Cisco DUO MFA for SIS
The end user experience
- The user will enter their username and password as usual.
- After clicking the logon button, they will be redirected to DUO security to perform another factor of authentication. This may be a DUO Push, a request for a 6 digit password or any other additional authentication factor that DUO has available.
- When the user successfully completes the additional factor in DUO, DUO will redirect the user back to Genesis.
Buzz words
- Cisco DUO - Provides Multi Factor Authentication to other applications as a service.
- OIDC – OpenID Connect. This is the protocol / standard that is used by Genesis to communicate with Cisco DUO to hand off the Multi Factor Authentication process. OIDC is an extension to the OAuth 2 protocol that defines the mechanisms for Authentication.
- https://openid.net/connect/
- OAuth 2.0 – OAuth 2.0 is the industry-standard protocol for authorization. https://oauth.net/2/
Setup Process overview
- Create the Genesis Applications in DUO
- Configure Genesis to use the DUO MFA applications as OIDC Providers.
- Setup Genesis for MFA
- Setup individual Users to use the DUO MFA.
Create the Genesis Application in DUO
The following steps will not affect users logging into Genesis SIS.
- Log into DUO as an administrator.
- In the left panel, choose the Applications link.
- Click the Protect an Application button or the Protect an Application link.
- Click the Protect button for the Web SDK application in the list of applications.
- Go to the Settings section and change the name of the application from Web SDK to Genesis SIS.
Configure Genesis to use the DUO MFA application as an OIDC Provider.
The following steps will not affect users logging into Genesis SIS.
- Log into Genesis as an Administrator
- Go to the Setup -> Security -> Single Sign-on and MFA -> Providers screen.
- Click the Add Providerbutton.
- Code: DUO_MFA_STAFF
- Provider: Cisco DUO
- Description: DUO MFA
- Type: Multi-Factor Authentication
- Client Id: Copy and paste these fields from the Genesis application setup screen.
- Client Secret: Copy and paste these fields from the Genesis application setup screen.
- Click the Add button
- On the modify DUO_MFA_STAFF page, make the following changes:
- Click the Enabled for Genesis checkbox
- Change the DNS name in the end point from https://CHANGEME.duosecurity.com to the one in the API hostname field in the Genesis application setup screen in DUO.
Configuring the public call back URLs
On the Edit Provider screen, there is an Important Information notecard.
If the URLs are displaying a warning icon, then click on the Logon Screen Settings to configure and test these URLs.
In the screen shot below, you will notice that the top 3 fields are blank. Click the "Auto Set...." button and the fields will automatically be filled in with the best guess to your public URL (60% of the time it works every time).
Once the URLS are set, test buttons will appear next to them. Clicking on them will open a new tab to and you should see a typical Genesis / Parents / Students logon screen.
Testing Connectivity between Genesis and DUO
Basic connectivity
Navigate back to the modify provider screen.
Click the Send OAuth 2.0 Ping button. This will send a basic test ping to Cisco DUO. You should get this as a response:
If you are not getting that as a response, the most likely problem is that a firewall in your organization is blocking the request to DUO. Do not advance to the next step until this is working.
API Configuration Test
Click the DUO Health Check button. This will send a more advanced ping that validates the application id and secret part of the protocol connection.
If you are not getting that as a response, the most likely problem is that one of the values in the Client Id, Client Secret or URL End Point Root is incorrect. Do not advance to the next step until this is working.
Configuring Genesis Users to use DUO for MFA
Choose a user to test the MFA with Cisco DUO from the Setup -> Security -> Users screen.
Do not choose the user you are currently logged in as, you do not want to accidentally lock yourself out of the system if the feature is not setup correct;y.
Change the External MFA Provider drop down to the DUO MFA option and click save.
Be sure the Email field has the email address of a valid user in DUO. If it is blank, the logon id will be used instead.
Using a different browser (or log out of your current session); attempt to login as this user.
Unable to log into Genesis using DUO
WARNING: Not compatible with OAuth2
<CookieProcessor sameSiteCookies="strict" />
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article