Cisco Duo

This guide will show you how to integrate GoodAccess with Cisco Duo SSO.

This feature is available in the Premium plan and higher.

Please note: Changing the login method to identity provider will permanently delete all Members you invited. Your team Members will be automatically added to GoodAccess upon their first login. Manually added Members will stay.

Remember to grant your users access permissions to GoodAccess. Users without them won't be able to log in.

Prerequisites

Step 1 - Adding a new identity provider

Log in to the GoodAccess Control Panel, and go to Settings > SSO & MFA.

Click + Add provider, enter the Provider name, choose your Identity Provider, and click Continue.

Step 2 - Setting up Single Sign-On with SAML

Log in to Duo Admin Panel, and go to Applications > Protect an Application.

Search for Generic SAML Service Provider, and click Protect.

1. Metadata

Download the Certificate, and open it with a text editor (e.g. Notepad).

Copy the details to GoodAccess - (3) Identity Provider links.

  • Sign in URL - Single Sign-On URL

  • Entity ID - Entity ID

  • X509 signing certificate - Copy the certificate from the text editor

2. Service Provider

Copy the details from GoodAccess - (2) GoodAccess links.

  • Metadata Discovery - None (manual input)

  • Entity ID - Entity ID

  • ACS URL - Assertion Consumer Service URL

  • Service Provider Login URL - Login URL

  • Default Relay State - Relay State

3. SAML Response

  • NameID format - urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

  • NameID attribute - <Email Address>

  • Signature algorithm - SHA256

  • Signing options - Sign response

Map atttibutes

IdP AttributeSAML Response Attribute

<Email Address>

email

<Username>

name

Scroll down to the bottom of the page and click Save.

Return to GoodAccess, skip the next step, and click Submit.

You have now successfully set up your Cisco Duo SSO with GoodAccess.

Last updated