Configure Cisco Duo Security for MFA

Configure Cisco Duo Security for MFA

Cisco Duo is a multi-faceted authentication provider and can only be used on your Auth0 tenant if all other factors are disabled. Your Duo account can support push notifications, SMS, OTP, phone callback, and more based on your configuration.

You cannot also enable Duo if other factors are enabled. Duo is only available to users when it is the sole factor enabled.

The application will prompt the user for the second factor with Duo, listing the options you have enabled in your Duo account.

Security Multi-Factor Authentication Cisco Duo Security Login screen example

Your users can download Duo from Google Play or the App Store for use as a second factor.

Prerequisites

  1. If you have not configured your Duo account, get started with the Duo documentation.

  2. Create a Duo Security Web SDK integration and capture the Integration Key, Secret Key, and API hostname credentials.

Configure Duo

To configure Duo Security, you must pass your Duo credentials to your application in the Auth0 Dashboard.

  1. Go to Dashboard > Security > Multi-factor Auth > Duo Security and enable it.

  2. Enter the information in the fields to link your Duo account to Auth0.

    Dashboard - Security - Multifactor Auth - Duo Security
  3. Click Save.

Enabling Duo from Rules

If you want to enable Duo from Rules, add set provider : 'duo' to your function.

function (user, context, callback) {
  context.multifactor = {
    provider: 'duo',
    allowRememberBrowser: false
  };

  callback(null, user, context);
}

Was this helpful?

/

Duo does not provide an option for "Remember Me" behavior. The 30-day MFA session is hard-coded to remember the user after the initial login.

To force your users to log in with Duo every time, create a rule with allowRememberBrowser: false.

Current Limitations

  • You cannot use Auth0 MFA Enrollment Tickets to enroll users with Duo. Onboard those users from Duo itself.

  • If you use New Universal Login, you must enable Duo from a rule with provider:'duo' as described above. You can conditionally use Duo or the built-in Auth0 provider for specific applications.

Learn more