Cisco Duo
This guide will show you how to integrate GoodAccess with Cisco Duo SSO.
This feature is available in the Premium plan and higher.
Please note: Changing the login method to identity provider will permanently delete all Members you invited. Your team Members will be automatically added to GoodAccess upon their first login. Manually added Members will stay.
Remember to grant your users access permissions to GoodAccess. Users without them won't be able to log in.
Prerequisites
Enabled Duo Single Sign-On
Configured Authentication Source
Step 1 - Adding a new identity provider
Log in to the GoodAccess Control Panel, and go to Settings > SSO & MFA.
Click + Add provider, enter the Provider name, choose your Identity Provider, and click Continue.
Step 2 - Setting up Single Sign-On with SAML
Log in to Duo Admin Panel, and go to Applications > Protect an Application.
Search for Generic SAML Service Provider, and click Protect.
1. Metadata
Download the Certificate, and open it with a text editor (e.g. Notepad).
Copy the details to GoodAccess - (3) Identity Provider links.
Sign in URL - Single Sign-On URL
Entity ID - Entity ID
X509 signing certificate - Copy the certificate from the text editor
2. Service Provider
Copy the details from GoodAccess - (2) GoodAccess links.
Metadata Discovery - None (manual input)
Entity ID - Entity ID
ACS URL - Assertion Consumer Service URL
Service Provider Login URL - Login URL
Default Relay State - Relay State
3. SAML Response
NameID format - urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
NameID attribute - <Email Address>
Signature algorithm - SHA256
Signing options - Sign response
Map atttibutes
IdP Attribute | SAML Response Attribute |
---|---|
<Email Address> | |
<Username> | name |
Scroll down to the bottom of the page and click Save.
Return to GoodAccess, skip the next step, and click Submit.
You have now successfully set up your Cisco Duo SSO with GoodAccess.
Last updated