Skip to content

Latest commit

 

History

History
37 lines (30 loc) · 2.34 KB

DuoSecurity-Authentication-User-Registration.md

File metadata and controls

37 lines (30 loc) · 2.34 KB
layout title category
default
CAS - Duo Security Authentication
Multifactor Authentication

{% include variables.html %}

Duo Security User Registration

If users are unregistered with Duo Security or allowed through via a direct bypass, CAS will query Duo Security for the user account apriori to learn whether user is registered or configured for direct bypass. If the account is configured for direct bypass or the user account is not registered yet the new-user enrollment policy allows the user to skip registration, CAS will bypass Duo Security altogether and shall not challenge the user and will also NOT report back a multifactor-enabled authentication context back to the application.

⚠️ YMMV

In recent conversations with Duo Security, it turns out that the API behavior has changed (for security reasons) where it may no longer accurately report back account status. This means even if the above conditions hold true, CAS may continue to route the user to Duo Security having received an eligibility status from the API. Duo Security is reportedly working on a fix to restore the API behavior in a more secure way. In the meanwhile, YMMV.

If you would rather not rely on Duo Security's built-in registration flow and have your own registration application that allows users to onboard and enroll with Duo Security, you can instruct CAS to redirect to your enrollment application, if the user's account status is determined to require enrollment. This typically means that you must turn on user-account-status checking in CAS so that it can verify the user's account status directly with Duo Security. You must also make sure your integration type, as selected in Duo Security's admin dashboard, is chosen to be the correct type that would allow CAS to execute such requests and of course, the user in question must not have been onboard, enrolled or created previously anywhere in Duo Security.

The redirect URL to your enrollment application may include a special principal parameter that contains the user's identity as JWT. Cipher operations and settings must be enabled in CAS settings for Duo Security's registration before this parameter can be built and added to the final URL.

{% include_cached casproperties.html properties="cas.authn.mfa.duo[].registration" %}