configuring-multi-factor-authentication-with-duo
Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust
Best use case
configuring-multi-factor-authentication-with-duo is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust
Teams using configuring-multi-factor-authentication-with-duo should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/configuring-multi-factor-authentication-with-duo/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How configuring-multi-factor-authentication-with-duo Compares
| Feature / Agent | configuring-multi-factor-authentication-with-duo | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Configuring Multi-Factor Authentication with Duo ## Overview Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points. This skill covers Duo integration methods, adaptive authentication policies, device trust assessment, and phishing-resistant MFA deployment aligned with NIST 800-63B AAL2/AAL3 requirements. ## When to Use - When deploying or configuring configuring multi factor authentication with duo capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Familiarity with identity access management concepts and tools - Access to a test or lab environment for safe execution - Python 3.8+ with required dependencies installed - Appropriate authorization for any testing activities ## Objectives - Configure Duo MFA for VPN, RDP, SSH, and web applications - Implement adaptive access policies based on user, device, and network context - Deploy phishing-resistant authentication (Duo Verified Push, WebAuthn) - Configure device health policies (trusted endpoints, OS version enforcement) - Set up Duo Admin Panel monitoring and reporting - Implement MFA bypass and emergency access procedures ## Key Concepts ### Duo Authentication Methods (by security strength) 1. **Security Keys (WebAuthn/FIDO2)**: Phishing-resistant, AAL3 capable 2. **Duo Verified Push**: Requires code entry, resistant to MFA fatigue attacks 3. **Duo Push**: Push notification to Duo Mobile app 4. **TOTP (Duo Mobile Passcode)**: Time-based one-time password 5. **Hardware Tokens**: OTP from physical token 6. **SMS/Phone Call**: Least secure, use only as fallback ### Duo Integration Architecture - **Duo Authentication Proxy**: On-premises proxy for RADIUS/LDAP integration - **Duo Web SDK**: Embed Duo MFA in web applications - **Duo OIDC/SAML**: SSO integration for cloud applications - **Duo for RDP**: Windows Logon MFA - **Duo Unix**: PAM-based MFA for SSH ### Adaptive Access Policies - **Trusted Networks**: Reduce MFA friction for corporate networks - **Remembered Devices**: Skip MFA for trusted devices (configurable duration) - **Device Health**: Block or require MFA based on OS patch level, encryption, firewall - **Risk-Based Authentication**: Step-up MFA for anomalous login patterns ## Workflow ### Step 1: Duo Authentication Proxy Setup 1. Deploy Duo Authentication Proxy on Windows/Linux server 2. Configure primary authentication (AD/LDAP or RADIUS) 3. Configure Duo API credentials (Integration Key, Secret Key, API Hostname) 4. Set failmode (safe=deny if Duo unreachable, secure=allow) 5. Test proxy connectivity to Duo cloud and AD ### Step 2: VPN MFA Integration 1. Configure VPN concentrator for RADIUS authentication 2. Point RADIUS to Duo Authentication Proxy 3. Configure Duo proxy with [radius_server_auto] section 4. Test VPN login with Duo Push 5. Deploy to all VPN users with enrollment period ### Step 3: RDP/Windows Logon MFA 1. Install Duo Authentication for Windows Logon on target servers 2. Configure Duo application in Admin Panel 3. Set offline access options (allow N offline logins) 4. Configure bypass for service accounts 5. Test RDP login with Duo MFA ### Step 4: Adaptive Policy Configuration 1. Create user groups (Standard, Privileged, Contractors) 2. Configure per-group authentication policies: - Standard: Duo Push allowed, remembered device 7 days - Privileged: Verified Push required, no remembered device - Contractors: WebAuthn required, no remembered device 3. Configure device health policies: - Require encrypted disk - Block outdated OS versions - Require firewall enabled 4. Set trusted network exceptions for corporate IPs ### Step 5: Phishing-Resistant MFA Deployment 1. Enable Verified Push (requires entering 3-digit code from login screen) 2. Register WebAuthn/FIDO2 security keys for privileged users 3. Disable SMS and phone call for high-risk groups 4. Configure Duo Risk-Based Factor Selection 5. Monitor for MFA fatigue attack patterns ### Step 6: Monitoring and Response 1. Configure Duo Admin Panel alerts 2. Set up authentication log forwarding to SIEM 3. Monitor for: MFA denial patterns, bypass usage, new device enrollments 4. Create incident response playbook for MFA compromise 5. Regular review of bypass and exception policies ## Security Controls | Control | NIST 800-53 | Description | |---------|-------------|-------------| | MFA | IA-2(1) | Multi-factor authentication for network access | | MFA for Privileged | IA-2(2) | MFA for privileged account access | | Replay Resistance | IA-2(8) | Replay-resistant authentication | | Device Identification | IA-3 | Device identity and trust | | Authenticator Management | IA-5 | MFA enrollment and lifecycle | ## Common Pitfalls - Not deploying phishing-resistant MFA (Verified Push/FIDO2) for privileged accounts - Setting failmode to "safe" (allow access when Duo is down) in production - Not disabling SMS/phone call for users with app-capable devices - Forgetting to configure offline access for laptops - Not monitoring for MFA fatigue/prompt bombing attacks ## Verification - [ ] VPN login requires Duo MFA - [ ] RDP to servers requires Duo MFA - [ ] SSH access requires Duo MFA - [ ] Verified Push enabled for privileged users - [ ] Device health policy blocks non-compliant devices - [ ] Authentication logs forwarded to SIEM - [ ] Bypass/emergency access procedures tested - [ ] MFA fatigue detection alerts configured
Related Skills
theme-factory
Toolkit for styling artifacts with a theme. These artifacts can be slides,
testing-mobile-api-authentication
Tests authentication and authorization mechanisms in mobile application APIs to identify broken authentication, insecure token management, session fixation, privilege escalation, and IDOR vulnerabilities. Use when performing API security assessments against mobile app backends, testing JWT implementations, evaluating OAuth flows, or assessing session management. Activates for requests involving mobile API auth testing, token security assessment, OAuth mobile flow testing, or API authorization bypass.
testing-api-authentication-weaknesses
Tests API authentication mechanisms for weaknesses including broken token validation, missing authentication on endpoints, weak password policies, credential stuffing susceptibility, token leakage in URLs or logs, and session management flaws. The tester evaluates JWT implementation, API key handling, OAuth flows, and session token entropy to identify authentication bypasses. Maps to OWASP API2:2023 Broken Authentication. Activates for requests involving API authentication testing, token validation assessment, credential security testing, or API auth bypass.
Skill Maker: AI Skill Factory for Tools
Meta-skill that generates domain-specific AI skills from tool documentation
naturality-factor
Naturality Factor Skill
multiversal-finance
Multiversal Finance: Prediction Markets for Interesting Observations
implementing-zero-knowledge-proof-for-authentication
Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private key) without revealing the secret itself. This skill implements the Schnorr identificati
implementing-passwordless-authentication-with-fido2
Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server configuration, passkey enrollment, biometric authentica
implementing-hardware-security-key-authentication
Implements FIDO2/WebAuthn hardware security key authentication including registration ceremonies, authentication flows, YubiKey enrollment, and passkey migration strategies. Builds a complete relying party server using the python-fido2 library that supports cross-platform authenticators, resident key (discoverable credential) workflows, and user verification policies. Activates for requests involving FIDO2 implementation, WebAuthn registration, hardware security key enrollment, YubiKey integration, or passkey migration from password-based authentication.
detecting-anomalous-authentication-patterns
Detects anomalous authentication patterns using UEBA analytics, statistical baselines, and machine learning models to identify impossible travel, credential stuffing, brute force, password spraying, and compromised account behaviors across authentication logs. Activates for requests involving authentication anomaly detection, login behavior analysis, UEBA implementation, or suspicious sign-in investigation.
configuring-zscaler-private-access-for-ztna
Configuring Zscaler Private Access (ZPA) to replace traditional VPN with zero trust network access by deploying App Connectors, defining application segments, configuring access policies based on user identity and device posture, and integrating with IdPs.
configuring-windows-event-logging-for-detection
Configures Windows Event Logging with advanced audit policies to generate high-fidelity security events for threat detection and forensic investigation. Use when enabling audit policies for logon events, process creation, privilege use, and object access to feed SIEM detection rules. Activates for requests involving Windows audit policy, event log configuration, security logging, or detection-oriented logging.