-
Notifications
You must be signed in to change notification settings - Fork 6
DUO plugin
Multi-factor authentication from Cisco's Duo protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Duo is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates easily with your existing technology.
This document will explain how to use Gluu's Duo interception script along with a Plugin in Casa to enroll a user's DUO credentials for 2FA.
In order to use this authentication mechanism your organization will need to register for a DUO account.
- A Gluu Server (installation instructions);
- DUO interception script ;
- An account with DUO.
A. # for a DUO account.
- Make the necessary configurations so as to be able to add Duo's strong two-factor authentication to your web application, complete with inline self-service enrollment and Duo Prompt(iframe which enables login and enrollment). The steps are [here] (https://duo.com/docs/duoweb)
- Generate an akey. You'll find steps for the same in this document under "Instructions".
- Note that Integration key (ikey), Secret key (skey) and akey (generated from step b.) will be used in /etc/certs/duo_creds.json in the Gluu server.
- Note that API hostname will be used in Gluu's interception script as property "duo_host"
- Enable the Self-Service Portal - https://duo.com/docs/self-service-portal
- The required role to access the Admin API is Duo "Owner" level Administrator, further details to enable the role is here. More information to the different administrator roles are [here] (https://duo.com/docs/administration-admins#duo-administrator-roles). To get access to this tab, please ask any of the other admins on the account to raise your role to owner level.
- Note that ikey, skey of Admin API will be used in
/etc/certs/duo_creds.json
in the Gluu server under the nameadmin_api_ikey
andadmin_api_skey
Log into oxTrust, and go to Configuration
> Person Authentication scripts
> duo.
Download this file and copy its contents in the Script
form field.
The mandatory properties in the DUO authentication script are as follows
Property | Status | Description | Example |
---|---|---|---|
duo_creds_file | Mandatory | Path to ikey, skey, akey | /etc/certs/duo_creds.json |
duo_host | Mandatory | URL of the Duo API Server | api-random.duosecurity.com |
- Here is a sample file - https://github.com/GluuFederation/casa/blob/version_4.2.2/plugins/duo/extras/duo_creds.json
- The contents of the file can be populated by referring to Step B and C under "Configure DUO Account"
Click on Enable
under the script contents box, and press Update
at the bottom of the page.
-
To integrate the DUO script with casa, the following files should be copied to /opt/gluu/oxauth/custom/pages/casa a. casa.xhtml b. duologin.xhtml c. fullwidth-template.xhtml
-
Copy oxauth.properties file from here to /opt/gluu/oxauth/custom/i18n/ inside chroot
Add "oxDuoDevices" as a custom attribute to GluuCustomPerson. Follow this document Edit 77-customAttributes.ldiff. Backup the original file. Watch out for additional spaces or line breaks.
-
Log in to Casa using an administrator account
-
Visit
Administration console
>Casa plugins
-
Click on
Add a plugin...
and select the plugin jar file -
Click on
Add
Alternatively you can log into chroot and copy the jar file directly to /opt/gluu/jetty/casa/plugins
.
Wait for one minute, then visit Administration Console
> Enabled methods
and tick duo
. On the right, the plugin will be selected by default. Finally save the changes.
So far, users that log into Casa should be able to see a new entry "DUO credentials" that will appear under "2FA credentials" .
The steps to enroll your DUO credentials are self explanatory. Follow the instructions on the web page.
You can modify your enrollments or delete your credentials by visiting your registered credential. Click on "Add a new device" to add a new device and "My settings and Devices" to edit or delete a credential.
Ensure you have added another credential, hopefully of a different kind, for example a mobile phone number or an OTP token. Then visit the home page and click the toggle to turn 2FA on and logout.
Try to access the application once more and supply the username and password for the account recently used to enroll the duo credential. Depending on the numeric level assigned to the duo
script, you will be prompted for a different factor, for instance, to enter an OTP code. If so, click on Try an alternative way to #
and click on DUO credential
.
Follow the instructions on the screen for verification duo credentials.
Finally you will be redirected and get access to the application.