Duo Security’s authentication platform secures access to Akamai Enterprise Application Access (EAA), extending two-factor protection to web applications launched from a Akamai EAA browser session.
Before beginning Duo configuration, you should already have a functioning EAA tenant. You can add Duo MFA to any existing IdP in EAA. Once configured, Duo appears along with your other configured EAA multifactor options.
The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!
Migration to Universal Prompt for your Akamai Enterprise Application Access application is a two-step process:
Akamai Enterprise Application Access needs an update to support the Universal Prompt when it's ready, but the update isn't available yet. The "Universal Prompt" section reflects this status as "Waiting on App Provider". Please contact Akamai to request Duo Universal Prompt support for Akamai Enterprise Application Access.
After Akamai makes the necessary changes available you may need to install an application update on your server, or log in to Akamai Enterprise Application Access as an admin to enable Duo Universal Prompt support.
You'll later return to the settings on this page to activate the Universal Prompt for your Akamai Enterprise Application Access users once we've released it.
Click the See Update Progress link to view the Universal Prompt Update Progress report. This report shows the update availability and migration progress for all your Duo applications in-scope for Universal Prompt support.
Log into your Akamai Enterprise Application Access (EAA) tenant's management portal as an administrator.
Navigate to Identity → Identity Providers.
Locate the identity provider (IdP) where you want to enable Duo MFA. Click the "Configure Identity Provider" gear icon to open that IdP's settings.
Click the MULTIFACTOR tab on the identity provider's settings page.
Make sure that IDP MFA Policy is enabled in the "General MFA Settings" section.
Scroll down to the "MFA Factors" section and check the box to enable Duo and show the Duo information fields.
Enter the Duo Akamai EAA application information from the Duo Admin Panel as follows.
|Integration Key||Your integration key (i.e.
|Secret Key||Your secret key|
|API Hostname||Your API hostname (i.e.
|Duo UserID attribute||Select the name format used when sending the username to Duo. One of Email, SAM Account Name, User Principal Name, or DOMAIN\SAM Account Name. The attribute selected must exist in the identity provider source directory with a value.|
Enable or disable the other non-Duo MFA options as you wish ("Email", "SMS", or "Authentication Token (TOTP)"). With these other options enabled users may use any available MFA option to log in. Disable other MFA factors if you'd like to to strictly require use of Duo authentication.
Click Save & Exit.
Please contact Akamai EAA support if you have any questions about using Duo two-factor authentication with your IdPs or need assistance configuring your authentication and multifactor settings in the Akamai management portal. Contact Duo Support for assistance with the Duo service itself.
If you plan to permit use of WebAuthn authentication methods (security keys, U2F tokens, or Touch ID), Duo recommends enabling hostname whitelisting for this application and any others that show the inline Duo Prompt before onboarding your end-users.
When you log into Akamai Enterprise Application Access as an end user after Duo was enabled, you see Duo as a multifactor authentication option on the "Account Settings" page.
Click on DUO to begin setting up Duo authentication.
Click the BEGIN SETUP button for Duo to go to the Duo enrollment prompt (if your username sent from Akamai EAA doesn't already exist in Duo). Follow the instructions to complete Duo enrollment.
After you finish Duo enrollment, or if your username already exists in Duo with configured factors, you see the Duo authentication prompt on the mutifactor setup page. Approve Duo authentication using one of the available factor options.
After approving Duo authentication to verify Duo as a multifactor authentication option it may not be the default MFA option for EAA. Click Make Primary to default to Duo authentication at login.
Once Duo is both "Verified" and "Primary", click Next.
Click Exit to complete multifactor setup for EAA.
The next time you log in after Duo enrollment/setup is completed, you can choose one of the Duo authentication options to access Akamai EAA.