Skip navigation
Documentation

Trusted Endpoints - MobileIron Core Managed Device Deployment

Duo's Trusted Endpoints feature secures your sensitive applications by ensuring that only known devices can access Duo protected services. When a user authenticates via the Duo Prompt, we'll check for the access device's management status. You can monitor access to your applications from managed and unmanaged devices, and optionally block access from devices not managed by your organization.

Before enabling the Trusted Endpoints policy on your applications, you'll need to deploy the Duo device certificate or REST API access for Duo to your managed mobile devices. This guide walks you through MobileIron Core configuration for Android and iOS mobile devices.

These instructions are for the on-premises MobileIron Core software, version 9.3 and up. If you are using MobileIron Cloud, see our instructions for the cloud MDM instead.

Prerequisites

  • Access to the Duo Admin Panel as an administrator with the Owner, Administrator, or Application Manager administrative roles.
  • Access to the MobileIron Core admin portal as an administrator with the rights to create roles, accounts, certificate authorities, and device profiles.

Create the MobileIron Core Integration

  1. Log in to the Duo Admin Panel and navigate to Trusted Endpoints Configuration.
  2. If this is your first management integration, click the Configure Management Tools Integration button at the bottom of the page. If you're adding another management integration, click the Add Integration button you see instead.
  3. On the "Select Management Tools Integration" page, locate MobileIron Core in the listed integrations and click the Select this integration link to the right.

The new MobileIron Core integration is created in the "Disabled" state. You'll turn it on when you're ready to apply your Duo trusted endpoints policy.

Keep the Duo Admin Panel open in your browser. You'll need to refer back to the MobileIron Core management integration page to complete the Android and/or iOS configuration steps.

Android Configuration

Duo determines trusted device status on Android devices by leveraging the installed Duo Mobile application on a given device to verify device information. To enable this verification you'll need to grant Duo read-only access to those devices via your MobileIron Core MDM's API access.

Create a Duo API Account

  1. Log on to the MobileIron Core admin portal as an administrator and navigate to Devices & UsersUsers.

  2. Click the Add button and choose Add Local User on the pop-up menu.

  3. Enter the following information on the "Add New User" form:

    User ID Enter the desired Duo account username.
    First Name and Last Name Enter a first and last name for the Duo API user (e.g. "Duo" "Admin").
    Password and Confirm Password Enter and confirm a strong password for the Duo admin user.
    Email Address Enter an email address for the Duo admin user.

    Click the Done button to create the Duo admin user.

    New Duo Admin

  4. Navigate to AdminAdmins. Select the Duo Admin user you just created, click the Actions button, and then click Assign to Space.

  5. Select a space from the drop-down list, and then check the box for the View device page, device details role under "Device Management". Click Save

    Assign Space Admin Role to Duo User

  6. Repeat steps 4 and 5 for all available spaces that contain managed devices.

Enter MobileIron Core Info in Duo

  1. Return to your MobileIron Core management integration page in the Duo Admin Panel.

  2. Enter the following information into the blank fields under step 2 of the MobileIron Core "Android Configuration Instructions" section:

    Email Address Enter the email address (which is also the username) of the Duo admin user you created in MobileIron Core.
    Password Enter the password for the Duo admin user you created in MobileIron Core.
    Domain Name Enter your organization's MobileIron Core domain name. For example, acmecorp.mobileiron.com.
  3. Click the Test Configuration button to verify Duo's API access to your MobileIron Core instance. You'll receive a "Configuration Succesful!" message if everything's correct. If the test fails, verify that you completed the MobileIron Core configuration steps and entered the right information in the Duo Admin Panel.

  4. After you successfully test your configuration, click the Save & Configure Android Devices button.

iOS Configuration

Duo verifies the trusted status of iOS devices by checking for the presence of a Duo device certificate. You'll use MobileIron Core to push the Duo CA information to your mobile devices so they can obtain a Duo certificate.

Add the Duo Certificate Authority

  1. In the MobileIron Core admin portal, navigate to Policies & ConfigsConfigurations.

  2. Go to Add NewCertificate EnrollmentSCEP.

    under the "Add an External Certificate Authority" option on the "Add Certificate Authority" page.

  3. Enter the Duo Certificate Authority (CA) information from step 2 of the iOS Configuration Instructions on the MobileIron Core management integration page in the Duo Admin Panel into the "New SCEP Certificate Enrollment Setting" form as follows:

    Name Enter a descriptive name, like "Duo CA".
    Description Enter optional descriptive information about the Duo CA.
    Device Certificate Retrieval Decentralized
    Certificate Type User Certificate
    URL Paste in the SCEP URL from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.
    Subject Paste in the Subject from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.
    Key Type RSA
    Key Length 2048
    CSR Signature Algorithm SHA256
    Challenge Type Microsoft SCEP
    Challenge URL Paste in the Challenge URLt from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.
    Username Paste in the Username from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.
    Password Paste in the Password from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.

    Click Issue Test Certificate after entering all the required information. If MobileIron is able to issue a Duo certificate successfully, click OK on the certificate page and then click Save to finish creating the Duo CA. If you receive a warning message about certificate caching, click Yes to proceed.

    Add Duo CA

Apply the Duo CA Configuration

  1. While still on the "Configurations" page, select the Duo CA you just created and click ActionsApply to Label.

  2. Select the device labels that include the iOS devices to which you want to issue Duo endpoint certificates.

  3. Click Apply after selecting your iOS device groups for configuration distribution to queue the update.

    Add Duo CA

Finish Trusted Endpoints Deployment

Once your MobileIron Core managed devices receive the Duo config you can set the Trusted Endpoints policy to start checking for managed device status as users authenticate to Duo-protected services and applications.

When your trusted endpoints policy is applied to your Duo applications, return to the MobileIron Core trusted endpoint management integration in the Admin Panel and enable it by clicking the Change link at the top of the page next to "Integration is disabled". You can choose to either activate this management integration for just members of a specified test group or groups, or activate for all users.

Enable Trusted Endpoints Management Integration

The Device Insight and Endpoints pages in the Duo Admin Panel show which access devices are trusted/managed.

Verify Your Setup

Users on Android devices see a prompt to "check your permissions" when authenticating to a protected resource via the Duo Prompt.

Android Trusted Endpoint Verification - Step 1

Duo uses the admin role access you granted in MobileIron Core to verify device information.

Android Trusted Endpoint Verification - Step 2

If Duo successfully verifies the device information using the MobileIron Core admin access then the user receives access to the protected application.

Android Trusted Endpoint Verification Failed

iOS users will see a prompt asking them to choose a certificate when authenticating to a protected resource via the Duo prompt. After selecting the Duo Device Authentication certificate and completing authentication, subsequent Duo authentications from the same device will automatically use that same certificate for verification.

Removing the MobileIron Core Management Integration

Deleting a trusted endpoints management tool integration from the Duo Admin Panel immediately invalidates issued Duo device authentication certificates. Be sure to unassign your trusted endpoints policy from all applications or remove the "Trusted Endpoints" configuration item from your global policy before deleting an existing MobileIron Core integration from "Trusted Endpoints Configuration". You should also disable your Duo admin user in MobileIron Core.

Leaving the policy settings in place after deleting a management tools integration may inadvertently block user access to applications.

Troubleshooting

Need some help? Take a look at our Trusted Endpoints Knowledge Base articles or Community discussions. For further assistance, contact Support.

Ready to Get Started?

Sign Up Free