Overview #
The Admin Portal serves as the central management interface for multiple network services, allowing administrators to oversee and configure various authentication, compliance, and access control settings. Through role-based access control (RBAC), administrators can define permissions based on organizational needs, ensuring secure and efficient management of authentication methods, compliance settings, and network security policies across these solutions.
User Roles & Permissions #
The portal supports role-based access control (RBAC), allowing administrators to define user permissions based on their responsibilities. When adding an admin user, different roles can be assigned:
- Network Cloud Services – Administrator
Full access to network cloud services, including RADIUSaaS, Meraki Wireless Private Networks, and ISE Device Management. - Organization – Administrator
System-wide configuration and administration access, including compliance and data retention policies. - Sign In – Administrator
Full control over sign-in services, login authentication, and user management. - Sign In – Module Manager
Management of login modules, login reports, and user activity logs. - Sign In – Operations
Access to service status, network statistics, and operational insights.
๐ Organization โ Administration Portal Users
When a new admin is added, an invitation email is automatically sent to the assigned administrator. This email contains a link allowing the user to set their password and complete the onboarding process.
Since admin accounts are global, if an existing admin is granted access to an additional portal, a new invitation email is sent, requiring the admin to acknowledge and accept the responsibility of administering the additional portal.
Multi-Factor Authentication (MFA) #
To enhance security, administrators can enforce MFA (Multi-Factor Authentication) for all portal users. MFA requires an additional authentication step using email verification or app-based authentication:
- Email MFA: Users receive a unique one-time verification code via email upon login.
- App-Based 2FA: Users can configure their own two-factor authentication (2FA) using Google Authenticator or similar apps.
๐ My Account โ Configure 2FA
๐ Organization โ Administration Portal Users โ Settings
Single Sign-On (SSO) with SAML #
The portal supports SAML-based authentication, allowing admins to log in using their Microsoft Azure AD or Google accounts. This ensures secure authentication without storing or proxying credentials within the system.
- Users must first accept the terms and privacy policy on the captive portal.
- Redirection to Microsoft or Google occurs for authentication via SAML.
- Upon successful authentication, SAML signals the login success to the portal.
๐ Organization โ Federation Configuration
Managing Admin Users #
Administrators can manage portal access by adding, removing, and modifying admin accounts. The Admin Portal Users section provides visibility into user roles, login history, and access permissions.
๐ Organization โ Administration Portal Users
Changing Password & Account Details #
Users can manage their account credentials and personal settings directly from their profile. Available options include:
- Change password (requires entering the current password for verification).
- Update account details (modify name, newsletter preferences, and email settings).
- Configure Two-Factor Authentication (2FA) for added security.
๐ My Account โ Change Password / Configure 2FA
Password Requirements #
When updating a password, the following requirements must be met:
โ Password length: Between 8-35 characters
โ At least one lowercase letter (a-z)
โ At least one uppercase letter (A-Z)
โ At least one digit (0-9)
โ At least one special character (!? @ # $ % & * + –)
๐ My Account โ Change Password