Skip navigation

Remote Access Integrations

Duo's modern remote access protects every application, so your users can continue working with the tools they love.

Cloud Apps

Keep sensitive data confidential in the cloud by integrating Duo with popular web-based applications.

Duo allows you to enforce access controls for managed and unmanaged devices, and create policies based on device security health (out-of-date software) to restrict access to applications. With the peace of mind Duo provides, you can support Bring Your Own Device (BYOD) worry-free.

For fast and painless implementation, Duo provides out-of-the-box integrations with some of the most popular cloud applications, including Salesforce, Office 365, Google, Box, Dropbox, Slack, Docusign, etc. Administrators can easily secure access by integrating Duo with any SAML 2.0-enabled cloud application.

Web Apps

Protect access to your popular web applications for websites, blogs and team collaboration with Duo.

We verify the identities of your users with two-factor authentication (2FA) and check the security health of their devices before granting access to your web applications.

You can use Duo Security’s Web SDK to easily integrate with Drupal, Splunk, Confluence, Jira, Shibboleth and more. We offer client libraries for Python, Ruby, Classic ASP, Java and more.


Quickly configure security on your enterprise Microsoft environments – including RDP, OWA, and Office 365 – to spend more time on your business and supporting your users.


By securing your local SSH and remote UNIX logins with Duo, you can keep production, test and development environments secure against remote attacks on your production systems and other critical networks.

We verify the identities of your users with two-factor authentication (2FA) and check the security health of their devices before granting them access to your production environment.

Duo’s UNIX integration is open source and can be easily installed on all major UNIX distributions, including Linux (Red Hat Enterprise Linux, CentOS, Debian and Ubuntu), BSD (FreeBSD, NetBSD, OpenBSD), Solaris and AIX.

Duo + Epic

Duo’s two-factor authentication (2FA) solution lets you identify users when they make a login request, then checks the security health of their device before granting access. You can also detect personal, employee-owned devices with Duo's Trusted Endpoints, ensuring secure access to your EHR systems and enabling you to support BYOD.

Custom Applications

With just a few lines of code, you can easily protect existing login pages with our extensive Duo Web libraries in everything from Java to Go. Duo delivers an iframe that allows users to enroll, authenticate and manage their own phones.

For two-factor authentication, admins can easily enroll users devices, activate Duo Mobile, enable multiple authentication methods, or use Trusted Devices and Networks to allow for faster login from the same browser.

Management of two-factor authentication is easy, too — admins can let their users manage their own devices with the Self-Service Portal, or use the Duo Admin API to get logs, make changes and more.

Admin, Auth and REST APIs

Duo offers web services accessible via REST APIs, allowing you to customize the two-factor authentication (2FA) user interface for your mobile, web or desktop app. View the Duo REST API client libraries and sample source code for Python, Ruby, Node, Java, C, C# and Perl on GitHub.

Use the Auth API to enroll Duo Mobile devices, list devices associated with a user and authenticate any device. With Duo’s Admin API, you can enroll any device, list the devices associated with a user, add/remove/modify devices, and get logs, bypass codes and more.


If you are already using a federation server or cloud identity provider (IdP), you can easily integrate with Duo so that it automatically secures any application that is connected to it.

Duo’s multi-factor authentication (MFA) solution allows administrators to easily integrate with federation services like Active Directory Federation Services (ADFS) and other cloud IdPs such as OneLogin, Centrify, Okta, Ping, OpenLDAP, Google OIDC, Azure OIDC and SAML IdPs to protect cloud applications.

Cover of The Essential Guide to Securing Remote Access eBook

The Essential Guide to Securing Remote Access

With the convenience of remote access, users are vulnerable to threats like phishing, brute-force attacks and password-stealing malware. Download our guide to learn how to secure remote access, mitigate these attacks and avoid an expensive data...

Get the Free Guide