Cisco Duo
This guide will show you how to integrate GoodAccess with Cisco Duo SSO.
Remember to grant your users access permissions to GoodAccess. Users without them won't be able to log in.
Prerequisites
Enabled Duo Single Sign-On
Configured Authentication Source
Step 1 - Adding a new identity provider
Log in to the GoodAccess Control Panel, and go to Settings > SSO & Identity.
Click + Add provider, enter the Provider name, choose your Identity Provider, and click Continue.
Step 2 - Setting up Single Sign-On with SAML
Log in to the Duo Admin Panel, and go to Applications > Protect an Application.
Search for Generic SAML Service Provider, and click Protect.

1. Metadata
Click Download certificate, and open the file in a text editor (e.g. Notepad).
Copy the details to GoodAccess - (3) Identity Provider links.
Sign in URL - Single Sign-On URL
Entity ID - Entity ID
X509 signing certificate - Copy the certificate from the text editor

2. Service Provider
Copy the details from GoodAccess - (2) GoodAccess links.
Metadata Discovery - None (manual input)
Entity ID - Entity ID
ACS URL - Assertion Consumer Service URL
Service Provider Login URL - Login URL
Default Relay State - Relay State

3. SAML Response
NameID format - urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
NameID attribute - <Email Address>
Signature algorithm - SHA256
Signing options - Sign response
Map atttibutes
<Email Address>
<Username>
name
Scroll down to the bottom of the page and click Save.
Return to GoodAccess, skip the next step, and click Submit.

You have now successfully set up your Cisco Duo SSO with GoodAccess.
Last updated
Was this helpful?