate.
- Save the page.

How to Configure Cloud RADIUS for X.509 Certificate Authentication
Configuring your managed devices for X.509 certificate authentication consists of three significant steps: integrating a Public Key Infrastructure (PKI), such as SecureW2, with your Identity Provider (IDP); using a Cloud RADIUS service that is linked to your infrastructure; and integrating your PKI with your Mobile Device Management (MDM) system. The process varies slightly based on your infrastructure, so in the example steps below, we’ll demonstrate how you can set this up if your organization uses Azure AD/Entra ID.

Step 1: Configure SecureW2 PKI Services and Certificate Attribute Mapping
Configure Attribute Mapping in SecureW2
In the SecureW2 Administration Portal, go to Integration Hub > Core Platforms. Here, you may map properties such as “upn,” “email,” and “displayName.” To set these properties, edit the core provider and navigate to the Attribute Mapping tab. Local and Remote groups can be mapped using Object ID values obtained from the Microsoft Azure Portal.
Update the profile policy in SecureW2
To amend the profile policy, navigate to Policy Management > Authentication on the Administration dashboard. Edit the policy settings and choose the Core Provider. After making your changes, click the Update button.
Update the User Role policy in SecureW2
Navigate to Policy Management > Policy Workflows. On the Conditions page of DEFAULT ROLE POLICY 1, select the desired Core Provider from the drop-down list and click Update to save the changes.
Create a User Role Policy in SecureW2
On the Policy Workflows page, click Add Policy Workflow, enter a name for the policy workflow, and save it. The page refreshes and displays the Conditions tab. Click the Conditions tab, select a Core Provider from the drop-down list, and click Update to create the new policy workflow.
Create an Enrollment Policy in SecureW2
On the Enrollment page, click Add Enrollment Policy, enter a name for the enrollment policy, and save it. The page refreshes and displays the Conditions tab. Click the Conditions tab, select the relevant Policy Workflow and Device Role policies, and click Update.
Republish your network profile
Navigate to Device Onboarding > Profiles, and click Publish or Republish next to the profile you want to modify. Wait approximately 60–90 seconds for the changes to take effect.
To access the Wi-Fi wrapper package, click Open landing page and then click the JoinNow button. Download and run the file, sign in with your Azure credentials, and verify that the registration and connection are successful.
Step 2: Integrate With Your Identity Provider (IDP) by Creating an App in Azure for RADIUS Lookup
SecureW2 interacts seamlessly with various SAML and LDAP Core Providers, including Azure AD. Here’s how to set it up if you’re using Azure AD.
New App Registration
In Azure, navigate to App Registrations and create a new app. Fill out the required information for the latest app registration.
Create a client secret
In the Manage menu, select Certificates & Secrets. Create a new client secret, provide a name, choose an expiry date, and add it. Then, record the client secret value.
Create a Provider URL and Client ID
The Application (Client) ID and Provider URL are available on the Azure Overview page. Note your Tenant ID and replace it in the URL syntax: https://login.microsoftonline.com/{tenantID}
API Permissions
In the Manage tab, select API Permissions to grant the app access to your Azure directory. Add the required permissions and provide admin consent for your organization.

Step 3: Enroll Users for Certificates
Create an onboarding SSID
Use SecureW2’s JoinNow suite to generate an Open SSID for onboarding managed devices.
Apply Gateway APIs for Managed Devices
Use SecureW2’s Managed Device Gateway APIs to automate the certificate enrollment process for managed devices. These APIs integrate smoothly with typical MDM applications for registering machine and user certificates.
Install intermediate and root CA certificates on a RADIUS Server
Install the Root and Intermediate CA certificates from SecureW2’s PKI on the RADIUS server. Set up a secure SSID using certificate authentication and WPA2-Enterprise. Integrate SecureW2’s PKI with the RADIUS server by including the Root and Intermediate CA certificates in the trusted list. On the RADIUS server, define the authentication protocol (EAP-TLS) and set up permission policies.

Fast SCEP Certificate Issuance to All Your Meraki MDM Endpoints
Implementing a secure Meraki MDM system that includes SecureW2’s PKI and RADIUS server improves network security and guarantees that only authorized devices can access your resources. By avoiding the problems of Meraki’s default certification settings and implementing SecureW2’s comprehensive solutions, you can safeguard your network from possible attacks while improving the overall user experience. SecureW2 provides cost-effective, simple-to-implement solutions that interact smoothly with Meraki MDM and other vendors, resulting in a holistic approach to network security.
Contact us today to learn more or get started.