Private IPSK

Private IPSK for Cisco Meraki

Request a Demo

Authenticating clients on to a Network

with individual passwords on one SSID

This standalone module integrates with Meraki portal to create an easy to use secure onboarding portal . Each user can choose their own Private Shared key and control their own devices with our simple to use device management portal.

When setting up an enterprise wireless network, it is common to configure WPA2-Enterprise authentication with a centralized authentication server to provide heightened security for clients connecting to the network, while still allowing for easy and scalable management of authorized users. However, IT administrators may still encounter some drawbacks with this method of authentication.


Easy & scalable

What is IPSK?

Identity PSK or iPSK allows the flexibility of using the same SSID for everything PSK related and still have different keys and different rights on the network, all controlled from an authentication server like Cisco Identity Service Engine (ISE).

Cisco iPSK in a nutshell:


Single SSID, multiple keys, up to one per mac address


Grouping mac addresses with one key for the group


802.1x solution with VLANs, ACLs, SGT, bandwidth controls and so on.


While a username and password provides extra security, users may find remembering an extra set of credentials to be cumbersome when trying to get connected, and may be better served by using a private PSK. Additionally, certain devices may not support WPA2-Enterprise authentication, and would require an additional PSK SSID to be set up to connect to the same network, increasing wireless overhead and compromising on security.

Private / Identity PSK, with RADIUS authentication resolves these issues by acting as a standard WPA2 PSK SSID to clients, while authenticating clients to a central server based on their MAC address and allowing different PSKs to be set for specific clients or groups of clients.

Next Gen Guest Wi-Fi

A new world of portals