![]() ![]() See Protecting Applications for more information about protecting applications in Duo and additional application options. Click Protect to the far-right to start configuring Okta. Log on to the Duo Admin Panel and navigate to Applications.Ĭlick Protect an Application and locate the entry for Okta with a protection type of "2FA with SSO hosted by Duo (Single Sign-On)" in the applications list. Once you have your SSO authentication source working, continue to the next step of creating the Okta application in Duo. Configure Single Sign-Onīefore configuring Okta with Duo SSO using Security Assertion Markup Language (SAML) 2.0 authentication you'll first need to enable Duo Single Sign-On for your Duo account and configure a working authentication source. Duo checks the user, device, and network against an application's policy before allowing access to the application. For example, you can require that Salesforce users complete two-factor authentication at every login, but only once every seven days when accessing Okta. Duo SSO prompts users for two-factor authentication and performs endpoint assessment and verification before permitting access to Okta.ĭuo Single Sign-On is available in Duo Premier, Duo Advantage, and Duo Essentials plans, which also include the ability to define policies that enforce unique controls for each individual SSO application. Duo Single Sign-On acts as an identity provider (IdP), authenticating your users using existing on-premises Active Directory (AD) or another SSO IdP. In addition, as sensitive information makes its way to cloud-hosted services it is even more important to secure access by implementing two-factor authentication and zero-trust policies.ĭuo Single Sign-On is our cloud-hosted SSO product which layers Duo's strong authentication and flexible policy engine on top of Okta logins. If a user's primary password is compromised, attackers may be able to gain access to multiple resources. While SSO is convenient for users, it presents new security challenges. ![]() Single sign-on (SSO) technologies seek to unify identities across systems and reduce the number of different credentials a user has to remember or input to gain access to resources. If you're looking to add Duo as a multifactor option directly to Okta without deploying Duo SSO, please see Duo Multifactor for Okta.Īs business applications move from on-premises to cloud hosted solutions, users experience password fatigue due to disparate logons for different applications. Our cloud-hosted SSO identity provider offers inline user enrollment, self-service device management, and support for a variety of authentication methods - such as passkeys and security keys, Duo Push, or Verified Duo Push - in the Universal Prompt. Add two-factor authentication and flexible security policies to Okta SAML 2.0 logins with Duo Single-Sign On.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |