Duo Security’s authentication platform secures access to Akamai Enterprise Application Access (EAA), extending two-factor protection to web applications launched from a Akamai EAA browser session.
Before beginning Duo configuration, you should already have a functioning EAA tenant. You can add Duo MFA to any existing IdP in EAA. Once configured, Duo appears along with your other configured EAA multifactor options.
The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!
Log into your Akamai Enterprise Application Access (EAA) tenant's management portal as an administrator.
Navigate to Identity → Identity Providers.
Locate the identity provider (IdP) where you want to enable Duo MFA. Click the "Configure Identity Provider" gear icon to open that IdP's settings.
Click the MULTIFACTOR tab on the identity provider's settings page.
Make sure that IDP MFA Policy is enabled in the "General MFA Settings" section.
Scroll down to the "MFA Factors" section and check the box to enable Duo and show the Duo information fields.
Enter the Duo Akamai EAA application information from the Duo Admin Panel as follows.
|Integration Key||Your integration key (i.e.
|Secret Key||Your secret key|
|API Hostname||Your API hostname (i.e.
|Duo UserID attribute||Select the name format used when sending the username to Duo. One of Email, SAM Account Name, User Principal Name, or DOMAIN\SAM Account Name. The attribute selected must exist in the identity provider source directory with a value.|
Enable or disable the other non-Duo MFA options as you wish ("Email", "SMS", or "Authentication Token (TOTP)"). With these other options enabled users may use any available MFA option to log in. Disable other MFA factors if you'd like to to strictly require use of Duo authentication.
Click Save & Exit.
Please contact Akamai EAA support if you have any questions about using Duo two-factor authentication with your IdPs or need assistance configuring your authentication and multifactor settings in the Akamai management portal. Contact Duo Support for assistance with the Duo service itself.
If you plan to permit use of WebAuthn authentication methods (security keys, U2F tokens, or Touch ID), Duo recommends enabling hostname whitelisting for this application and any others that show the inline Duo Prompt before onboarding your end-users.
When you log into Akamai Enterprise Application Access as an end user after Duo was enabled, you see Duo as a multifactor authentication option on the "Account Settings" page.
Click on DUO to begin setting up Duo authentication.
Click the BEGIN SETUP button for Duo to go to the Duo enrollment prompt (if your username sent from Akamai EAA doesn't already exist in Duo). Follow the instructions to complete Duo enrollment.
After you finish Duo enrollment, or if your username already exists in Duo with configured factors, you see the Duo authentication prompt on the mutifactor setup page. Approve Duo authentication using one of the available factor options.
After approving Duo authentication to verify Duo as a multifactor authentication option it may not be the default MFA option for EAA. Click Make Primary to default to Duo authentication at login.
Once Duo is both "Verified" and "Primary", click Next.
Click Exit to complete multifactor setup for EAA.
The next time you log in after Duo enrollment/setup is completed, you can choose one of the Duo authentication options to access Akamai EAA.