Different users have different needs when it comes to accessing applications. Duo has the flexibility to accommodate every use case, no matter how simple or complex.
Require that new users are prompted to enroll for two-factor authentication
Restrict the types of authentication methods they use during enrollment
Or give them access without two-factor authentication
Or deny access if they aren’t enrolled yet
Quickly and easily customize the authentication experience for your users with Duo’s options for group policies.
In addition to setting an authentication methods policy, you can customize your users’ authentication method experience through Duo Security’s administrative interface.
With Duo, you can see where your users are authenticating from. By logging into Duo’s Admin Panel, you can see more data about their attempts, including:
Time of attempt
Result (authentication success or failure)
IP address and location
Access device information
Use the authentication log data to investigate failed or suspicious login attempts, or to help you create geolocation-based policies.
Duo Trust Monitor ingests user behavior and access patterns to create a baseline. When user access deviates sharply from the baseline, Duo will highlight risky access attempts. These events can be leveraged to inform new user policy. For example, you can ensure a user group must use a Duo Push when accessing a sensitive application.
In this white paper, Duo Security experts discuss the passwordless future and the path toward passwordless authentication for all users. Download now!