Reference Guide
...
External MFA Providers
Cisco Duo MFA Integration
3 min
for single connect integration with cisco duo, users should log in to cisco duo with the email addresses defined in single connect the username must match the information on single connect after logging in to the duo portal, the token verification can be done through different verification methods to use the duo verification method, users must download the duo mobile mobile app duo mobile should be activated from the user portal settings area users must be added to the duo portal the duo mobile app should be activated on the devices single connect integrates with cisco duo via api, as long as certain parameters are defined in single connect api key (the api key is created by duo for each customer environment) url (the url is unique for each customer environment) integration key (the integration key is created by duo for each customer environment) to adjust the duo integration settings navigate to administration > system config manager set the following parameters mfa provider=duo (default internal) mfa external provider duo api hostname=xxx mfa external provider duo integration key=xxx mfa external provider duo secret key=xxx (encrypted) mfa external provider duo factor = {passcode, sms, push} mfa external provider duo push type = "the message which will be shown in the push notification on mobile device" default single connect mfa request with duo enabled, the token can be sent in different ways passcode token in the mobile app is used sms token is sent by sms push verification is confirmed from the mobile application