Skip navigation
Documentation

Trusted Endpoints - LANDESK Certificate Deployment

Duo's Trusted Endpoints feature secures your sensitive applications by ensuring that only known devices can access Duo protected services. When a user authenticates via the Duo Prompt, we'll check for the presence of a Duo device certificate on that endpoint. You can monitor access to your applications from devices with and without the Duo certificate, and optionally block access from devices without the Duo certificate.

Before enabling the Trusted Endpoints policy on your applications, you'll need to deploy the Duo device certificate to your managed devices. This guide walks you through using LANDESK (also known as Ivanti Management Suite, powered by LANDESK) to distribute a certificate enrollment package to your managed devices.

Prerequisites

  • Access to the Duo Admin Panel as an administrator with the Owner, Administrator, or Application Manager administrative roles.
  • Access to the LANDESK console as an administrator with the rights to create new software distribution packages and scheduled tasks.

Create the LANDESK Management Suite Integration

  1. Log in to the Duo Admin Panel and navigate to Trusted Endpoints Configuration.
  2. If this is your first management integration, click the Configure Management Tools Integration button at the bottom of the page. If you're adding another management integration, click the Add Integration button you see instead.
  3. On the "Select Management Tools Integration" page, locate LANDESK Management Suite in the listed integrations and click the Select this integration link to the right.

The new LANDESK Management Suite integration is created in the "Off" state. You'll turn it on when you're ready to apply your Duo trusted endpoints policy.

Keep the Admin Panel open in your browser to complete the next step of creating a LANDESK distribution package.

Create the Duo Package

  1. In Duo Admin Panel browser window, open to the "LANDESK Management Suite" management tools integration, click the Batch Script and Executable File download links in the the "Download the Deployment Files" section of the page (step 1). The downloaded file names will be similar to duo_cert_enrollment.bat and duo_cert_enrollment-2.0.exe.

    LANDESK Package Files in Duo Admin Panel

    Once downloaded, copy the files to your LANDESK distribution files shared directory (accessible by your LANDESK clients using either the UNC share path or a URL).

  2. Launch the LANDESK Management Console and navigate to DistributionDistribution Packages.

  3. Click the New button and choose WindowsBatch File. The "Batch File properties" window opens.

  4. On the "Package information" screen of the batch file package editor, enter a descriptive name for the package, like "Duo Certificate Enrollment". Optionally, add a description for the package as well.

  5. While still on the "Package information" screen, set the "Primary file" to the batch script downloaded from the Duo Admin Panel in step 1. Enter the UNC path or URL for your LANDESK software distribution folder and click the arrow icon to switch to that directory. Click on duo_cert_enrollment.bat to select it as the primary file.

    LANDESK Package - Primary File

  6. Click on the Additional files configuration item in the left pane of the "Batch File properties" window.

  7. Locate additional files required for installation by entering the UNC path or URL for your LANDESK software distribution folder and click the arrow icon to switch to that directory. Select the downloaded Duo executable file from step 1 in the "Available files" list on the left, and then click the >> button to add the duo_cert_enrollment-x.x.exe file to the list on the right.

    LANDESK Package - Additional File

  8. Click the Accounts configuration on the left and change the account used to distribute the package from "LocalSystem" to Current user's account.

    LANDESK Package - Account

  9. Click the Save button to create the Duo batch file distribution package.

Create the Scheduled Task

  1. Right-click the Duo batch file distribution package you just created and go to Create scheduled task(s)....

  2. The LANDESK Management Console view switches to the Scheduled Tasks tab. Right click your newly created Duo scheduled task, and the select Properties.

  3. Click the Targets item on the left side of the "Schedule task" window. Add computer targets to the scheduled task with the Add button. The example scheduled task targets a device group.

    LANDESK Task Targets

  4. Click the Schedule task config item on the left and specify a start date and time for the task. This scheduled task should run again periodically on all target systems to ensure timely renewal of the client's Duo certificate. We recommend setting the task to repeat every Day. Change Schedule these devices to All as well, so the task gets rescheduled for devices that already ran it once successfully.

    LANDESK Task Schedule

Chrome Browser Configuration

Duo's LANDESK package configures Internet Explorer to automatically select the Duo device certificate when requested by the Duo authentication prompt. Google Chrome requires additional steps to make the same change. Without this, users are prompted to select the Duo device certificate when they authenticate. You can distribute the Chrome browser configuration via AD Group Policy to PC clients joined to a domain. Standalone clients must be configured with Microsoft's LGPO utility.

  1. Visit the "Local Group Policy Object Utility" page on Microsoft TechNet and download lgpo.zip using the link at the bottom of the page.

  2. Download the Chrome policy file from Duo. The downloaded file's name will be similar to chrome_cert_lgpo_policy-1.0.pol.

  3. Extract the LGPO.exe executable from the zip file downloaded in step 1 and copy it and the .pol file downloaded in step 2 to your LANDESK distribution files shared directory.

  4. Create a batch file for deployment that contains the following lines (replace the .pol and .exe file names in the example with your actual files's names):

    LGPO.exe /m chrome_cert_lgpo_policy-1.0.pol
    duo_cert_enrollment-2.0.exe /setchromeregistry
  5. Return to the LANDESK Management Console and create a new Batch File Distribution Package to distribute the local Chrome config. Select the batch file you created in step 4 as the Primary file on the "Package information" page.

    LANDESK Chrome Primary File

  6. Select the LGPO.exe executable, the enrollment executable downloaded from the Duo Admin Panel used to create the certificate package (duo_cert_enrollment-1.exe in this example), and the downloaded Chrome .pol file (chrome_cert_lgpo_policy-1.0.pol in this example) and add to the distribution package as "Additional files".

    LANDESK Chrome Additional Files

  7. Change the "Accounts" setting to use the LocalSystem account.

    LANDESK Chrome Account Settings

  8. Save the new distribution package. Once saved, right-click the new Chrome config batch file distribution package and pick Create scheduled task(s)....

  9. Right-click the newly created scheduled task for the Chrome package, and set the task's targets as you did earlier for the Duo certificate task.

  10. Schedule the task. Unlike the Duo Certificate scheduled task, the Chrome configuration only needs to run once on a computer, so set the "Schedule these devices" option to Devices that did not succeed. Save the scheduled task.

    LANDESK Chrome Task Schedule

Verify Your Setup

Monitor the status of your certificate deployment scheduled task from the LANDESK management console.

You can confirm that the package payload was successfully delivered to target workstations by checking for the Duo certificate.

  1. Open a command prompt window and type in this command:

    certmgr.msc
  2. Expand Certificates - Current User\Personal\Certificates. Look for the Duo Device Authentication certificate in the list.

    AD DS Certificate Verification

Confirm that the Duo Chrome policy is working by manually applying the Duo GPO settings on an endpoint.

  1. Log on to a domain-joined client PC as a member of the pilot group specified during the Duo Chrome Proxy group selection and in the Duo Chrome GPO scope.

  2. Open a command prompt window and type in this command:

    gpupdate /force
  3. After the policy update completes, type in this command:

    gpresult /v

    In the gpresult output, look for the your new Duo GPO in the "Applied Group Policy Objects" list.

    LANDESK Chrome GPO Verification

  4. If the Duo Chrome enrollment GPO was successfully applied, verify the Chrome registry changes from the GPO. In the same command prompt window where you ran gpresult, type in these commands to check for the new Chrome settings and also for the IE settings applied by the Duo LANDESK package.

    reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1"
    reg query HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\AutoSelectCertificateForUrls

    You should see the information highlighted in the image below.

    AD DS Registry Verification

Finish Trusted Endpoints Deployment

Once your managed computers start receiving the Duo certificate you can configure the Trusted Endpoints policy to start checking for the certificate as users authenticate to Duo-protected services and applications.

When your trusted endpoints policy is applied to your Duo applications, return to the LANDesk trusted endpoint management integration in the Admin Panel and turn it On with the Off/On setting at the top of the page.

The Device Insight and Endpoints pages in the Duo Admin Panel show which access devices have the Duo certificate present.

Next Steps

As more of your devices receive the Duo certificate you can adjust your trusted endpoints policy to expand the target group, apply it to additional protected services, or start blocking access to applications from devices that do not have the Duo certificate. See the Trusted Endpoints documentation for more information.

Removing the LANDESK Management Integration

Deleting a trusted endpoints management tool integration from the Duo Admin Panel immediately invalidates issued Duo device authentication certificates. Be sure to unassign your trusted endpoints policy from all applications or remove the "Trusted Endpoints" configuration item from your global policy before deleting an existing LANDESK integration from "Trusted Endpoints Configuration". You should also delete the Duo scheduled task from LANDESK.

Leaving the policy settings in place after deleting a management tools integration may inadvertently block user access to applications.

Troubleshooting

Need some help? Take a look at our Trusted Endpoints Knowledge Base articles or Community discussions. For further assistance, contact Support.

Ready to Get Started?

Sign Up Free