Global Trend Radar
Web: duo.com US web_search 2026-05-07 10:21

OneLogin向けDuo二要素認証 | Cisco Duo

原題: Duo Two-Factor Authentication for OneLogin | Cisco Duo

元記事を開く →

分析結果

カテゴリ
AI
重要度
60
トレンドスコア
24
要約
DuoとOneLoginは、二要素認証の導入に関して提携しました。このシステムは、ユーザーのアカウントを保護するために、追加の認証手段を提供します。これにより、セキュリティが強化され、ユーザーはより安全にサービスを利用できるようになります。
キーワード
Duo Two-Factor Authentication for OneLogin | Cisco Duo Skip navigation Search Support Admin Login Duo Two-Factor Authentication for OneLogin Last updated: April 30th, 2026 Duo and OneLogin have partnered on a two-factor authentication solution, offering inline user enrollment , self-service device management , and support for a variety of authentication methods — such as passkeys and security keys, Duo Push, or Verified Duo Push — in the Duo Universal Prompt . Duo and OneLogin Duo Security’s authentication platform secures access to OneLogin, extending two-factor protection to web applications launched from a OneLogin browser session. Connectivity Requirements This application communicates with Duo's service on SSL TCP port 443. Firewall configurations that restrict outbound access to Duo's service with rules using destination IP addresses or IP address ranges aren't recommended, since these may change over time to maintain our service's high availability. If your organization requires IP-based rules, please review Duo Knowledge Base article 1337 . Effective June 30, 2023, Duo no longer supports TLS 1.0 or 1.1 connections or insecure TLS/SSL cipher suites. See Duo Knowledge Base article 7546 for additional guidance. First Steps Sign up for a Duo account . Log in to the Duo Admin Panel and navigate to Applications → Application Catalog . Locate the entry for OneLogin with the "2FA" label in the catalog. Click the + Add button to create the application, and get your Client ID , Client secret , and API hostname . You'll need this information to complete your setup. See Protecting Applications for more information about protecting applications with Duo and additional application options. Previously, the Client ID was called the "Integration key" and the Client secret was called the "Secret key". Treat your secret key like a password The security of your Duo application is tied to the security of your secret key (skey). Secure it as you would any sensitive credential. Don't share it with unauthorized individuals or email it to anyone under any circumstances! No active Duo users can log in to new applications until you grant access. Update the User access setting to grant access to this application to users in selected Duo groups, or to all users. Learn more about user access to applications . If you do not change this setting now, be sure to update it so that your test user has access before you test your setup. This setting only applies to users who exist in Duo with "Active" status. This does not affect application access for existing users with "Bypass" status, existing users for whom the effective Authentication Policy for the application specifies "Bypass 2FA" or "Skip MFA", or users who do not exist in Duo when the effective New User Policy for the application allows access to users unknown to Duo without MFA. Configure Allowed Hostnames If you plan to permit use of WebAuthn authentication methods (security keys, U2F tokens, or Touch ID) in the traditional Duo Prompt, Duo recommends configuring allowed hostnames for this application and any others that show the inline Duo Prompt before onboarding your end-users. The Duo Universal Prompt has built-in protection from unauthorized domains so this setting does not apply. Duo Universal Prompt The Duo Universal Prompt provides a simplified and accessible Duo login experience for web-based applications, offering a redesigned visual interface with security and usability enhancements. Universal Prompt Traditional Prompt OneLogin has already updated their hosted Duo OneLogin application to support the Universal Prompt, so there's no installation effort required on your part to update the application itself. If you're setting up Duo with OneLogin for the first time you the Universal Prompt experience is already activated in the Duo Admin Panel. If you already use Duo with OneLogin you need to make a configuration change in OneLogin, and then log in with Duo 2FA again so that Duo makes the Universal Prompt activation setting available in the Admin Panel. This first authentication after updating the OneLogin setting shows the traditional Duo prompt in a redirect instead of an iframe. After that, activate the Universal Prompt experience from the Duo Admin Panel for users of that Duo OneLogin application if the traditional prompt is still selected. If you created your OneLogin application before March 2024, it's a good idea to read the Universal Prompt Update Guide for more information, about the update process and the new login experience for users, before you activate the Universal Prompt for your application. New OneLogin Applications When you configure Duo in OneLogin OIDC flow for the first time, you're ready to use the Universal Prompt. OneLogin applications created after March 2024 have the Universal Prompt activated by default. If you're configuring OneLogin now, proceed with the installation instructions in this document. The "Universal Prompt" area of the application details page shows this application as "Activation complete", with these activation control options: Show traditional prompt : Your users experience Duo's traditional prompt via redirect when logging in to this application. Show new Universal Prompt : (Default) Your users experience the Universal Prompt via redirect when logging in to this application. Existing OneLogin Applications You'll need to make a configuration change in OneLogin OIDC flow to use the Universal Prompt. The "Universal Prompt" section reflects this status as "Update required" today. To update the OneLogin OIDC flow configuration, follow the directions below. Activate Universal Prompt Activation of the Universal Prompt is a per-application change. Activating it for one application does not change the login experience for your other Duo applications. Once a user authenticates to the updated OneLogin OIDC flow, the "Universal Prompt" section of the OneLogin application page reflects this status as "Ready to activate", with these activation control options: Show traditional prompt : (Default) Your users experience Duo's traditional prompt when logging in to this application. Show new Universal Prompt : Your users experience the Universal Prompt via redirect when logging in to this application. In addition, the "Integration key" and "Secret key" property labels for the application update to "Client ID" and "Client secret" respectively. The values for these properties remain the same. Enable the Universal Prompt experience by selecting Show new Universal Prompt if the traditional prompt is still selected, and then scrolling to the bottom of the page to click Save . Once you activate the Universal Prompt, the application's Universal Prompt status shows "Activation complete" here and on the Universal Prompt Update Progress report. Should you ever want to roll back to the traditional prompt, you can return to this setting and change it back to Show traditional prompt . However, this will still deliver the Duo prompt via redirect, not in an iframe. Keep in mind that support for the traditional Duo prompt ended for the majority of applications in March 2024. Universal Update Progress Click the See Update Progress link to view the Universal Prompt Update Progress report . This report shows the update availability and migration progress for all your Duo applications. You can also activate the new prompt experience for multiple supported applications from the report page instead of visiting the individual details pages for each application. Configure OneLogin Enable Duo Authentication Factor Log into your OneLogin account. as an administrator. Navigate to Security → Authentication Factors and click the New Auth Factor button. Choose Duo Security from the "Partners" section to enable Duo. Fill out the form as follows and click Save when done. User description A descriptive name for Duo authentication factor i.e. "Duo Security". Integration Key Your Client ID or Integration key (i.e. DIXXXXXXXXXXXXXXXXXX ) from the Duo Admin Panel. Secret Key Your Client secret or Secret key from the Duo Admin Panel. API Hostname Your API hostname (i.e. api-XXXXXXXX.duosecurity.com ) from the Duo Admin Panel. Duo OTP Identifier Select the attribute from the list that contains values that match your end users' Duo usernames. In this example the OTP identifier is Email , so OneLogin sends the email attribute value to Duo as the username. Be sure to select an OTP attribute that has unique values populated for all OneLogin users who will log in with Duo. The OneLogin Authentication Factors page now lists Duo Security. You can configure policies that use the Duo factor next. Configure and Apply User Policy Navigate to Security → Policies in OneLogin and click the New User Policy button. Give the new policy a descriptive name, such as Duo MFA Policy , and click the checkmark button next to the policy name field to apply. Navigate to the MFA settings in the policy editor navigation and check the checkbox next to OTP Auth Required in the "One-time passwords" section. Scroll to the "MFA Device Registration" section. Choose whether you want all users without an MFA device to register one at login ( Users without a MFA device must register one before being able to login. ), or another option that lets users choose to register an MFA device at login or not. Scroll down further to the "Enforcement Settings" section and change the OTP required for pull down menu to All users if you want to require everyone who receives this policy to enroll with Duo at login time. If you would like users to be able to optionally enroll with Duo from their OneLogin settings after logging in, Change the OTP required for pull down menu to Configured users only . If you want your users to complete Duo authentication at every login leave the OTP required at setting as At every login . Changing the OTP required for pull down menu setting to Unknown browser will present your users with a "Browser no

類似記事(ベクトル近傍)