Skip navigation

Akamai EAA

Last Updated: August 21st, 2020


Duo integrates with Akamai Enterprise Application Access to add two-factor authentication, complete with inline self-service enrollment and Duo Prompt.

Duo and Akamai EAA

Duo Security’s authentication platform secures access to Akamai Enterprise Application Access (EAA), extending two-factor protection to web applications launched from a Akamai EAA browser session.

Before beginning Duo configuration, you should already have a functioning EAA tenant. You can add Duo MFA to any existing IdP in EAA. Once configured, Duo appears along with your other configured EAA multifactor options.

First Steps

  1. Sign up for a Duo account.
  2. Log in to the Duo Admin Panel and navigate to Applications.
  3. Click Protect an Application and locate Akamai Enterprise Application Access in the applications list. Click Protect this Application to get your integration key, secret key, and API hostname. (See Getting Started for help.)

Treat your secret key like a password

The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!

Configure Akamai EAA Authentication

  1. Log into your Akamai Enterprise Application Access (EAA) tenant's management portal as an administrator.

  2. Navigate to IdentityIdentity Providers​.

  3. Locate the identity provider (IdP) where you want to enable Duo MFA. Click the "Configure Identity Provider" gear icon to open that IdP's settings.

  4. Click the MULTIFACTOR tab on the identity provider's settings page.

  5. Make sure that IDP MFA Policy is enabled in the "General MFA Settings" section.

  6. Scroll down to the "MFA Factors" section and check the box to enable Duo and show the Duo information fields.

  7. Enter the Duo Akamai EAA application information from the Duo Admin Panel as follows.

    Integration Key Your integration key (i.e. DIXXXXXXXXXXXXXXXXXX)
    Secret Key Your secret key
    API Hostname Your API hostname (i.e.
    Duo UserID attribute Select the name format used when sending the username to Duo. One of Email, SAM Account Name, User Principal Name, or DOMAIN\SAM Account Name. The attribute selected must exist in the identity provider source directory with a value.
  8. Enable or disable the other non-Duo MFA options as you wish ("Email", "SMS", or "Authentication Token (TOTP)"). With these other options enabled users may use any available MFA option to log in. Disable other MFA factors if you'd like to to strictly require use of Duo authentication.

  9. Click Save & Exit​.

    Akamai EAA Duo Multifactor Setup

Please contact Akamai EAA support if you have any questions about using Duo two-factor authentication with your IdPs or need assistance configuring your authentication and multifactor settings in the Akamai management portal. Contact Duo Support for assistance with the Duo service itself.

Test Your Setup

Enable Hostname Whitelisting

If you plan to permit use of WebAuthn authentication methods (security keys, U2F tokens, or Touch ID), Duo recommends enabling hostname whitelisting for this application and any others that show the inline Duo Prompt before onboarding your end-users.

User Multifactor Setup

When you log into Akamai Enterprise Application Access as an end user after Duo was enabled, you see Duo as a multifactor authentication option on the "Account Settings" page.

  1. Click on DUO to begin setting up Duo authentication.

    Akamai EAA User Duo Setup

  2. Click the BEGIN SETUP button for Duo to go to the Duo enrollment prompt (if your username sent from Akamai EAA doesn't already exist in Duo). Follow the instructions to complete Duo enrollment.

    Akamai EAA User Duo Enrollment

  3. After you finish Duo enrollment, or if your username already exists in Duo with configured factors, you see the Duo authentication prompt on the mutifactor setup page. Approve Duo authentication using one of the available factor options.

    Akamai EAA User Setup Prompt

  4. After approving Duo authentication to verify Duo as a multifactor authentication option it may not be the default MFA option for EAA. Click Make Primary to default to Duo authentication at login.

    Akamai EAA User Make Duo MFA Primary

  5. Once Duo is both "Verified" and "Primary", click Next.

    Akamai EAA User Duo Setup

  6. Click Exit to complete multifactor setup for EAA.

    Akamai EAA User Duo Setup

Authentication with Duo

The next time you log in after Duo enrollment/setup is completed, you can choose one of the Duo authentication options to access Akamai EAA.

Akamai EAA Duo Authentication


Need some help? Try searching our Knowledge Base articles or Community discussions. For further assistance, contact Support.