Skip navigation

Give Every User the Right Access

Different users have different needs when it comes to accessing applications. Duo has the flexibility to accommodate every use case, no matter how simple or complex.

New User Security Policy

Quickly and easily customize the authentication experience for your users with Duo’s options for group policies.

User-Friendly, Customized Authentication Methods

In addition to setting an authentication methods policy, you can customize your users’ authentication method experience through Duo Security’s administrative interface.

Users can quickly approve an authentication request by pressing a single button on their smartphones — Duo’s mobile app provides secure, out-of-band authentication.

Location-Specific Access Policies

With Duo, you can see where your users are authenticating from. By logging into Duo’s Admin Panel, you can see more data about their attempts, including:

  • User’s name
  • Time of attempt
  • Result (authentication success or failure)
  • Application type
  • 2FA method
  • IP address and location
  • Access device information

Use the authentication log data to investigate failed or suspicious login attempts, or to help you create geolocation-based policies.

Cover of Zero Trust Evaluation Guide: For the Workforce eBook

Zero Trust Evaluation Guide: For the Workforce

Not every zero-trust approach to securing the workforce is created equal - our guide will outline the requirements your solution should have to support a modern organization.

Get the Free Guide