LogoLogo
GoodAccess WebsiteRequest Free TrialDownload App
  • Getting Started
    • 1. What is GoodAccess?
    • 2. Architecture Overview
    • 3. Sign up for Free Trial
    • 4. Download App & Connect
  • 🖥️Configuration guides
    • Features
      • Zero Trust Access Control
        • Access Cards
        • Device Posture Check
        • Device Approval
        • Geo Restrictions
      • API Integration
        • API Reference
          • Members
          • Groups
          • Systems
          • Access Cards
          • Relations
          • Gateways
          • Logs
        • Acronis Integration
      • SIEM Integration
      • SSO/SCIM
        • Auth0
        • Cisco Duo
        • Google Workspace
        • JumpCloud
        • Microsoft Entra ID
        • Okta
        • OneLogin
        • Ping Identity
        • Universal (SAML)
      • MFA
      • Passkeys
      • MSI deployment
      • Threat Blocker
      • Custom Domain Blocking
      • DNS Management
      • Split Tunneling
      • Port Forwarding
    • Branch Connector
      • Cisco
      • Cisco Meraki
      • FortiGate
      • MikroTik
      • SonicWall
      • UniFi USG
      • Zyxel Nebula Control Center
      • Other supported routers and firewalls
    • Cloud Connector
      • AWS
      • Google Cloud
      • Microsoft Azure
      • Other Public Cloud providers
    • IP whitelisting
      • APACHE Web Server
      • AWS VPC
      • Azure (Office 365)
      • Google Cloud
      • Google Workspace
      • Magento
      • Microsoft IIS
      • NGINX
        • Domain
        • Subdomain
        • URL
      • OpenCart
      • PHP
      • PHPMyAdmin
      • Pipedrive
      • SalesForce
      • SSH server
      • WordPress
      • Zoho CRM
    • Linux
      • DEB repository
      • RPM repository
      • Manual installation
      • Linux Troubleshooting
  • 🆘FAQ & Troubleshooting
    • FAQ
      • Business
      • Technical
    • Troubleshooting
  • 📓Product Changelog
    • Windows
    • macOS
Powered by GitBook
On this page
  • Prerequisites
  • Step 1 - Adding a new identity provider
  • Step 2 - Setting up Single Sign-On with SAML
  • 1. Metadata
  • 2. Service Provider
  • 3. SAML Response

Was this helpful?

  1. Configuration guides
  2. Features
  3. SSO/SCIM

Cisco Duo

This guide will show you how to integrate GoodAccess with Cisco Duo SSO.

PreviousAuth0NextGoogle Workspace

Last updated 7 months ago

Was this helpful?

This feature is available in the Premium plan and higher.

Remember to grant your users access permissions to GoodAccess. Users without them won't be able to log in.

Prerequisites

  • Enabled

  • Configured

Step 1 - Adding a new identity provider

Click + Add provider, enter the Provider name, choose your Identity Provider, and click Continue.

Step 2 - Setting up Single Sign-On with SAML

Log in to the , and go to Applications > Protect an Application.

Search for Generic SAML Service Provider, and click Protect.

1. Metadata

Click Download certificate, and open the file in a text editor (e.g. Notepad).

Copy the details to GoodAccess - (3) Identity Provider links.

  • Sign in URL - Single Sign-On URL

  • Entity ID - Entity ID

  • X509 signing certificate - Copy the certificate from the text editor

2. Service Provider

Copy the details from GoodAccess - (2) GoodAccess links.

  • Metadata Discovery - None (manual input)

  • Entity ID - Entity ID

  • ACS URL - Assertion Consumer Service URL

  • Service Provider Login URL - Login URL

  • Default Relay State - Relay State

3. SAML Response

  • NameID format - urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

  • NameID attribute - <Email Address>

  • Signature algorithm - SHA256

  • Signing options - Sign response

Map atttibutes

IdP Attribute
SAML Response Attribute

<Email Address>

email

<Username>

name

Scroll down to the bottom of the page and click Save.

Return to GoodAccess, skip the next step, and click Submit.

You have now successfully set up your Cisco Duo SSO with GoodAccess.

🖥️
Duo Single Sign-On
Authentication Source
Log in to the GoodAccess Control Panel, and go to Settings > SSO & Identity.
Duo Admin Panel
Protecting a new application
Setting up the Identity Provider details
Setting up the Service Provider details
Setting up the SAML Response details
Duo Admin Panel with key steps to protecting a new application.
Duo Admin Panel with key steps to setting up the Identity Provider details.
Duo Admin Panel with key steps to setting up the Service Provider details.
Duo Admin Panel with key steps to setting up the SAML Response details.