Duo Security’s authentication platform secures access to Akamai Enterprise Application Access (EAA), extending two-factor protection to web applications launched from a Akamai EAA browser session.
Before beginning Duo configuration, you should already have a functioning EAA tenant. You can add Duo MFA to any existing IdP in EAA. Once configured, Duo appears along with your other configured EAA multifactor options.
The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!
The new Universal Prompt provides a simplified and accessible Duo login experience for web-based applications, offering a redesigned visual interface with security and usability enhancements.
|Universal Prompt||Traditional Prompt|
Read the Universal Prompt Update Guide for more information about the update process and the new login experience for users.
Migration to Universal Prompt for your Akamai Enterprise Application Access application is a two-step process:
Akamai needs to update Akamai EAA to support the Universal Prompt, but the update isn't available yet. The "Universal Prompt" section reflects this status as "Waiting on App Provider" with the activation options inaccessible. Please contact Akamai to request Duo Universal Prompt support for Akamai Enterprise Application Access.
In the meantime, you can use Duo with Akamai Enterprise Application Access and the traditional prompt experience.
After Akamai makes the necessary changes available you may need log in to Akamai Enterprise Application Access as an admin to enable Duo Universal Prompt support.
You'll later return to the settings on this page to activate the Universal Prompt for your Akamai Enterprise Application Access users after Akamai releases the update.
Click the See Update Progress link to view the Universal Prompt Update Progress report. This report shows the update availability and migration progress for all your Duo applications in-scope for Universal Prompt support. You can also activate the new prompt experience for multiple supported applications from the report page instead of visiting the individual details pages for each application.
Log into your Akamai Enterprise Application Access (EAA) tenant's management portal as an administrator.
Navigate to Identity → Identity Providers.
Locate the identity provider (IdP) where you want to enable Duo MFA. Click the "Configure Identity Provider" gear icon to open that IdP's settings.
Click the MULTIFACTOR tab on the identity provider's settings page.
Make sure that IDP MFA Policy is enabled in the "General MFA Settings" section.
Scroll down to the "MFA Factors" section and check the box to enable Duo and show the Duo information fields.
Enter the Duo Akamai EAA application information from the Duo Admin Panel as follows.
|Integration Key||Your integration key (i.e.
|Secret Key||Your secret key|
|API Hostname||Your API hostname (i.e.
|Duo UserID attribute||Select the name format used when sending the username to Duo. One of Email, SAM Account Name, User Principal Name, or DOMAIN\SAM Account Name. The attribute selected must exist in the identity provider source directory with a value.|
Enable or disable the other non-Duo MFA options as you wish ("Email", "SMS", or "Authentication Token (TOTP)"). With these other options enabled users may use any available MFA option to log in. Disable other MFA factors if you'd like to to strictly require use of Duo authentication.
Click Save & Exit.
Please contact Akamai EAA support if you have any questions about using Duo two-factor authentication with your IdPs or need assistance configuring your authentication and multifactor settings in the Akamai management portal. Contact Duo Support for assistance with the Duo service itself.
If you plan to permit use of WebAuthn authentication methods (security keys, U2F tokens, or Touch ID) in the traditional Duo Prompt, Duo recommends configuring allowed hostnames for this application and any others that show the inline Duo Prompt before onboarding your end-users.
The Duo Universal Prompt has built-in protection from unauthorized domains so this setting does not apply.
When you log into Akamai Enterprise Application Access as an end user after Duo was enabled, you see Duo as a multifactor authentication option on the "Account Settings" page.
Click on DUO to begin setting up Duo authentication.
Click the BEGIN SETUP button for Duo to go to the Duo enrollment prompt (if your username sent from Akamai EAA doesn't already exist in Duo). Follow the instructions to complete Duo enrollment.
After you finish Duo enrollment, or if your username already exists in Duo with configured factors, you see the Duo authentication prompt on the mutifactor setup page. Approve Duo authentication using one of the available factor options.
After approving Duo authentication to verify Duo as a multifactor authentication option it may not be the default MFA option for EAA. Click Make Primary to default to Duo authentication at login.
Once Duo is both "Verified" and "Primary", click Next.
Click Exit to complete multifactor setup for EAA.
The next time you log in after Duo enrollment/setup is completed, you can choose one of the Duo authentication options to access Akamai EAA.
Need some help? Reach out to Duo Support for assistance with creating the Akamai EAA application in Duo, enrolling users in Duo, Duo policy questions, or Duo authentication approval issues. For assistance configuring or managing Akamai EAA please contact Akamai Support.