![]() When planning your Active Directory authentication configuration to support SSO, determine whether Duo Single Sign-on needs to authenticate users from a single AD domain, or from multiple AD domains organized in an Active Directory forest. You'll then configure Duo Single Sign-On to talk to your Active Directory domain controllers through the Authentication Proxy. Active Directoryįollow the steps below to first configure an on-premises Authentication Proxy to connect to Duo Single Sign-On. While you can complete the configuration steps for both Active Directory and SAML authentication sources, only one type of authentication source may be enabled for use at a time. Role required: Owner, Administrator, or Application Managerĭuo Single Sign-On allows you to use either Active Directory domains and forests or a SAML Identity Provider as a first-factor authentication source. Click the button at the bottom of the option you'd like to use to add that source type, and follow the instructions in the next section. ![]() On the Add Authentication Source page choose between using Active Directory or a SAML Identity Provider as your authentication source. Trial accounts are restricted from creating a subdomain.Ĭlick Save and continue to use the desired subdomain or click Skip for now to customize your subdomain later. For example, you can enter acme and users would see in the URL when logging into Duo Single Sign-On. On the Customize your SSO subdomain page you can specify a subdomain you'd like your users to see when they are logging in with Duo Single Sign-On. If you agree to the terms, check the box and then click Activate and Start Setup. Review the information on the "Single Sign-On" page. Log in to the Duo Admin Panel and click Single Sign-On in the navigation bar on the left.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |