An application binds Duo's two-factor authentication system to one or more of your services or platforms, such as a local network, VPN (virtual private network), CMS (content management system), email system, or hardware device. You can protect as many applications as you need, and administer each independently.
Before you can protect your applications with Duo, you'll first need to sign up for a Duo account, which offers a free 30 day trial of our Access plan, and set up your Duo administrator account. See Getting Started for an overview of the entire Duo deployment process.
Role required: Owner, Administrator, or Application Manager.
Log into the Duo Admin Panel. To add a new application click Applications in the left sidebar, then click the Protect an Application button or the Protect an Application submenu item in the left sidebar. Alternatively, you can click the Add New... button in the top right of the Dashboard page and then click Application.
The "Protect an Application" page lists the different types of services you can protect with Duo. The Protection Type column indicates how Duo protects that specific application.
You can scroll down the page to browse all available applications, or start typing the name of your product in the space provided to filter the applications list. For example, type "ci" to view Cisco solutions.
Click the Documentation for an application to review the requirements and configuration steps for integrating Duo into your service before adding the new application. If you don't see a "Documentation" link that means it's a partner application for which Duo doesn't host configuration instructions. You'll see a link for more information later one you create the application.
If you don't see your specific product, use this table as a guide in selecting an appropriate application:
|To protect…||Choose this application…|
|Local and remote (ssh) logins on Unix systems||UNIX Application|
|SSL or IPSec VPN Logins||Check for your specific brand of VPN|
|Other VPNs and remote access solutions that support RADIUS authentication||RADIUS|
|Microsoft services like RDP or OWA||Look for your named application|
|Any device or system that supports authentication via LDAP||LDAP Proxy|
|Your own web applications||WebSDK (requires some programming proficiency)|
|SAML 2.0 service providers||Check for your specific service provider or Generic Service Provider|
If you're coding your own two-factor authentication using Duo's Auth API choose the Auth API application. The Accounts API and Admin API applications are available to Duo Beyond, Duo Access, and Duo MFA plan customers. Please contact us to request access to these APIs.
When you've located the application you want to protect with Duo, click the Protect button to the right of the application's name. Your new application is added with a default name (like "Cisco SSL VPN").
If an application using the default name already exists, a number is appended to the new application's name to make it unique (e.g. "Cisco SSL VPN 1", "Cisco SSL VPN 2", etc.). Users see this application name each time they authenticate using Duo Push. You can change the application's name any time after creation from the "General" settings section of your application's properties page.
You'll be taken directly to the new application's properties page after creation. Here you can update the application's name and apply other settings like enabling the self-service portal or configuring hostname whitelisting (find all settings described below in Application Options), or set policies for that application.
The "Details" section near the top of the page shows your Integration key (ikey), Secret key (skey), and API hostname:
The integration key and secret key uniquely identify a specific application to Duo. The API hostname is unique to your account, but shared by all of your applications. You'll need these keys and hostname when configuring your system to work with Duo. You may also need them if you contact Duo Support.
The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances!
The next step after adding an application is to configure your appliance, device, application, service, or system to work with Duo. You'll find a link to the appropriate documentation in the highlighted "Setup Instructions" section at the top of each application's properties page.
You can also begin enrolling users now. Read Enrolling Users for details.
Duo administrator accounts are only used to log on to the Admin Panel. They can't be used to access devices or applications using Duo two-factor authentication. Be sure to also enroll your Duo admins as users if they need to log on as end users of the application you just created.
Role required: Owner, Administrator, or Application Manager.
A number of additional settings can be configured from an application’s properties page. Click the Save Changes button at the bottom of the page after updating any of these settings.
When the Universal Prompt becomes available, migration will be a two-step process:
As we add support for the Universal Prompt to applications, you'll see a new section on the details page of the application indicating your progress towards the Universal Prompt for that application.
Click the See Update Progress link to view the Universal Prompt Update Progress report. This report shows the update availability and migration progress for all your Duo applications that will have Universal Prompt support.
Most applications will require a Duo software update on your web application server. The application's Universal Prompt details will indicate availability of an application software update, with a link to the update guide where you can find the next steps.
After you complete the application update, the status changes to reflect that the application now supports the Universal Prompt. We've already updated the Duo Azure CA application to support the Universal Prompt when it's ready, so the "Universal Prompt" informational section reflects this status today.
When the Universal Prompt end-user experience becomes available, you'll be able to activate it for a single Duo application from this area of the application's page. Until then, the "Activate Universal Prompt" control shall remain hidden.
Watch the Duo Blog for future updates about the Duo Universal Prompt.
Policy settings are only visible to Duo Beyond, Duo Access, and Duo MFA plan customers. Duo Beyond and Duo Access customers can create and assign application and group policies that control device security, allowed authenticators, and more.
Duo MFA customers may create a policy for an individual application that affects all users of that application, or use the Global Policy to manage settings for all applications.
See the Policy & Control documentation for more information about available policy restrictions and instructions for managing application policies.
The application "Type" shows what kind of Duo application you created. This field is read-only.
Users see the application's "Name" each time they authenticate using Duo Push. To update, type in a new name and click the Save Changes button at the bottom of the page when done.
Duo's self-service portal lets users add, update, and remove authentication devices. The self-service portal is an option for web-based and some SSL VPN applications that feature inline enrollment and authentication prompt. See the self-service portal documentation and Managing Your Devices in the Duo end user guide.
To enable this feature, check the Let users manage their devices box. Click the Save Changes button at the bottom of the page when done.
An application's "New user policy" can be one of the following:
The new user policy settings are especially important during a staged rollout or controlled deployment of Duo. You can initially enroll just a subset of your user base and set the policy to allow access, which will require two-factor authentication for just the enrolled testers while the rest of your users continue to log on normally. See our Deploying a Proof of Concept guide for more information.
To change the new user policy, click the radio button next to the desired setting. Click the Save Changes button at the bottom of the page when done.
If you're on Duo's Duo MFA, Duo Access, or Duo Beyond plans, use the policy editor to change the "New User Policy" setting globally, for specific applications, or for groups of users. See the Policy & Control documentation for more information.
When the "Remembered Devices" option is set, users are not challenged for Duo two-factor for the specified number of days after authenticating on that device. See the Using Remembered Devices & Authorized Networks Controls documentation for more information about configuring options for devices.
To enable this feature, click the check box next to Allow users to remember their device for _ days and enter the desired number of days or hours — up to 365 days — in the space provided (the default is 30 days). Click the Save Changes button at the bottom of the page when done.
If you're on Duo's Duo MFA, Duo Access, or Duo Beyond plans, use the policy editor to change the "Remembered Devices" policy setting globally, for specific applications, or for groups of users. See the Policy & Control documentation for more information.
When the "Authorized networks" option is configured, users are only challenged for two-factor authentication when accessing the application from outside the listed IP addresses, IP ranges, or CIDR networks. Refer to the Using Remembered Devices & Authorized Networks Controls documentation for additional details about authorized networks.
To configure this feature, check the Don't require two-factor authentication for logins from the following IPs: box and enter your network information in the space provided. You can choose whether unenrolled users accessing the application from an authorized network are required to complete Duo enrollment by checking the box next to Enroll new users logging in from authorized networks. Click the Save Changes button at the bottom of the page when done.
If you're on Duo's Duo MFA, Duo Access, or Duo Beyond plans, use the policy editor to change the "Authorized Networks" policy setting globally, for specific applications, or for groups of users. See the Policy & Control documentation for more information.
The "Username normalization" option controls whether or not usernames entered for primary authentication should be altered before trying to match them to a Duo user account. With normalization off, the usernames "jsmith," "DOMAIN\jsmith," and "firstname.lastname@example.org" would be three separate users in Duo. When username normalization is enabled any domain information is stripped from the username, so "jsmith," "DOMAIN\jsmith," and "email@example.com" would all resolve to a single "jsmith" Duo user.
To turn on username normalization, click the radio button next to Simple.
The "Voice greeting" is read to users who select a phone call for authentication at the beginning of the verification call before the Duo instructions. You may customize the greeting as you wish.
Enter any additional information about your application in the "Notes" field. The notes are only visible to administrators.
With "Permitted Groups" Duo groups can be used to restrict active Duo user access to applications. See the Using Groups documentation for more information and detailed instructions.
To configure this setting, check the Only allow authentication from users in certain groups box and then click in the "Select groups" field to bring up a list of groups. Click on a group name to select it. You may also narrow down the group search results by typing a group name in the box. Click the Save Changes button at the bottom of the page when done. You can select up to 100 permitted groups.
If you're using Administrative Units to delegate management of users and applications to certain admins, you can assign the unit that will administer this application. Restricted administrators who aren't assigned to that same administrative unit won't be able to view or manage this application after saving the assignment here.
This optional setting ensures only "approved" application hostnames may show users the Duo Prompt. This prevents displaying the Duo Prompt for this application on a web page you do not control, minimizing the risk of having your users tricked into authenticating on fraudulent web sites. When you limit which sites may send authentication traffic to Duo (using the referer information you enter) you ensure that your users authenticate only from known sites.
While optional, Duo recommends enabling hostname whitelisting before onboarding your end-users, especially if you plan to allow use of U2F and WebAuthn authentication methods.
Check the box next to Only allow access for approved application hostnames to enable this setting and specify additional options.
In the Approved application hostnames entry field, enter the fully-qualified hostnames, IP addresses, or domain wildcard entries that represent the referring web sites your services or systems that you'll use with this Duo application. These entries should be listed one per line. You can append an information comment on each line with a comma, followed by your descriptive text.
Under Hostname missing, determine what you want to happen if no HTTP referer is sent by the user's browser or application that matches the approved IP addresses or hostnames you entered above. Choose Deny access (recommended) to prevent the user from completing Duo authentication to access the application, or Allow the user to authenticate to allow the user to access the application without a matching referer value.
If a user tries to log into an application configured to use a Duo application that has the whitelisting feature enabled and restricted to known referring sites and also has Deny access (recommended) selected, and the referer used does not match the configured hostname, then Duo blocks the user's authentication attempt, lets the user know that the request came from an unauthorized domain, and presents the referring URL information from the request to they can report to your IT or Corporate Security service desk.
WARNING: Removing an application may prevent user logins!
Be sure to remove Duo authentication from your product's configuration before you remove the corresponding application from the Duo Admin Panel.
To remove an application from Duo, view the application's configuration page in the Duo Admin Panel and click the Remove Application button at the top right.
Confirm that you want to remove the application.
The application is removed from Duo.