We recommend a system with at least 1 CPU, 200 MB disk space, and 4 GB RAM (although 1 GB RAM is usually sufficient). The Duo Authentication Proxy can be installed on a physical or virtual host. If you will reuse an existing Duo Authentication Proxy server for this new application, you can skip the install steps and go to Configure the Proxy. Don't share it with unauthorized individuals or email it to anyone under any circumstances! Install the Duo Authentication Proxy Secure it as you would any sensitive credential. The security of your Duo application is tied to the security of your secret key (skey). See Protecting Applications for more information about protecting applications in Duo and additional application options. You'll need this information to complete your setup. Click Protect to get your integration key, secret key, and API hostname. Click Protect an Application and locate Cisco ISE RADIUS in the applications list.Log in to the Duo Admin Panel and navigate to Applications.If you must co-locate the Duo Authentication Proxy with these services, be prepared to resolve potential LDAP or RADIUS port conflicts between the Duo service and your pre-existing services. We do not recommend installing the Duo Authentication Proxy on the same Windows server that acts as your Active Directory domain controller or one with the Network Policy Server (NPS) role. See detailed Authentication Proxy operating system performance recommendations in the Duo Authentication Proxy Reference. Debian 7 or later (Debian 9+ recommended). Ubuntu 16.04 or later (Ubuntu 18.04+ recommended).Red Hat Enterprise Linux 7 or later (RHEL 8+ recommended).CentOS 7 or later (CentOS 8+ recommended).Windows Server 2012 or later (Server 2016+ recommended).The proxy supports these operating systems: If you will set up a new Duo server, locate (or set up) a system to host the Duo Authentication Proxy installation. However, there are some cases where it might make sense for you to deploy a new proxy server for a new application, like if you want to co-locate the Duo proxy with the application it will protect in the same data center. You don't have to set up a new Authentication Proxy server for each application you create. If you are already running a Duo Authentication Proxy server in your environment, you can use that existing host for additional applications, appending the new configuration sections to the current config. This Duo proxy server will receive incoming RADIUS requests from your Cisco ISE, contact your existing local LDAP/AD or RADIUS server to perform primary authentication, and then contact Duo's cloud service for secondary authentication. To integrate Duo with your Cisco ISE, you will need to install a local Duo proxy service on a machine within your network. You should already have a working primary authentication configuration for your Cisco ISE users before you begin to deploy Duo. Before moving on to the deployment steps, it's a good idea to familiarize yourself with Duo administration concepts and features like options for applications, available methods for enrolling Duo users, and Duo policy settings and how to apply them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |