Duo's Trusted Endpoints feature secures your sensitive applications by ensuring that only known devices can access Duo protected services. When a user authenticates via the Duo Prompt, we'll check for the access device's management status. You can monitor access to your applications from managed and unmanaged devices, and optionally block access from devices not managed by your organization.
Duo's Trusted Endpoints feature is part of the Duo Beyond plan.
Before enabling the Trusted Endpoints policy on your applications, you'll need to deploy the Duo device certificate or REST API access for Duo to your managed mobile devices. This guide walks you through MobileIron Cloud configuration for Android and iOS mobile devices.
These instructions are for the cloud-hosted MobileIron Cloud service. If you are using MobileIron Core, see our instructions for the on-premises MDM instead.
The new MobileIron Cloud integration is created in the "Disabled" state. You'll turn it on when you're ready to apply your Duo trusted endpoints policy.
Keep the Duo Admin Panel open in your browser. You'll need to refer back to the MobileIron Cloud management integration page to complete the Android and/or iOS configuration steps.
Duo determines trusted device status on Android devices using Duo Mobile installed and activated for Duo Push on a given device to verify device information. To enable this verification you'll need to grant Duo read-only access to those devices via your MobileIron Cloud MDM's API access.
You must have already configured <a href="http://mi.extendedhelp.mobileiron.com/53/all/en/desktop/Android_enterprise.htm" alt=MobileIron Android Documentation" target="_blank" rel="noopener noreferrer">Android Enterprise and Work Profiles in MobileIron Cloud.
Log on to the MobileIron Cloud admin portal as an administrator and click the Apps item at the top of the page.
Click the Add button.
The default app catalog source may be set to the "iOS Store". Click the store drop-down list next to the search box and select the Google Play store from the list.
Once you've switched to the Google Play store, search for Duo Mobile, and then click on the Duo Mobile app shown in the search results.
Click the APPROVE button. You'll be shown the permissions needed by Duo Mobile. Click APPROVE again to accept these permissions.
Leave the "Approval Setting" for Duo Mobile set to the default option: "Keep approved when app requests new permissions." Click SAVE.
You'll be returned to the Duo Mobile application view, but now the app is "APPROVED". Click the Select button.
Make any desired app category selections or enter an optional description, and then click Next.
Since you already configured Android For Work (per the prerequisites), skip any further App Delegation and click Next.
Choose the user groups or individuals to whom you want to distribute Duo Mobile. Click Next.
Click the plus sign button to the right of Managed Configurations for Android to create a new configuration.
Give the configuration a unique name, such as "Duo Mobile Trusted Endpoint Config".
In the "Managed Configurations" section, locate the "Trusted Endpoint Identifier" field and enter ${deviceClientDeviceIdentifier} as the value.
Return to your MobileIron Cloud management integration page in the Duo Admin Panel.
Copy the "Trusted Endpoints Configuration Key" value from the Android Configuration Instructions tab of your MobileIron Cloud management integration (it will look similar to DPK0W0KLPJLOGSKHTDD). Paste this in MobileIron as the Trusted Endpoints Configuration Key value.
Click Next and then click Done.
While still logged into MobileIron as an administrator, navigate to the Users page.
Click the Add button and choose API User on the pop-up menu.
Enter the following information on the "Basic" tab form:
Username | Enter the desired Duo account username. |
First Name and Last Name | Enter a first and last name for the Duo API user (e.g. "Duo" "Admin"). |
Email Address | This will be automatically populated with the MobileIron username email address. |
Password and Confirm Password | Enter and confirm a strong password for the Duo admin user. |
Click the Done button to create the Duo API user.
Select the Duo API Admin user you just created by checking the box to the left of the username in the list of users. Click the Actions button and then click Append Roles.
Check the boxes for the User Roles System Read Only (which also automatically includes "User Read Only") and Device Read Only. Click Next.
Select all available spaces and partitions for the "Device Read Only" role and then click Next.
Confirm your role and space selections and then click Done to assign the role privileges to the Duo API user.
Return to your MobileIron Cloud management integration page in the Duo Admin Panel.
Enter the following information into the blank fields under step 2 of the MobileIron Cloud "Android Configuration Instructions" section:
Email Address | Enter the email address (which is also the username) of the Duo API user you created in MobileIron Cloud. |
Password | Enter the password for the Duo API user you created in MobileIron Cloud. |
Domain Name | Enter your organization's MobileIron Cloud domain. For example, acmecorp.mobileiron.com. |
Click the Test Configuration button to verify Duo's API access to your MobileIron Cloud instance. You'll receive a "Configuration Succesful!" message if everything's correct. If the test fails, verify that you completed the MobileIron Cloud configuration steps and entered the right information in the Duo Admin Panel.
After you successfully test your configuration, click the Save & Configure Android Devices button.
Duo verifies the trusted status of iOS devices by checking for the presence of a Duo device certificate. You'll use MobileIron Cloud to push the Duo CA information to your mobile devices so they can obtain a Duo certificate.
Log on to the MobileIron Cloud admin portal as an administrator and navigate to Admin → Connectors. Click Download the Connector to obtain the Cloud Connector installation ISO.
Deploy the MobileIron Cloud Connector in your on-premises VMWare environment, following the setup instructions in the Connector Installation Guide.
Ensure that your Connector successfully registered with your MobileIron Cloud tenant and has green online status on the Connectors page in the MobileIron admin portal before continuing on with the Duo CA configuration.
In the MobileIron Cloud admin portal, navigate to Admin → Certificate Authority and click the Add button.
Click the Continue button under the "Add an External Certificate Authority" option on the "Add Certificate Authority" page.
Enter the Duo Certificate Authority (CA) information from step 2 of the iOS Configuration Instructions on the MobileIron Cloud management integration page in the Duo Admin Panel as follows:
Name | Enter a descriptive name, like "Duo CA". |
Certificate Authority Type | Microsoft |
SCEP URL | Paste in the SCEP URL from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Cloud management integration page in the Duo Admin Panel. |
Username | Paste in the Username from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Cloud management integration page in the Duo Admin Panel. |
Password | Paste in the Password from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Cloud management integration page in the Duo Admin Panel. |
Challenge URL | Paste in the Challenge URL from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Cloud management integration page in the Duo Admin Panel. |
Click Save after entering all the required information to move to the next steps of adding an identity certificate configuration.
Go to the Configurations page using the top navigation. With the Default Partition selected in the far left drop-down menu, click the Add button.
Locate the Identity Certificate configuration type and click it to begin adding the new Duo configuration.
Enter the Identity Certificate configuration information from the MobileIron Cloud management integration page in the Duo Admin Panel as follows:
Name | Enter a descriptive name, like "Duo Trusted Endpoints". |
Description | Enter additional information about this new configuration, if desired. |
Certificate Distribution | Dynamically Generated. |
Source | Select the Duo CA you added earlier. |
Signature Algorithm | SHA256 with RSA |
Subject | Paste in the Subject from the "Add a Configuration" section of the iOS instructions on the MobileIron Cloud management integration page in the Duo Admin Panel. |
Key Size | 2048 |
Use as digital signature | Check the box next to this option. |
Click Test Configuration and Continue after entering all the required information.
If the Duo CA and the configuration information is correct then you'll see the "Configuration test successful" page, which also shows you your Duo certificate information. Click Next to continue.
If the configuration test fails, double-check that the information entered for the Duo CA was correct, and that your Connector registered successfully and has "On" status in the MobileIron admin portal.
On the last page of the "Create Identity Certificate Configuration" setup you can choose which devices receive the new Duo configuration. Enable the configuration by checking the Enable this configuration box, and then click the Custom option to select the device group that contains your managed iOS devices.
Click Done after selecting your iOS device groups for configuration distribution.
Repeat steps 2 through 7 again for each additional partition in the drop-down list on the "Configurations" page.
Once your MobileIron Cloud managed devices receive the Duo config you can set the Trusted Endpoints policy to start checking for managed device status as users authenticate to Duo-protected services and applications.
When your trusted endpoints policy is applied to your Duo applications, return to the MobileIron Cloud trusted endpoint management integration in the Admin Panel and enable it by clicking the Change link at the top of the page next to "Integration is disabled". You can choose to either activate this management integration for just members of a specified test group or groups, or activate for all users.
The Device Insight and Endpoints pages in the Duo Admin Panel show which access devices are trusted/managed.
Users on Android devices see a device trust dialog when authenticating to a protected resource via the Duo Prompt.
Duo uses the API access you granted in MobileIron to perform a permissions check to verify device information.
If Duo successfully verifies the device information using the MobileIron API access, and the user has Duo Mobile activated for Duo Push, then the user receives a login request on their phone. Approving the request grants access to the protected application. The "Second Factor" logged for these approvals is shown as "Duo Mobile Inline Auth" in the Duo authentication log.
If the user does not have Duo Mobile activated for push, or does not approve the Duo request before it times out, the user returns to the Duo Prompt, where they may select from the available factors to complete 2FA.
iOS users will see a prompt asking them to choose a certificate when authenticating to a protected resource via the Duo prompt. After selecting the Duo Device Authentication certificate and completing authentication, subsequent Duo authentications from the same device will automatically use that same certificate for verification.
Deleting a trusted endpoints management tool integration from the Duo Admin Panel immediately invalidates issued Duo device authentication certificates. Be sure to unassign your trusted endpoints policy from all applications or remove the "Trusted Endpoints" configuration item from your global policy before deleting an existing MobileIron Cloud integration from "Trusted Endpoints Configuration". You should also disable your Duo admin user in MobileIron Cloud.
Leaving the policy settings in place after deleting a management tools integration may inadvertently block user access to applications.
Need some help? Take a look at our Trusted Endpoints Knowledge Base articles or Community discussions. For further assistance, contact Support.