An Azure network security service that is used to protect Azure Virtual Network resources.
Hey Hassan, it sounds like you’re on the right track trying to walled-garden Microsoft’s authentication endpoints so that brand-new Azure AD-joined devices can reach Azure AD, change their password, install certs via SCEPMan, and only then get full internet access. The key is to allow all of the AAD/PKE endpoints that handle sign-in and password resets. Here’s what I’d recommend:
- Identify the exact FQDNs and wildcards required From Microsoft’s own “Ruggedized network integration” guidance (used for Azure Stack Hub, but the list applies to any limited-internet scenario), you’ll need the following domains on your Meraki walled-garden list: • login.windows.net • login.microsoftonline.com • graph.windows.net • secure.aadcdn.microsoftonline-p.com • *.msftauth.net • *.msauth.net • *.msocdn.com Depending on your geo/tenant you may also need the gov/China/Germany endpoints (e.g. login.microsoftonline.us, login.chinacloudapi.cn, etc.), but start with the public ones above.
- Use the correct wildcard placements According to the Azure Firewall FAQ on FQDN wildcards, asterisks only work on the left-most side for domains; you cannot do
login.*.microsoftonline.com. Instead: • If you need all subdomains undermsauth.net, use*.msauth.net• For specific hosts likelogin.microsoftonline.com, just list the full FQDN - Add these into your Meraki SSID’s walled-garden list In the Meraki dashboard under Wireless > SSID > Access Control > Splash page > Walled garden, add each entry exactly as above. Save and push the update.
- Test connectivity before captive-portal auth On a device that has not yet logged into the portal, open a browser and try to hit https://login.microsoftonline.com. You should see the Azure AD sign-in page (or at least a redirect to your tenant). If that works, you know your walled garden entry is correct. Then proceed through the captive portal and confirm the same domains still resolve/route afterward.
- Verify SCEPMan and device registration Once the password change is successful, the device should automatically pick up certificates via your SCEPMan policy. If it doesn’t, check the event logs on the client (Applications and Services → Microsoft → Windows → DeviceManagement-Enterprise-Diagnostics-Provider) to see if it’s trying to hit any additional domains.
Hope this helps you nail down the exact set of allowed hostnames so new users can change their password before full network access.
Follow-up questions if you’re still stuck:
• Which Meraki firmware version are you on? There have been some wildcard-parsing fixes in recent releases.
• Are you using a custom RADIUS/Captive-Portal combo or Microsoft Cloud Auth in Meraki?
• What error do end users see when they try to reach login.microsoftonline.com (timeout, DNS error, redirect loop)?
• Can you share a packet capture (DNS + HTTP) from a client that’s stuck?
Reference list
• Azure Stack Hub ruggedized network integration (firewall requirements): https://learn.microsoft.com/azure-stack/ruggedized/network-integration?wt.mc_id=knowledgesearch_inproduct_azure-cxp-community-insider#firewall
• Azure Firewall FAQ (wildcard rules in app rules): https://learn.microsoft.com/azure/firewall/firewall-faq?wt.mc_id=knowledgesearch_inproduct_azure-cxp-community-insider#how-do-wildcards-work-in-target-urls-and-target-fqdns-in-application-rules
• Wildcard applications in the Microsoft Entra application proxy (wildcard syntax reference): https://learn.microsoft.com/entra/identity/app-proxy/application-proxy-wildcard?wt.mc_id=knowledgesearch_inproduct_azure-cxp-community-insider#prerequisites