Duo's Trusted Endpoints feature secures your sensitive applications by ensuring that only known devices can access Duo protected services. When a user authenticates via the Duo Prompt, we'll check for the access device's management status. You can monitor access to your applications from managed and unmanaged devices, and optionally block access from devices not managed by your organization.
Duo's Trusted Endpoints feature is part of the Duo Beyond plan.
Before enabling the Trusted Endpoints policy on your applications, you'll need to deploy the Duo device certificate or REST API access for Duo to your managed mobile devices. This guide walks you through MobileIron Core configuration for Android and iOS mobile devices.
These instructions are for the on-premises MobileIron Core software, version 9.3 and up. If you are using MobileIron Cloud, see our instructions for the cloud MDM instead.
The new MobileIron Core integration is created in the "Disabled" state. You'll turn it on when you're ready to apply your Duo trusted endpoints policy.
Keep the Duo Admin Panel open in your browser. You'll need to refer back to the MobileIron Core management integration page to complete the Android and/or iOS configuration steps.
Duo determines trusted device status on Android devices by leveraging the installed and activated Duo Mobile application on a given device to verify device information. To enable this verification you'll need to grant Duo read-only access to those devices via your MobileIron Core MDM's API access.
You must have already configured Android for Work in MobileIron Core.
Log on to the MobileIron Core admin portal as an administrator and navigate to Apps → App Catalog.
Click Add+ and then click Google Play.
Enter Duo Mobile and click Search. Click on the Duo Mobile row to select it, and then click Next.
Edit the Duo Mobile app description and categories if you wish. Click Next.
Enable the Install this app for Android for Work and By distributing this app you will accept the following permissions on behalf of users options for Duo Mobile.
Scroll down to "Configuration Choices". In the "Default Configuration for Duo Mobile" section, locate the "Trusted Endpoint Identifier" field and enter $DEVICE_UUID$ as the value.
Return to your MobileIron Core management integration page in the Duo Admin Panel.
Copy the "Trusted Endpoints Configuration Key" value from the Android Configuration Instructions tab of your MobileIron Core management integration (it will look similar to DPK0W0KLPJLOGSKHTDD). Paste this in MobileIron as the Trusted Endpoints Configuration Key value.
Click Finish to return to the App Catalog.
Select the Duo Mobile app. Click Actions → Apply to Labels. Select the labels that represent the user populations who will receive the Duo Mobile app.
While still logged in to the MobileIron Core admin portal as an administrator, navigate to Devices & Users → Users.
Click the Add button and choose Add Local User on the pop-up menu.
Enter the following information on the "Add New User" form:
|User ID||Enter the desired Duo account username.|
|First Name and Last Name||Enter a first and last name for the Duo API user (e.g. "Duo" "Admin").|
|Password and Confirm Password||Enter and confirm a strong password for the Duo admin user.|
|Email Address||Enter an email address for the Duo admin user.|
Click the Done button to create the Duo admin user.
Navigate to Admin → Admins. Select the Duo Admin user you just created, click the Actions button, and then click Assign to Space.
Select a space from the drop-down list, and then check the box for the View device page, device details role under "Device Management". Click Save
Repeat steps 4 and 5 for all available spaces that contain managed devices.
Return to your MobileIron Core management integration page in the Duo Admin Panel.
Enter the following information into the blank fields under step 2 of the MobileIron Core "Android Configuration Instructions" section:
|Email Address||Enter the email address (which is also the username) of the Duo admin user you created in MobileIron Core.|
|Password||Enter the password for the Duo admin user you created in MobileIron Core.|
|Domain Name||Enter your organization's MobileIron Core domain name. For example, acmecorp.mobileiron.com.|
Click the Test Configuration button to verify Duo's API access to your MobileIron Core instance. You'll receive a "Configuration Succesful!" message if everything's correct. If the test fails, verify that you completed the MobileIron Core configuration steps and entered the right information in the Duo Admin Panel.
After you successfully test your configuration, click the Save & Configure Android Devices button.
Duo verifies the trusted status of iOS devices by checking for the presence of a Duo device certificate. You'll use MobileIron Core to push the Duo CA information to your mobile devices so they can obtain a Duo certificate.
In the MobileIron Core admin portal, navigate to Policies & Configs → Configurations.
Go to Add New → Certificate Enrollment → SCEP.
under the "Add an External Certificate Authority" option on the "Add Certificate Authority" page.
Enter the Duo Certificate Authority (CA) information from step 2 of the iOS Configuration Instructions on the MobileIron Core management integration page in the Duo Admin Panel into the "New SCEP Certificate Enrollment Setting" form as follows:
|Name||Enter a descriptive name, like "Duo CA".|
|Description||Enter optional descriptive information about the Duo CA.|
|Device Certificate Retrieval||Decentralized|
|Certificate Type||User Certificate|
|URL||Paste in the SCEP URL from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.|
|Subject||Paste in the Subject from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.|
|CSR Signature Algorithm||SHA256|
|Challenge Type||Microsoft SCEP|
|Challenge URL||Paste in the Challenge URLt from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.|
|Username||Paste in the Username from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.|
|Password||Paste in the Password from the "Add an External Certificate Authority (CA)" section of the iOS instructions on the MobileIron Core management integration page in the Duo Admin Panel.|
Click Issue Test Certificate after entering all the required information. If MobileIron is able to issue a Duo certificate successfully, click OK on the certificate page and then click Save to finish creating the Duo CA. If you receive a warning message about certificate caching, click Yes to proceed.
While still on the "Configurations" page, select the Duo CA you just created and click Actions → Apply to Label.
Select the device labels that include the iOS devices to which you want to issue Duo endpoint certificates.
Click Apply after selecting your iOS device groups for configuration distribution to queue the update.
Once your MobileIron Core managed devices receive the Duo config you can set the Trusted Endpoints policy to start checking for managed device status as users authenticate to Duo-protected services and applications.
When your trusted endpoints policy is applied to your Duo applications, return to the MobileIron Core trusted endpoint management integration in the Admin Panel and enable it by clicking the Change link at the top of the page next to "Integration is disabled". You can choose to either activate this management integration for just members of a specified test group or groups, or activate for all users.
Users on Android devices see a device trust dialog when authenticating to a protected resource via the Duo Prompt.
Duo uses the API access you granted in MobileIron to perform a permissions check to verify device information.
If Duo successfully verifies the device information using the MobileIron API access, and the user has Duo Mobile activated for Duo Push, then the user receives a login request on their phone. Approving the request grants access to the protected application. The "Second Factor" logged for these approvals is shown as "Duo Mobile Inline Auth" in the Duo authentication log.
If the user does not have Duo Mobile activated for push, or does not approve the Duo request before it times out, the user returns to the Duo Prompt, where they may select from the available factors to complete 2FA.
iOS users will see a prompt asking them to choose a certificate when authenticating to a protected resource via the Duo prompt. After selecting the Duo Device Authentication certificate and completing authentication, subsequent Duo authentications from the same device will automatically use that same certificate for verification.
Deleting a trusted endpoints management tool integration from the Duo Admin Panel immediately invalidates issued Duo device authentication certificates. Be sure to unassign your trusted endpoints policy from all applications or remove the "Trusted Endpoints" configuration item from your global policy before deleting an existing MobileIron Core integration from "Trusted Endpoints Configuration". You should also disable your Duo admin user in MobileIron Core.
Leaving the policy settings in place after deleting a management tools integration may inadvertently block user access to applications.