Try Duo's trusted access solution now.
Free TrialDuo lets you reduce risks by enforcing precise policies and controls. Enable your team to define and enforce rules on who can access what applications — under what conditions. Define access policies by user group and per application to increase security without compromising end-user experience.
Duo Beyond, Duo Access, and Duo MFA plans customers gain granular control with the Policy & Control feature.
Duo Free plan customers have limited access to Duo policies. Free plans may only control the New User Policy via a global policy. All other available application settings are configured at the individual application.
Create and manage your policies from the top-level Policies tab in the Duo Admin Panel.
Only admins with the Owner or Administrator roles can create or edit policies. Admins with the Application Manager role may assign existing policies to applications, but may not edit or create policies.
When creating policies that restrict access for users, keep in mind that users with bypass status are not subject to these restrictions, as they bypass Duo authentication entirely.
The Global Policy is built-in and cannot be deleted. It always applies to all applications, so you should edit this policy if there are settings you'd like to control for all users and all applications. A summary of the Global Policy settings is shown on the Policies page. Settings at the Duo defaults are greyed out.
Your Duo subscription level determines which policy options show up in the editor. For example, Duo MFA receives a subset of the policy settings available to Duo Access and Duo Beyond customers. As you review the various policy settings in this document, note the Duo plans listed in the Available in information to determine if a setting applies to your subscription or not.
Role required: Owner or Administrator
To edit the Global Policy from the Policies page:
Click Edit Policy in the upper right of the Global Policy summary.
Once in the Global Policy editor, click the policy settings listed on the left side of the editor that you want to modify, then update the setting configuration on the right side of the editor.
Click Save Policy when your edits to the Global Policy are complete.
The Global Policy summary reflects your new policy settings (with your configured settings flagged as "Enabled").
If you'd like to restore the original Global Policy settings, open the Global Policy editor again and click the Revert to default link at the top of the "Edit Policy" window. Click Save Policy to apply the Global Policy defaults.
If certain applications require policy and controls that differ from the Global Policy, you can create a Custom Policy and assign it to those applications. Custom policies for an application can also be limited to specific groups (Duo Access and Duo Beyond customers). Custom Policies only need to specify the settings they wish to enforce.
Create custom policies for groups or applications from either the main Policies page or from the properties page of any application. Duo Beyond and Duo Access policies may be shared between multiple groups and applications, while Duo MFA custom policies my be shared between applications only.
When you view an application, the Global Policy settings are shown because these settings apply to all applications unless they are overridden by a custom application or group policy.
If an application policy or group policy setting overrides a Global Policy setting, the overridden setting is crossed out in the Global Policy view. In the example below, the "HIPAA Policy" application policy settings (New User Policy, User Location, etc.) override those same settings in the Global Policy.
Role required: Owner or Administrator
Admins with the Owner and Administrator role can create and assign a new custom policy right from an application's properties page. To do this:
Navigate to an application's properties page in the Duo Admin Panel.
Click the Apply a policy to all users link to assign the policy to all users of that application.
Click the Or, create a new Policy link instead of selecting a policy to apply from the drop-down list.
The policy editor launches with an empty policy.
Enter a descriptive Policy Name at the top of the left column, and then click each policy item's name to add it to your new custom policy. Each item you click is added to the policy customization area on the right, where you can adjust the settings. Click the X on the right to remove a setting from the customization area.
When you are done adding and configuring policy settings, click Create Policy to save the settings and return to the "Apply a Policy" prompt.
Click Apply Policy. The application page shows the new policy assignment.
Role required: Owner or Administrator
Duo Beyond or Duo Access admins with the Owner or Administrator role can create a new custom policy and assign it to one or more Duo groups right from an application's properties page. To do this:
Navigate to an application's properties page in the Duo Admin Panel.
Click the Apply a policy to groups of users link to assign the policy to only certain users of that application
Click the Or, create a new Policy link instead of selecting a policy to apply from the drop-down list.
The policy editor launches with an empty policy.
Enter a descriptive Policy Name at the top of the left column, and then click each policy item's name to add it to your new custom policy. Each item you click is added to the to the policy customization area on the right, where you can adjust the settings. Click the X on the right to remove a setting from the customization area.
When you are done adding and configuring policy settings, click Create Policy to save the settings and return to the "Apply a Policy" prompt, with your newly created policy selected. Start typing in a group's name in the Groups field and select the policy target group(s) from the suggested names.
Click Apply Policy. The application page shows the new group policy assignment.
Role required: Owner or Administrator
To create a custom policy from the main Policies page:
Click New Policy.
The policy editor starts with an empty policy.
Enter a descriptive Policy Name at the top of the left column, and then click each policy item's name to add it to your new custom policy. Each item you click is added to the to the policy customization area on the right, where you can adjust the settings. Click the X on the right to remove a setting from the customization area.
When you are done adding and configuring policy settings, click Create Policy.
The Policies page lists the newly created policy. From the policies page you can edit or delete the custom policy by clicking the appropriate action.
Role required: Owner, Administrator, or Application Manager
To assign an existing custom policy to an application:
Navigate to an application's properties page in the Duo Admin Panel.
Click the Apply a policy to all users link to assign the policy to all users of that application.
Select the policy to apply from the drop-down list.
Note that admins with the Application Manager role do not see the "Or, create a new Policy" link visible to Owner and Administrator roles.
Click Apply Policy. The application page shows the new policy assignment.
Role required: Owner, Administrator, or Application Manager
To assign an existing custom policy to a group (Duo Access and Duo Beyond):
Navigate to an application's properties page in the Duo Admin Panel.
Click the Apply a policy to groups of users link to assign the policy to a specific group of users who access that application.
Select the policy to apply from the drop-down list. Then start typing in a group's name in the Groups field and select the policy target group(s) from the suggested names.
Note that admins with the Application Manager role do not see the "Or, create a new Policy" link visible to Owner and Administrator roles.
Click Apply Policy. The application page shows the new group policy assignment. Clicking the name of the policy group target displays the properties and members of the group.
The policy framework applies custom group policy settings in the order they are listed in an application's Policy properties. When group policy settings conflict, the first policy listed has the highest precedence.
You can reorder group custom policies on an application by clicking the upward-pointing arrow underneath the group policy's name. This will move that policy one spot up in the list of group policies.
In the example below, the effective policy setting is that a member of both the "CorpHQ_Users" and "ITAdmins" groups may authenticate from a device without a screen lock enabled. Reordering the policies so that the "Require Screen Lock for Admins" group policy is listed first enforces that "ITAdmin" group members always need screen lock enabled to authenticate to this application.
Clicking Replace Policy next to any of an application's currently assigned custom policies brings up the Apply a Policy window. From this window you can pick a different custom policy to apply, or pick different groups to associate with a group policy.
The Applications page of the Duo Admin Panel lists all of your applications. The Application Policy and Group Policies columns display current policy assignments for each application.
Clicking any policy name shown on the Applications page takes you to the Policy section of the properties page for that application.
To remove a custom policy from an application, click Unassign Policy near that policy's name in the Policy section of an application's properties page.
To delete a custom policy from Duo, navigate to the Policies page and click Delete Policy to the right of that policy's name. Deleting the policy also removes it from any applications. The alert shows how many applications (if any) the policy currently affects.
Duo captures policy related events -- such as custom policy creation and edits to the Global Policy -- in the Administrator Actions log.
Available in: Duo Free, Duo MFA, Duo Access, and Duo Beyond
The new user policy controls authentication for users not enrolled in Duo. In Duo, an enrolled user is someone who exists in the service and has at least one authentication device attached, which can be a phone, hardware token, etc. The new user policy can be one of the following:
To change the new user policy, click the radio button next to the desired setting.
Available in: Duo MFA, Duo Access, and Duo Beyond
Configure this policy to change how both existing Duo users and unenrolled/new users access a Duo-protected application or to change access to selected applications. This overrides less-restrictive authentication policy settings configured at the global, application, or group level. More restrictive policy settings, such as a user location policy denying access to a specific country, still apply.
Changing the authentication policy setting from the default prevents new users from completing inline self-enrollment while authenticating to applications. When set to "Bypass 2FA", users not enrolled in Duo bypass the frame entirely when accessing the application so there is no opportunity for self-enrollment. If authentication to the application is blocked with the "Deny Access" setting, new users cannot self-enroll in that scenario either. End users who receive enrollment links via email may complete the Duo enrollment process via the emailed link regardless of the authentication policy setting.
As you deploy Duo throughout your organization you may need to let designated users access a certain application without Duo authentication, while requiring that they complete Duo 2FA when accessing any other protected application.
Accomplish this by first creating a Duo group (manually or via Directory Sync) containing those users.
Next, view the application which you want those group members to bypass Duo authentication in the Admin Panel. Click on Apply a policy to groups of users to create a new policy with the authentication policy set to Bypass 2FA, and then attach that new policy to your bypass group.
When the users in that Duo group access that application, they'll pass through to the application after successful verification of primary credentials. All other users accessing that application are subject to any other access policy settings applied to that application or in the global policy.
You can use the same process with the authentication policy set to Deny access to block users from accessing a selected application while still permitting them access to other Duo applications.
If you apply the authentication policy to an application as an application policy (instead of a group policy), then the configured bypass or deny access setting applies to all users of that application. Again, this overrides any other access policy set at the global level, and access to other Duo applications is unchanged.
Configuring the authentication policy within Duo's global policy affects all Duo application and all users — whether the user is enrolled in Duo or not. If you set the authentication policy to deny in the global policy then no users can access any of your Duo-protected applications (unless another policy setting permits access). Conversely, if you set the authentication policy to allow access in the global policy, then all users can access any application without completing Duo two-factor authentication (unless another policy requires 2FA).
Available in: Duo Access and Duo Beyond
The user location looks up the geographical origin of a user's access device IP address, and can then enforce policy based on that location. You can deny all access from certain countries, or always require two-factor authentication for access requests from a country.
To change the user location policy, start typing in a country name to select it from the list, then change the drop-down to the desired setting for that country. The available settings are:
Available in: Duo Beyond
Duo's trusted endpoints feature determines whether an access device is managed by your organization or is an unmanaged BYOD or unknown device. When an application loads the Duo Prompt it checks for the presence of a Duo device certificate or verification information from your MDM software or Duo Mobile app on that endpoint. You can use this policy to gain information about the devices used to access your Duo-protected web applications, and optionally restrict access from unmanaged endpoints.
The primary endpoint policy options are:
It's possible to apply different trusted endpoint policies to mobile devices than to computers. If you'd like to enable this functionality then click on Advanced Options for Mobile Endpoints to expose these additional selections:
Enabling the trusted mobile endpoint option could potentially make your overall trusted endpoints deployment less secure. Learn more about the security implications of enabling mobile endpoint options in your trusted endpoints policy.
See our full Trusted Endpoints guide for more information and step-by-step deployment instructions.
Available in: Duo Access and Duo Beyond
The Duo Device Health application gives organizations more control over which laptop and desktop devices can access corporate applications based on the security posture of the device. he first time users log in to an application protected by the web-based Duo Prompt with the Device Health Application policy enabled, they are prompted to download and install the Duo Device Health application. Once the Device Health application is installed, Duo blocks access if the device is unhealthy based on the Duo policy definition and informs the user of the reason the authentication was denied.
The Device Health options are:
Don’t require users to have the app: When this option is selected, the policy is not in effect and has no impact on end user access. As a result, end users are not prompted to install the Duo Device Health application when accessing a Duo-protected application. Data will not be collected from the Duo Device Health application, even when it is present on the machine.
Require users to have the app only: When this option is selected, but none of the "Block access" options are selected, the Device Health application must be installed and reporting information to Duo for access.
End users running devices that can install the app (Windows 10 and macOS 10.13+) are prompted to download the app from the Duo prompt when attempting to access a Duo-protected application associated with the policy if they do not already have the app installed. Devices that are capable of running the app but do not have it installed and running will be blocked.
The app will collect health information from the device, but Duo will not block the user from getting access if it does not pass the specific firewall, encryption, and password health checks. This means that the device will be able to access the application even if the device would not pass each health check.
Devices that cannot run the app, including older versions of Windows, Linux, etc., will not be prompted to install the app and are effectively allowed to bypass the Device Health Application policy.
Require users to have the app and any blocking options: When this option is selected and one or more of the "Block access" options are selected, the Device Health application must be installed and reporting information to Duo, and the device must satisfy the specified health requirements for access.
End users running devices that can install the app (Windows 10 and macOS 10.13+) are prompted to download the app from the Duo prompt when attempting to access a Duo-protected application associated with the policy if they do not already have the application installed. Devices that are capable of running the app but do not have it installed and running will be blocked.
The app collects health information from the device, and Duo will allow or block access to the protected application based on the device health options selected.
Devices that cannot run the app, including older versions of Windows, Linux etc. will not be prompted to install the app and are effectively allowed to bypass the Device Health Application policy.
Note that the default “fail-open” Device Health Application policy allows you to enforce health checks for supported macOS and Windows 10 devices, while not blocking users who need to access an application using a non-supported device. You can optionally use Duo's Operating Systems policy to restrict other device types from accessing the application.
See our full Device Health guide for more information and step-by-step deployment instructions.
Available in: Duo MFA, Duo Access, and Duo Beyond
Duo's remembered devices feature is similar to the "remember my computer" or "keep me logged in" options users are accustomed to seeing during primary authentication on many websites. With the remembered devices feature enabled, the user will be offered a “Don't prompt me again on this device” checkbox during login. When users check this box, they will not be challenged for secondary authentication when they log in again from that device for a set period of time. This setting only works with applications that show the Duo Prompt in a browser.
To enable remembered devices, select the Users may choose to remember their device for _ days setting and enter the desired number of days or hours — up to 365 days — in the space provided (the default is 30 days).
You also have the option to enable remembered devices Per each application or For all protected web applications. When this setting is enabled per application, then it only applies to an individual Duo-protected service. Subsequent access of the same application will not require 2FA after the first authentication, but if a user accesses a different application protected by the Duo then the user will have to approve a Duo login request again for the second application for the life of that session (the amount of time configured in the policy setting).
When the remembered devices option is enabled for all protected web applications, this creates a trusted session, where any applications to which you link this specific policy won't prompt for Duo authentication after a user logs in to any one of that set of linked applications and chooses to remember their device. This is especially helpful for users of the Duo Access Gateway. In this scenario, you would create a policy with remembered devices for all applications and then apply that same policy to each Duo Access Gateway protected SAML application for which you don't want additional 2FA prompts. When a user logs into one of the protected SAML apps with that policy, like Google Apps, and chooses to remember that device, the user isn't prompted for Duo access again when accessing other SAML apps via the Duo Access Gateway with the same linked remembered devices policy. Accessing an application with a different remembered devices policy requires Duo 2FA approval.
In practice, we recommend configuring your remembered devices policy at the global policy level, and then creating application and group level policies to override the trusted login session for those sensitive or restricted access applications where you want your users to perform Duo authentication again.
Available in: Duo Access and Duo Beyond
The operating systems policy settings allow you to control which operating systems and versions are allowed to access your applications when protected by Duo's browser-based authentication prompt, while also encouraging users running older operating systems to update to the latest version.
The default settings allow access, authentication, and enrollment from browsers on all Duo supported operating systems, mobile platforms, and versions with no warnings. You may block access from all versions of any of the OS platforms listed in the policy editor: Android, BlackBerry, Chrome OS, iOS, Linux, macOS, Windows, and Windows Phone. Duo offers more granular options for the Android, iOS, macOS, and Windows operating systems, like warning on or blocking access below a certain version, warning the user that they need to update to an approved version instead of blocking access outright, and setting a grace period for warning or blocking a user after a version becomes outdated.
Scroll down in the policy editor to see all OS options.
Enable the Encourage users to update option by picking your minimum allowable OS version from the drop-down selector. You can choose to select a specific version, or let Duo determine the most recent available or end-of-life version.
After choosing the OS version, select a grace period from the When a version becomes out of date or end of life, encourage to update choices. Setting this to "Immediately" means users see the warning as soon as their current version is lower than the version you selected. You can delay the Duo warning for up to one year.
Once configured, Duo shows a notification during authentication or enrollment to your users informing them that they should update when accessing your Duo-protected resource from a device running an operating system version older than your selection.
The user may disregard the warning and continue with authentication. For example, you may choose to encourage Windows users to update version "below 8.1" and to start warning them "Immediately". A user accessing your application from a Windows 8 PC sees a warning at the bottom of the Duo prompt. Clicking "Let's update it" provides the user with information on how to update the operating system. Users can proceed past the warning by clicking "Skip".
Restrict application access to only the versions you've allowed by making a selection in the the Block versions option for an OS, along with a corresponding grace period. Blocking any operating system version(s) prevents users from completing authentication or new user enrollment from that disallowed OS (or OS version). To continue the previous example, choosing to block users with Windows versions "below 8.1" disallows authentication or enrollment for any user trying to access your application from a Windows 8 computer. Users can't proceed past the out-of-date software notification.
Uncheck the "Allow" option for an OS to prevent access entirely, i.e. if you uncheck Allow Windows Devices in the policy editor, then users accessing your application from any version of Windows are blocked.
The Android and iOS mobile platforms can also be restricted to a minimum allowed version or blocked entirely. Blocking any version of a mobile OS platform, e.g. iOS or Android, not only restricts access to resources from browsers on those OS platforms or versions, but also prevents use of Duo Mobile to Duo Push requests or generate usable passcodes on devices running the restricted OS. If you were to block iOS versions "below 9.0" then any users with Apple devices running iOS 8.0 or lower can no longer use Duo Push or app generated passcodes. If a user has other additional activated devices running a different mobile platform, the functionality of the other devices is not affected.
When a mobile device operating system or version is restricted users see a message in the browser-based Duo Prompt.
Duo Mobile also notifies the user that the mobile platform or version is not allowed when attempting to approve the Duo Push request.
Passcodes from a hardware token or received via SMS are allowed, as are phone call authentications, but entering a passcode generated by Duo Mobile on any device running the restricted platform results in an error stating that platform is not permitted.
As an example scenario, if you disallow Windows Phone devices then your iOS, Android, and BlackBerry users continue to receive and approve Duo Push requests, and can also authenticate with SMS passcodes, application passcodes, hardware tokens, or over the phone. Your Windows Phone users can only use SMS passcodes to authenticate, approve a login via phone call, or use a hardware token passcode. If you wanted to completely prevent any use of Windows Phone to approve authentications, you'd also need to disable the "Phone callback" and "SMS passcodes" options in the Authentication Methods policy setting. Keep in mind that disabling phone and SMS authentication affects authentication for all users, no matter what mobile OS they use.
Available in: Duo Access and Duo Beyond
Enable this feature to inform your users when their web browser is out of date and optionally block access to your Duo-protected resources from clients with older browser versions or an entire browser family. This policy supports Chrome, Chrome Mobile, Edge, Firefox, Internet Explorer, Mobile Safari, Safari, and other browsers (which includes Firefox Mobile). The default setting is to allow all versions of all browsers without any notifications.
When the "Warn users if their browser is out of date" option is enabled, users authenticating via the Duo Prompt see a notification when the web browser version used is older than the current release version. Instructions for updating or a link to the browser vendor's website are provided if applicable. If you have only opted to warn users, they may skip the software update and complete authentication. The out of date notification continues appearing during authentication attempts until the end user updates to the current version.
You may also choose to block user access when web browsers are out of date and specify a grace period during which users may continue to authenticate with older versions (0 days to one year after the current release).
If you set your policy to block access from out of date browsers, users can skip past the software update warning up until the end of the grace period you specified in the policy. After that, users may not continue to Duo new user enrollment and authentication. Only updating the browser to a current version permits a user to complete Duo authentication or enrollment.
Restrict user access from certain web browsers completely by selecting the browser under "Always block".
See Software Update in the user guide for more information.
Available in: Duo Access and Duo Beyond
Enable this feature to inform your users when selected plugins are out of date or block access to your Duo-protected resources from clients with outdated plugins (or block a plugin entirely). The default setting is to allow all versions of Flash and Java plugins without any notifications.
When the “Warn users" option is enabled, users authenticating via the Duo Prompt see a notification when the selected plugins are older than the current release version. If you have only selected to notify users of the outdated software, they may skip the software update and complete authentication. The software update notification continues appearing during authentication attempts until the end user updates the affected plugin.
You may also choose to block user access when plugins are out of date and specify a grace period during which users may continue to authenticate with older versions (0 days to one year after the current release).
If you set your policy to block access from out of date plugins, users can skip past the software update warning up until the end of the grace period you specified in the policy. After that, users may not continue to Duo new user enrollment and authentication. Only updating the affected plugins permits a user to complete Duo authentication or enrollment.
Restrict user access with certain plugins completely by selecting "Block all versions".
Configure software notifications for either or all of the following plugins:
See Software Update in the user guide for more information.
Available in: Duo MFA, Duo Access, and Duo Beyond
Define global or application 2FA policies for different networks with Duo's authorized networks policy. MFA customers can minimize Duo prompts for specific networks, while Access and Beyond customers have additional options to require Duo authentication or block access entirely on a per network basis.
The authorized policy options are:
Allow access without 2FA from these networks - Users accessing Duo-protected resources from these networks skip Duo secondary authentication. Specify a block of IP addresses, IP ranges, or CIDRs as a comma-separated list.
By default, Duo prompts users to enroll when logging in from an authorized network when the new user policy is set to require enrollment. To prevent unenrolled users from receiving the Duo enrollment prompt when connecting from an authorized network, uncheck the Require enrollment from these networks setting.
Enabling the deny access option blocks access from Duo applications that don't report client IP! This prevents connections for any Duo application that shows the client IP as 0.0.0.0. Before configuring the setting please review your authentication logs in the Admin Panel to verify your Duo-protected applications report the client IP.
If there is any overlap between the network segments or IP addresses defined in the "allow access" and "require 2FA" options, then the more restrictive policy setting applies and access requires Duo authentication.
The Duo MFA plan authorized networks policy only permits whitelisting a network to bypass Duo MFA.
Available in: Duo Access and Duo Beyond
Duo can help you monitor and optionally prevent authentication attempts originated from known anonymous IP addresses, such as those provided by TOR and I2P, HTTP/HTTPS proxies, or anonymous VPNs.
Available in: Duo MFA, Duo Access, and Duo Beyond
Duo offers a variety of ways that users can receive their second authentication factor: one-tap authentication with Duo Push, a passcode sent via SMS, an automated voice call, and so on (see our detailed explanation of all authentication methods).
WebAuthn security keys can be used with the browser-based Duo Prompt when accessing applications with Chrome 70 and later or Firefox 60 and later on macOS and Windows. WebAuthn Touch ID support is available only in Chrome 70 or later on a Touch ID compatible MacBook.
To restrict authentication methods, just deselect the methods you don't want used.
For example, you can uncheck the "Phone callback" authentication method. Phone call no longer appears as an option in Duo Prompt.
The default setting allows all of Duo's authentication methods. If all methods are deselected, then only bypass codes may be used to authenticate.
Note: Even if Duo Push is disabled, users will still be able to use Duo Mobile to generate a one-time passcode (much as they might with a hardware token). You can prevent users from using the app to generate one-time passcodes by unchecking the Duo Mobile passcodes authentication method.
Available in: Duo Access and Duo Beyond
The Duo Mobile smartphone app is an essential part of most organizations' two-factor deployment. We may need to issue app updates to address security vulnerabilities should any be discovered. The Require up-to-date security patches for Duo Mobile policy setting allows Android and iOS authentication from devices running the minimum secure Duo Mobile version (currently version 3.8 for both iOS and Android) or later while preventing authentication from Duo Mobile versions prior to the minimum secure version. Enable this setting to ensure that users can't authenticate from older Duo Mobile versions with security issues corrected by a later Duo Mobile version.
The default setting allows authentication from Android and iOS devices running any version of Duo Mobile.
Available in: Duo Access and Duo Beyond
It is possible to gain privileged access to the operating system of a mobile device. This is known as "rooting" on Android, and "jailbreaking" on iOS. Duo can verify whether a device is rooted or jailbroken and prevent authentication from those devices. Duo also utilizes Google's SafetyNet device attestation to identify tampered-with devices. Tampered, rooted, and jalbroken devices may be considered a security risk because they are more vulnerable to exploit by malware and malicious apps.
You can prevent Duo authentication approvals from tampered-with or rooted Android and jailbroken iOS devices by enabling the Don't allow authentication from tampered devices policy setting. This setting has no effect on other mobile platforms.
The default setting allows authentications from all iOS and Android devices.
Available in: Duo Access and Duo Beyond
Enabling screen lock with passcode on iOS or with PIN on Android secures devices by requiring input of a numeric code when turning on your device or unlocking the screen. If the screen is locked when a Duo Mobile push authentication request is received, then the screen must be unlocked before approving the authentication request.
Require your users to set a PIN or passcode on their devices by enabling the Don't allow authentication from devices without a screen lock option in the "Screen Lock" policy. With this option enabled, users must have screen lock enabled on their devices to approve Duo Push authentication requests or log in with a passcode generated by the Duo Mobile app. Users may still approve phone call login requests and use SMS passcodes texted to a device without screen lock. If you wanted to completely prevent authentications from phones without screen lock configured, you'd also need to disable the "Phone callback" and "SMS passcodes" options in the Authentication Methods policy setting.
This setting applies to all supported Android versions (2.2 and up). For iOS devices, this setting is only enforced on version 8 and higher. Devices running iOS 7 and lower can still authenticate without enabling screen lock. To ensure that Apple devices used to authenticate comply with the screen lock requirement, you may change the Operating Systems policy for iOS to "Block users if their version is below 8.0".
The default setting does not require screen lock enabled to approve a Duo authentication request received via push or use a Duo Mobile generated passcode.
Available in: Duo Access and Duo Beyond
Disk encryption protects device data from unauthorized access. Booting an encrypted device requires entering a passcode or PIN at device boot. Apple devices automatically encrypt the filesystem, but on Android devices encryption is enabled by the end user separately after enabling screen lock.
Prevent Duo authentication from Android devices without disk encryption by enabling the Don't allow authentication from devices without full-disk encryption option in the "Full-Disk Encryption" settings. Note that a PIN is required at startup in order for a device's status to show as encrypted.
The default setting does not require full-disk encryption to approve a Duo authentication request from an Android device. This setting has no effect on iOS.
Available in: Duo Access and Duo Beyond
Biometric identity verification, like Apple's Touch ID and Face ID or and Android Fingerprint, makes two-factor authentication even more secure.
In the policy editor, select the Require additional biometric verification option to require biometric approval for Duo Push from supported devices. Use of Duo Mobile generated or SMS passcodes remains unaffected, as well as authentication via phone call.
Fingerprint and Touch ID authentication requires Duo Mobile app versions 3.7 or above for iOS and version 3.10 or above for Android and minimum OS versions iOS 8 or Android 5.0 Lollipop. Face ID requires iOS 11 and Duo Mobile 3.19. Devices running earlier versions of Duo Mobile, iOS, and Android can not authenticate without biometric verification when you enable this policy setting.
Requiring biometric verification changes the Duo Push workflow. Users may no longer approve an authentication request from the app notification. Tapping the Duo notification opens the Duo Mobile app. After you tap "Approve" on the authentication request, scan your enrolled finger at the Touch ID or Android PIN prompt or perform Face ID verification to confirm the authentication approval. If you are unable to authenticate with a biometric factor you can fall back to your device's passcode.
The default setting does not require any biometric verification to approve a Duo Push authentication request from any device. All Duo Mobile, Android, and iOS versions may authenticate (subject to any other version restriction policy settings you may configure).
Please refer to the Duo Policy Guide for supplemental information about constructing effective custom policies and assigning them to your Duo applications and users.
Need some help? Try searching our Knowledge Base articles or Community discussions. For further assistance, contact Support.